Software reuse, especially partial reuse, poses legal and security threats to software development. Since its source codes are usually unavailable, software reuse is hard to be detected with interpretation. On the other hand, current approaches suffer from poor detection accuracy and efficiency, far from satisfying practical demands. To tackle these problems, in this paper, we propose ISRD, an interpretation-enabled software reuse detection approach based on a multi-level birthmark model that contains function level, basic block level, and instruction level. To overcome obfuscation caused by cross-compilation, we represent function semantics with Minimum Branch Path (MBP) and perform normalization to extract core semantics of instructions. ...
Software reuse has been demonstrated to increase productivity, reduce costs, and improve software qu...
Reusing code is one approach to software reusability. Code is the end product of the software lifecy...
Internet has made available huge amounts of information, also source code. Source code repositories...
Software reuse, especially partial reuse, poses legal and security threats to software development. ...
none4siThe advent of the Internet has caused an increase in content reuse, including source code. Th...
Many experts believe that new malware is created at a rate faster than legitimate software. For exam...
Detecting code reuse in malicious software is compli-cated by the lack of source code. The same circ...
Recent years have witnessed a rapid growth of code-reuse attacks in advance persistent threats and c...
When exploiting software vulnerabilities such as buffer overflows, code reuse techniques are often u...
Source code transformation is a way in which source code of a program is transformed by observing an...
Abstract. Internet has made available huge amounts of information, also source code. Source code rep...
Code Reuse Attacks (CRAs) recently emerged as a new class of security exploits. CRAs construct malic...
Abstract—Code Reuse Attacks (CRAs) recently emerged as a new class of security exploits. CRAs constr...
Nowadays, Internet is the main source to get information from blogs, encyclopedias, discussion forum...
Software theft and piracy are rapidly increasing problems of modern day software \ud industry. This ...
Software reuse has been demonstrated to increase productivity, reduce costs, and improve software qu...
Reusing code is one approach to software reusability. Code is the end product of the software lifecy...
Internet has made available huge amounts of information, also source code. Source code repositories...
Software reuse, especially partial reuse, poses legal and security threats to software development. ...
none4siThe advent of the Internet has caused an increase in content reuse, including source code. Th...
Many experts believe that new malware is created at a rate faster than legitimate software. For exam...
Detecting code reuse in malicious software is compli-cated by the lack of source code. The same circ...
Recent years have witnessed a rapid growth of code-reuse attacks in advance persistent threats and c...
When exploiting software vulnerabilities such as buffer overflows, code reuse techniques are often u...
Source code transformation is a way in which source code of a program is transformed by observing an...
Abstract. Internet has made available huge amounts of information, also source code. Source code rep...
Code Reuse Attacks (CRAs) recently emerged as a new class of security exploits. CRAs construct malic...
Abstract—Code Reuse Attacks (CRAs) recently emerged as a new class of security exploits. CRAs constr...
Nowadays, Internet is the main source to get information from blogs, encyclopedias, discussion forum...
Software theft and piracy are rapidly increasing problems of modern day software \ud industry. This ...
Software reuse has been demonstrated to increase productivity, reduce costs, and improve software qu...
Reusing code is one approach to software reusability. Code is the end product of the software lifecy...
Internet has made available huge amounts of information, also source code. Source code repositories...