Customizing k-Gram based birthmark through partial matching in detecting software thefts

被引:0
|
作者
Lim, Hyun-Il [1 ]
机构
[1] Dept. of Computer Science and Engineering, Kyungnam University, Changwon, Korea, Republic of
关键词
Binary programs - [!text type='Java']Java[!/text] applications - Op-code sequence - Partial matching - Real-world - Software birthmarks - Software copyright protections - Theft detections;
D O I
2013 IEEE 37th Annual Computer Software and Applications Conference Workshops, COMPSACW 2013
中图分类号
学科分类号
摘要
引用
收藏
页码:1 / 4
相关论文
共 14 条
  • [1] Customizing k-gram Based Birthmark through Partial Matching in Detecting Software Thefts
    Lim, Hyun-il
    2013 IEEE 37TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSACW), 2013, : 1 - 4
  • [2] A software birthmark based on weighted k-gram
    Xie, Xin
    Liu, Fenlin
    Lu, Bin
    Chen, Lin
    Proceedings - 2010 IEEE International Conference on Intelligent Computing and Intelligent Systems, ICIS 2010, 2010, 1 : 400 - 405
  • [3] Dynamic k-gram based software birthmark
    Bai, Yameng
    Sun, Xingming
    Sun, Guang
    Den, Xiaohong
    Zhou, Xiaoming
    ASWEC 2008: 19TH AUSTRALIAN SOFTWARE ENGINEERING CONFERENCE, PROCEEDINGS, 2008, : 644 - +
  • [4] Detecting Documents Plagiarism using Winnowing Algorithm and K-Gram Method
    Sutoyo, Rhio
    Ramadhani, Insan
    Ardiatma, Angger Dwi
    Bavana, Sanditya Cakti
    Warnars, Harco Leslie Hendric Spits
    Trisetyarso, Agung
    Abbas, Bahtiar Saleh
    Suparta, Wayan
    2017 IEEE INTERNATIONAL CONFERENCE ON CYBERNETICS AND COMPUTATIONAL INTELLIGENCE (CYBERNETICSCOM), 2017, : 67 - 72
  • [5] A software birthmark based on dynamic opcode n-gram
    Bin Lu
    Liu, Fenlin
    Ge, Xin
    Bin Liu
    Luo, Xiangyang
    ICSC 2007: INTERNATIONAL CONFERENCE ON SEMANTIC COMPUTING, PROCEEDINGS, 2007, : 37 - +
  • [6] Implementation of Winnowing Algorithm Based K-Gram to Identify Plagiarism on File Text-Based Document
    Nurdiansyah, Yanuar
    Muharrom, Fiqih Nur
    Firdaus
    3RD INTERNATIONAL CONFERENCE ON ELECTRICAL SYSTEMS, TECHNOLOGY AND INFORMATION (ICESTI 2017), 2018, 164
  • [7] A STATIC SOFTWARE BIRTHMARK BASED ON USE-DEFINE CHAINS FOR DETECTING THE THEFT OF JAVA']JAVA PROGRAMS
    Xie, Xin
    Liu, Fenlin
    Lu, Bin
    Zhao, Tao
    Li, Hanning
    SECRYPT 2011: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2011, : 231 - 237
  • [8] XML-based software component retrieval with partial and reference matching
    Praphamontripong, U
    Hu, GZ
    PROCEEDINGS OF THE 2004 IEEE INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IRI-2004), 2004, : 127 - 132
  • [9] Modeling the scholars: Detecting intertextuality through enhanced word-level n-gram matching
    Forstall, Christopher
    Coffee, Neil
    Buck, Thomas
    Roache, Katherine
    Jacobson, Sarah
    DIGITAL SCHOLARSHIP IN THE HUMANITIES, 2015, 30 (04) : 503 - 515
  • [10] Correlation-Coefficient-Based Fast Template Matching Through Partial Elimination
    Mahmood, Arif
    Khan, Sohaib
    IEEE TRANSACTIONS ON IMAGE PROCESSING, 2012, 21 (04) : 2099 - 2108