Software Birthmark Design and Estimation: A Systematic Literature Review

被引:0
|
作者
Shah Nazir
Sara Shahzad
Neelam Mukhtar
机构
[1] University of Swabi,Department of Computer Science
[2] University of Peshawar,Department of Computer Science
关键词
Systematic literature review; Software birthmark; Software similarity; Birthmark estimation;
D O I
暂无
中图分类号
学科分类号
摘要
The concept of software birthmark is developed for the detection of theft and piracy in software applications. The originality of software can be evaluated by comparing software programs on the basis of their birthmarks. A number of birthmark designs have been proposed which are used to specify birthmark for source code and executable code related to particular programming languages. This study presents a systematic literature review on available software birthmark designs and related techniques for comparing birthmarks in order to identify pirated software. This research is focused on identifying different applications of software birthmark, especially the estimation of software birthmark to identify the extent of piracy performed in a software. The objective is to gain insight into complex details of software birthmark by accumulating and analyzing the knowledge provided in the literature in order to facilitate further research in software birthmark and its applications. The study is conducted by following the systematic literature review protocol. The data are collected from primary studies published from 1992 to April 2018 in specified journals and conference/workshop proceedings. A total of 143 primary studies are selected, based on predefined exclusion, inclusion, and quality criteria. The research identifies 22 software birthmark techniques frequently used and discussed by researchers and industry. The study also identifies a number of important applications of software birthmarks. These applications define the use of software birthmark in software theft and plagiarism detection, intellectual software asset management, detecting binary theft, malware detection, detecting the theft of natural language, and semantics-based repackaging detection for mobile apps. The results show that despite the large-scale research and development of different birthmark techniques, there is a lack of organized knowledge which is needed to facilitate the usage of software birthmark for critical applications like clone detection and malware detection. Furthermore, it is seen that the area of software birthmark estimation is not well researched which needs to be explored further. The study recommends that the area of software birthmark needs to be explored for developing a reliable and authentic mechanism which can accurately and easily detect software theft and ultimately prevent the piracy of software.
引用
收藏
页码:3905 / 3927
页数:22
相关论文
共 50 条
  • [1] Software Birthmark Design and Estimation: A Systematic Literature Review
    Nazir, Shah
    Shahzad, Sara
    Mukhtar, Neelam
    [J]. ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2019, 44 (04) : 3905 - 3927
  • [2] Regression in Estimation of Software Attributes: A Systematic Literature Review
    Gonzalez-Hernandez, Saarayim
    Sanchez-Garcia, Angel J.
    Cortes-Verdin, Karen
    Carlos Perez-Arriaga, Juan
    [J]. 2021 9TH INTERNATIONAL CONFERENCE IN SOFTWARE ENGINEERING RESEARCH AND INNOVATION (CONISOFT 2021), 2021, : 54 - 60
  • [3] Estimation of software features based birthmark
    Shah Nazir
    Sara Shahzad
    Rodziah Binti Atan
    Haleem Farman
    [J]. Cluster Computing, 2018, 21 : 333 - 346
  • [4] Estimation of software features based birthmark
    Nazir, Shah
    Shahzad, Sara
    Atan, Rodziah Binti
    Farman, Haleem
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2018, 21 (01): : 333 - 346
  • [5] Privacy by Design and Software Engineering a Systematic Literature Review
    Andrade, Vinicius Camargo
    Gomes, Rhodrigo Deda
    Reinehr, Sheila
    Freitas, Cinthia Obladen de A.
    Malucelli, Andreia
    [J]. PROCEEDINGS OF THE 21TH BRAZILIAN SYMPOSIUM ON SOFTWARE QUALITY, SBOS 2022, 2022,
  • [6] Design notations for secure software: a systematic literature review
    van den Berghe, Alexander
    Scandariato, Riccardo
    Yskout, Koen
    Joosen, Wouter
    [J]. SOFTWARE AND SYSTEMS MODELING, 2017, 16 (03): : 809 - 831
  • [7] Design notations for secure software: a systematic literature review
    Alexander van den Berghe
    Riccardo Scandariato
    Koen Yskout
    Wouter Joosen
    [J]. Software & Systems Modeling, 2017, 16 : 809 - 831
  • [8] Effort Estimation in Global Software Development: A Systematic Literature Review
    Britto, Ricardo
    Freitas, Vitor
    Mendes, Emilia
    Usman, Muhammad
    [J]. 2014 IEEE 9TH INTERNATIONAL CONFERENCE ON GLOBAL SOFTWARE ENGINEERING (ICGSE), 2014, : 135 - 144
  • [9] Impact of design patterns on software quality: a systematic literature review
    Wedyan, Fadi
    Abufakher, Somia
    [J]. IET SOFTWARE, 2020, 14 (01) : 1 - 17
  • [10] Software design pattern selection approaches: A systematic literature review
    Naghdipour, Ameneh
    Hasheminejad, Seyed Mohammad Hossein
    Barmaki, Roghayeh Leila
    [J]. SOFTWARE-PRACTICE & EXPERIENCE, 2023, 53 (04): : 1091 - 1122