Dynamic Software Birthmark for Java']Java Based on Heap Memory Analysis

被引:0
|
作者
Chan, Patrick P. F. [1 ]
Hui, Lucas C. K. [1 ]
Yiu, S. M. [1 ]
机构
[1] Univ Hong Kong, Dept Comp Sci, Pokfulam, Peoples R China
来源
关键词
software birthmark; software protection; code theft detection; !text type='Java']Java[!/text;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Code theft has been a serious threat to the survival of the software industry. A dynamic software birthmark can help detect code theft by comparing the intrinsic characteristics of two programs extracted during their execution. We propose a dynamic birthmark system for Java based on the object reference graph. To the best of our knowledge, it is the first dynamic software birthmark making use of the heap memory. We evaluated our birthmark using 25 large-scale programs with most of them of tens of megabytes in size. Our results show that it is effective in detecting partial code theft. No false positive or false negative were found. More importantly, the birthmark remained intact even after the testing programs were obfuscated by the state-of-the-art Allatori obfuscator. These promising results reflect that our birthmark is ready for practical use.
引用
收藏
页码:94 / 107
页数:14
相关论文
共 50 条
  • [1] JS']JSBiRTH: Dynamic Java']JavaScript Birthmark Based on the Run-time Heap
    Chan, Patrick P. F.
    Hui, Lucas C. K.
    Yiu, S. M.
    2011 35TH IEEE ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), 2011, : 407 - 412
  • [2] Operand Stack Dependence Based Java']Java Static Software Birthmark
    Wang, Yong
    Liu, Fenlin
    Zhao, Zheng
    Lu, Bin
    Xie, Xin
    2013 10TH INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY (FSKD), 2013, : 1090 - 1095
  • [3] Visualizing the Java']Java Heap to Detect Memory Problems
    Reiss, Steven P.
    2009 5TH IEEE INTERNATIONAL WORKSHOP ON VISUALIZING SOFTWARE FOR UNDERSTANDING AND ANALYSIS, 2009, : 73 - 80
  • [4] Heap Space Analysis for Java']Java Bytecode
    Albert, Elvira
    Genaim, Samir
    Gomez-Zamalloa, Miguel
    ISMM'07: PROCEEDINGS OF THE 2007 INTERNATIONAL SYMPOSIUM ON MEMORY MANAGEMENT, 2007, : 105 - +
  • [5] Heap compression for memory-constrained Java']Java environments
    Chen, G
    Kandemir, M
    Vijaykrishnan, N
    Irwin, MJ
    Mathiske, B
    Wolczko, M
    ACM SIGPLAN NOTICES, 2003, 38 (11) : 282 - 301
  • [6] A static Java']Java birthmark based on operand stack behaviors
    Park, Heewan
    Lim, Hyun-il
    Choi, Seokwoo
    Han, Taisook
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 133 - 136
  • [7] A STATIC SOFTWARE BIRTHMARK BASED ON USE-DEFINE CHAINS FOR DETECTING THE THEFT OF JAVA']JAVA PROGRAMS
    Xie, Xin
    Liu, Fenlin
    Lu, Bin
    Zhao, Tao
    Li, Hanning
    SECRYPT 2011: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2011, : 231 - 237
  • [8] A Static Java']Java Birthmark Based on Control Flow Edges
    Lim, Hyun-il
    Park, Heewan
    Choi, Seokwoo
    Han, Taisook
    2009 IEEE 33RD INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOLS 1 AND 2, 2009, : 413 - 420
  • [9] Quantitative dynamic-memory analysis for Java']Java
    Garbervetsky, Diego
    Yovine, Sergio
    Braberman, Victor
    Rouaux, Martin
    Taboada, Alejandro
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2011, 23 (14): : 1665 - 1678
  • [10] Detecting Java']Java Theft Based on Static API Trace Birthmark
    Park, Heewan
    Choi, Seokwoo
    Lim, Hyun-il
    Han, Taisook
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 2008, 5312 : 121 - 135