Proceedings of the 16th ACM Conference on Computer and Communications Security 2009
DOI: 10.1145/1653662.1653696
|View full text |Cite
|
Sign up to set email alerts
|

Behavior based software theft detection

Abstract: Along with the burst of open source projects, software theft (or plagiarism) has become a very serious threat to the healthiness of software industry. Software birthmark, which represents the unique characteristics of a program, can be used for software theft detection. We propose a system call dependence graph based software birthmark called SCDG birthmark, and examine how well it reflects unique behavioral characteristics of a program. To our knowledge, our detection system based on SCDG birthmark is the fir… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
65
0

Year Published

2011
2011
2024
2024

Publication Types

Select...
5
2
2

Relationship

2
7

Authors

Journals

citations
Cited by 82 publications
(65 citation statements)
references
References 24 publications
0
65
0
Order By: Relevance
“…For example, attackers may simply embed some of API implementations into their program so that fewer API calls will be observed. Wang et al [38] proposed a system call based birthmark, addressing the problems with API based techniques. However, the proposed technique cannot be applied to computation oriented softwares containing few system calls, and is sill vulnerable to injecting transparent system calls in the middle of an edge on the system call dependence graph.…”
Section: State Of the Artmentioning
confidence: 99%
“…For example, attackers may simply embed some of API implementations into their program so that fewer API calls will be observed. Wang et al [38] proposed a system call based birthmark, addressing the problems with API based techniques. However, the proposed technique cannot be applied to computation oriented softwares containing few system calls, and is sill vulnerable to injecting transparent system calls in the middle of an edge on the system call dependence graph.…”
Section: State Of the Artmentioning
confidence: 99%
“…Wang et al [11] proposed a system call dependency graph birthmark software theft detection system. Software birthmarks have been defined as unique characteristics that a program possesses and can be used to identify the program without the need for source code, a dynamic analysis tool is used in [19] to generate system call trace and SCDGS to detect software component theft.…”
Section: Related Workmentioning
confidence: 99%
“…Software birthmarks have been defined as unique characteristics that a program possesses and can be used to identify the program. Without the need for source code, a dynamic analysis tool is used in [18] to generate system call trace and SCDGs to detect software component theft.…”
Section: Related Workmentioning
confidence: 99%