Dynamic Software Birthmark for Java Based on Heap Memory Analysis

Uloženo v:
Podrobná bibliografie
Název: Dynamic Software Birthmark for Java Based on Heap Memory Analysis
Autoři: Chan, Patrick, Hui, Lucas, Yiu, S., M.
Přispěvatelé: The University of Hong Kong (HKU), Bart Decker, Jorn Lapon, Vincent Naessens, Andreas Uhl, TC 6, TC 11
Zdroj: Lecture Notes in Computer Science ; 12th Communications and Multimedia Security (CMS) ; https://inria.hal.science/hal-01596200 ; 12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.94-107, ⟨10.1007/978-3-642-24712-5_8⟩
Informace o vydavateli: CCSD
Springer
Rok vydání: 2011
Témata: software birthmark, software protection, code theft detection, Java, [INFO]Computer Science [cs], [INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]
Geografické téma: Ghent, Belgium
Popis: Part 1: Research Papers ; International audience ; Code theft has been a serious threat to the survival of the software industry. A dynamic software birthmark can help detect code theft by comparing the intrinsic characteristics of two programs extracted during their execution. We propose a dynamic birthmark system for Java based on the object reference graph. To the best of our knowledge, it is the first dynamic software birthmark making use of the heap memory. We evaluated our birthmark using 25 large-scale programs with most of them of tens of megabytes in size. Our results show that it is effective in detecting partial code theft. No false positive or false negative were found. More importantly, the birthmark remained intact even after the testing programs were obfuscated by the state-of-the-art Allatori obfuscator. These promising results reflect that our birthmark is ready for practical use.
Druh dokumentu: conference object
Jazyk: English
DOI: 10.1007/978-3-642-24712-5_8
Dostupnost: https://inria.hal.science/hal-01596200
https://inria.hal.science/hal-01596200v1/document
https://inria.hal.science/hal-01596200v1/file/978-3-642-24712-5_8_Chapter.pdf
https://doi.org/10.1007/978-3-642-24712-5_8
Rights: http://creativecommons.org/licenses/by/ ; info:eu-repo/semantics/OpenAccess
Přístupové číslo: edsbas.D4D7DD42
Databáze: BASE
FullText Text:
  Availability: 0
CustomLinks:
  – Url: https://inria.hal.science/hal-01596200#
    Name: EDS - BASE (s4221598)
    Category: fullText
    Text: View record from BASE
  – Url: https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=EBSCO&SrcAuth=EBSCO&DestApp=WOS&ServiceName=TransferToWoS&DestLinkType=GeneralSearchSummary&Func=Links&author=Chan%20P
    Name: ISI
    Category: fullText
    Text: Nájsť tento článok vo Web of Science
    Icon: https://imagesrvr.epnet.com/ls/20docs.gif
    MouseOverText: Nájsť tento článok vo Web of Science
Header DbId: edsbas
DbLabel: BASE
An: edsbas.D4D7DD42
RelevancyScore: 858
AccessLevel: 3
PubType: Conference
PubTypeId: conference
PreciseRelevancyScore: 857.654235839844
IllustrationInfo
Items – Name: Title
  Label: Title
  Group: Ti
  Data: Dynamic Software Birthmark for Java Based on Heap Memory Analysis
– Name: Author
  Label: Authors
  Group: Au
  Data: <searchLink fieldCode="AR" term="%22Chan%2C+Patrick%22">Chan, Patrick</searchLink><br /><searchLink fieldCode="AR" term="%22Hui%2C+Lucas%22">Hui, Lucas</searchLink><br /><searchLink fieldCode="AR" term="%22Yiu%2C+S%2E%2C+M%2E%22">Yiu, S., M.</searchLink>
– Name: Author
  Label: Contributors
  Group: Au
  Data: The University of Hong Kong (HKU)<br />Bart Decker<br />Jorn Lapon<br />Vincent Naessens<br />Andreas Uhl<br />TC 6<br />TC 11
– Name: TitleSource
  Label: Source
  Group: Src
  Data: Lecture Notes in Computer Science ; 12th Communications and Multimedia Security (CMS) ; https://inria.hal.science/hal-01596200 ; 12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.94-107, ⟨10.1007/978-3-642-24712-5_8⟩
– Name: Publisher
  Label: Publisher Information
  Group: PubInfo
  Data: CCSD<br />Springer
– Name: DatePubCY
  Label: Publication Year
  Group: Date
  Data: 2011
– Name: Subject
  Label: Subject Terms
  Group: Su
  Data: <searchLink fieldCode="DE" term="%22software+birthmark%22">software birthmark</searchLink><br /><searchLink fieldCode="DE" term="%22software+protection%22">software protection</searchLink><br /><searchLink fieldCode="DE" term="%22code+theft+detection%22">code theft detection</searchLink><br /><searchLink fieldCode="DE" term="%22Java%22">Java</searchLink><br /><searchLink fieldCode="DE" term="%22[INFO]Computer+Science+[cs]%22">[INFO]Computer Science [cs]</searchLink><br /><searchLink fieldCode="DE" term="%22[INFO%2EINFO-NI]Computer+Science+[cs]%2FNetworking+and+Internet+Architecture+[cs%2ENI]%22">[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]</searchLink>
– Name: Subject
  Label: Subject Geographic
  Group: Su
  Data: <searchLink fieldCode="DE" term="%22Ghent%22">Ghent</searchLink><br /><searchLink fieldCode="DE" term="%22Belgium%22">Belgium</searchLink>
– Name: Abstract
  Label: Description
  Group: Ab
  Data: Part 1: Research Papers ; International audience ; Code theft has been a serious threat to the survival of the software industry. A dynamic software birthmark can help detect code theft by comparing the intrinsic characteristics of two programs extracted during their execution. We propose a dynamic birthmark system for Java based on the object reference graph. To the best of our knowledge, it is the first dynamic software birthmark making use of the heap memory. We evaluated our birthmark using 25 large-scale programs with most of them of tens of megabytes in size. Our results show that it is effective in detecting partial code theft. No false positive or false negative were found. More importantly, the birthmark remained intact even after the testing programs were obfuscated by the state-of-the-art Allatori obfuscator. These promising results reflect that our birthmark is ready for practical use.
– Name: TypeDocument
  Label: Document Type
  Group: TypDoc
  Data: conference object
– Name: Language
  Label: Language
  Group: Lang
  Data: English
– Name: DOI
  Label: DOI
  Group: ID
  Data: 10.1007/978-3-642-24712-5_8
– Name: URL
  Label: Availability
  Group: URL
  Data: https://inria.hal.science/hal-01596200<br />https://inria.hal.science/hal-01596200v1/document<br />https://inria.hal.science/hal-01596200v1/file/978-3-642-24712-5_8_Chapter.pdf<br />https://doi.org/10.1007/978-3-642-24712-5_8
– Name: Copyright
  Label: Rights
  Group: Cpyrght
  Data: http://creativecommons.org/licenses/by/ ; info:eu-repo/semantics/OpenAccess
– Name: AN
  Label: Accession Number
  Group: ID
  Data: edsbas.D4D7DD42
PLink https://erproxy.cvtisr.sk/sfx/access?url=https://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=edsbas&AN=edsbas.D4D7DD42
RecordInfo BibRecord:
  BibEntity:
    Identifiers:
      – Type: doi
        Value: 10.1007/978-3-642-24712-5_8
    Languages:
      – Text: English
    Subjects:
      – SubjectFull: Ghent
        Type: general
      – SubjectFull: Belgium
        Type: general
      – SubjectFull: software birthmark
        Type: general
      – SubjectFull: software protection
        Type: general
      – SubjectFull: code theft detection
        Type: general
      – SubjectFull: Java
        Type: general
      – SubjectFull: [INFO]Computer Science [cs]
        Type: general
      – SubjectFull: [INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]
        Type: general
    Titles:
      – TitleFull: Dynamic Software Birthmark for Java Based on Heap Memory Analysis
        Type: main
  BibRelationships:
    HasContributorRelationships:
      – PersonEntity:
          Name:
            NameFull: Chan, Patrick
      – PersonEntity:
          Name:
            NameFull: Hui, Lucas
      – PersonEntity:
          Name:
            NameFull: Yiu, S., M.
      – PersonEntity:
          Name:
            NameFull: The University of Hong Kong (HKU)
      – PersonEntity:
          Name:
            NameFull: Bart Decker
      – PersonEntity:
          Name:
            NameFull: Jorn Lapon
      – PersonEntity:
          Name:
            NameFull: Vincent Naessens
      – PersonEntity:
          Name:
            NameFull: Andreas Uhl
      – PersonEntity:
          Name:
            NameFull: TC 6
      – PersonEntity:
          Name:
            NameFull: TC 11
    IsPartOfRelationships:
      – BibEntity:
          Dates:
            – D: 01
              M: 01
              Type: published
              Y: 2011
          Identifiers:
            – Type: issn-locals
              Value: edsbas
            – Type: issn-locals
              Value: edsbas.oa
          Titles:
            – TitleFull: Lecture Notes in Computer Science ; 12th Communications and Multimedia Security (CMS) ; https://inria.hal.science/hal-01596200 ; 12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.94-107, ⟨10.1007/978-3-642-24712-5_8⟩
              Type: main
ResultId 1