To support the efficient detection of theft of Java class files, this paper presents a new method to derive birthmarks from given Java class files. The proposed method extracts from a class file a set of unique characteristics, the birthmarks, based on constant values in Beld variables, the sequence of method calls, the inheritance structure and used classes. By using the birthmarks, we can easily identify the doubtful class files (those which seem to be copies). Two experiments were conducted to evaluate the proposed method. The first experiment showed that the proposed birthmark successfully distinguished non-copied mes in practical Java applications (97.50%). In the second experiment, it was shown that the proposecl birthmark had quite a...
Plagiarism is a serious problem faced by universities in the world. University Utara Malaysia, just ...
Abstract—As JavaScript is becoming more and more popular, JavaScript programs are valuable assets to...
Source code transformation is a way in which source code of a program is transformed by observing an...
To detect the theft of Java class files efficiently, we propose a concept of Java birthmarks, which ...
A software birthmark means inherent characteristics that can be used to identify a program. In this ...
A software birthmark means inherent characteristics that can be used to identify a program. In this ...
Lecture Notes in Computer Science, Vol.7025 is the conference proceedings of the CMS 2011Code theft ...
Abstract. Code theft is a threat for companies that considers code as a core asset. A birthmark can ...
This paper presents a technique of dynamic software birthmarks to support efficient detection of sof...
Many Java programs are distributed in binary form without source code being made available. This mea...
COMPSAC2000 : 24th Annual International Computer Software and Applications Conference, 25-27 Oct. 20...
Java birthmark toolkit, detecting the software theft by native characteristics of the programs
This paper proposes dynamic software birthmarks which can be extracted during execution of Windows a...
Software theft and piracy are rapidly increasing problems of modern day software \ud industry. This ...
AbstractThis paper presents a novel dynamic analysis approach to software plagiarism detection. Such...
Plagiarism is a serious problem faced by universities in the world. University Utara Malaysia, just ...
Abstract—As JavaScript is becoming more and more popular, JavaScript programs are valuable assets to...
Source code transformation is a way in which source code of a program is transformed by observing an...
To detect the theft of Java class files efficiently, we propose a concept of Java birthmarks, which ...
A software birthmark means inherent characteristics that can be used to identify a program. In this ...
A software birthmark means inherent characteristics that can be used to identify a program. In this ...
Lecture Notes in Computer Science, Vol.7025 is the conference proceedings of the CMS 2011Code theft ...
Abstract. Code theft is a threat for companies that considers code as a core asset. A birthmark can ...
This paper presents a technique of dynamic software birthmarks to support efficient detection of sof...
Many Java programs are distributed in binary form without source code being made available. This mea...
COMPSAC2000 : 24th Annual International Computer Software and Applications Conference, 25-27 Oct. 20...
Java birthmark toolkit, detecting the software theft by native characteristics of the programs
This paper proposes dynamic software birthmarks which can be extracted during execution of Windows a...
Software theft and piracy are rapidly increasing problems of modern day software \ud industry. This ...
AbstractThis paper presents a novel dynamic analysis approach to software plagiarism detection. Such...
Plagiarism is a serious problem faced by universities in the world. University Utara Malaysia, just ...
Abstract—As JavaScript is becoming more and more popular, JavaScript programs are valuable assets to...
Source code transformation is a way in which source code of a program is transformed by observing an...