2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing 2013
DOI: 10.1109/imis.2013.159
|View full text |Cite
|
Sign up to set email alerts
|

A Static Birthmark for MS Windows Applications Using Import Address Table

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 15 publications
(8 citation statements)
references
References 3 publications
0
8
0
Order By: Relevance
“…A static birthmark is extracted from the information stored in an executable file. Choi [46] developed a statistical method by calculating the distribution of IAT and imported DLL names as a birthmark for program identification. The k-gram birthmark [47] divides n instructions into sequences of length k and uses them as the birthmark [48].…”
Section: B Binary Code Similaritymentioning
confidence: 99%
See 1 more Smart Citation
“…A static birthmark is extracted from the information stored in an executable file. Choi [46] developed a statistical method by calculating the distribution of IAT and imported DLL names as a birthmark for program identification. The k-gram birthmark [47] divides n instructions into sequences of length k and uses them as the birthmark [48].…”
Section: B Binary Code Similaritymentioning
confidence: 99%
“…To support dynamic address mapping, both IAT and EAT map the code bodies of functions into a lookup table with their addresses and function names. Although the code addresses of these functions may change for newly compiled executable files, their function names usually remain unchanged throughout different versions [46]. Therefore, we collect historical IATs and EATs from crossversion executable files to generate software birthmarks because of their consistency and commonality in executable files.…”
Section: Idea and Frameworkmentioning
confidence: 99%
“…In [3], many analytical techniques have been proposed regarding software development to detect software piracy. Software badge is a unique feature that can be used to identify the application.…”
Section: Related Workmentioning
confidence: 99%
“…As another technique, many software birthmarking techniques [7,8,9,10,11] have been proposed for detecting software theft, piracy, or plagiarism. A software birthmark is an inherent characteristic that a program uniquely possesses, which can be used to identify the program.…”
Section: Background and Related Workmentioning
confidence: 99%
“…In this paper, we propose a novel software asset management technique based on software birthmark, which can reduce software piracy, enhance operational performance, and avoid unnecessary legal, financial, and security risks. A software birthmark is a unique characteristic, or the invariable features, that a program possesses and which can be used to identify each program [7,8,9,10,11]. The general idea is that if two programs both have the same birthmark, then it is highly likely that one is a copy of the other.…”
Section: Introductionmentioning
confidence: 99%