Dynamic Software Birthmark for Java Based on Heap Memory Analysis
Uloženo v:
| Název: | Dynamic Software Birthmark for Java Based on Heap Memory Analysis |
|---|---|
| Autoři: | Chan, Patrick, Hui, Lucas, Yiu, S., M. |
| Přispěvatelé: | The University of Hong Kong (HKU), Bart Decker, Jorn Lapon, Vincent Naessens, Andreas Uhl, TC 6, TC 11 |
| Zdroj: | Lecture Notes in Computer Science ; 12th Communications and Multimedia Security (CMS) ; https://inria.hal.science/hal-01596200 ; 12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.94-107, ⟨10.1007/978-3-642-24712-5_8⟩ |
| Informace o vydavateli: | CCSD Springer |
| Rok vydání: | 2011 |
| Témata: | software birthmark, software protection, code theft detection, Java, [INFO]Computer Science [cs], [INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI] |
| Geografické téma: | Ghent, Belgium |
| Popis: | Part 1: Research Papers ; International audience ; Code theft has been a serious threat to the survival of the software industry. A dynamic software birthmark can help detect code theft by comparing the intrinsic characteristics of two programs extracted during their execution. We propose a dynamic birthmark system for Java based on the object reference graph. To the best of our knowledge, it is the first dynamic software birthmark making use of the heap memory. We evaluated our birthmark using 25 large-scale programs with most of them of tens of megabytes in size. Our results show that it is effective in detecting partial code theft. No false positive or false negative were found. More importantly, the birthmark remained intact even after the testing programs were obfuscated by the state-of-the-art Allatori obfuscator. These promising results reflect that our birthmark is ready for practical use. |
| Druh dokumentu: | conference object |
| Jazyk: | English |
| DOI: | 10.1007/978-3-642-24712-5_8 |
| Dostupnost: | https://inria.hal.science/hal-01596200 https://inria.hal.science/hal-01596200v1/document https://inria.hal.science/hal-01596200v1/file/978-3-642-24712-5_8_Chapter.pdf https://doi.org/10.1007/978-3-642-24712-5_8 |
| Rights: | http://creativecommons.org/licenses/by/ ; info:eu-repo/semantics/OpenAccess |
| Přístupové číslo: | edsbas.D4D7DD42 |
| Databáze: | BASE |
| FullText | Text: Availability: 0 CustomLinks: – Url: https://inria.hal.science/hal-01596200# Name: EDS - BASE (s4221598) Category: fullText Text: View record from BASE – Url: https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=EBSCO&SrcAuth=EBSCO&DestApp=WOS&ServiceName=TransferToWoS&DestLinkType=GeneralSearchSummary&Func=Links&author=Chan%20P Name: ISI Category: fullText Text: Nájsť tento článok vo Web of Science Icon: https://imagesrvr.epnet.com/ls/20docs.gif MouseOverText: Nájsť tento článok vo Web of Science |
|---|---|
| Header | DbId: edsbas DbLabel: BASE An: edsbas.D4D7DD42 RelevancyScore: 858 AccessLevel: 3 PubType: Conference PubTypeId: conference PreciseRelevancyScore: 857.654235839844 |
| IllustrationInfo | |
| Items | – Name: Title Label: Title Group: Ti Data: Dynamic Software Birthmark for Java Based on Heap Memory Analysis – Name: Author Label: Authors Group: Au Data: <searchLink fieldCode="AR" term="%22Chan%2C+Patrick%22">Chan, Patrick</searchLink><br /><searchLink fieldCode="AR" term="%22Hui%2C+Lucas%22">Hui, Lucas</searchLink><br /><searchLink fieldCode="AR" term="%22Yiu%2C+S%2E%2C+M%2E%22">Yiu, S., M.</searchLink> – Name: Author Label: Contributors Group: Au Data: The University of Hong Kong (HKU)<br />Bart Decker<br />Jorn Lapon<br />Vincent Naessens<br />Andreas Uhl<br />TC 6<br />TC 11 – Name: TitleSource Label: Source Group: Src Data: Lecture Notes in Computer Science ; 12th Communications and Multimedia Security (CMS) ; https://inria.hal.science/hal-01596200 ; 12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.94-107, ⟨10.1007/978-3-642-24712-5_8⟩ – Name: Publisher Label: Publisher Information Group: PubInfo Data: CCSD<br />Springer – Name: DatePubCY Label: Publication Year Group: Date Data: 2011 – Name: Subject Label: Subject Terms Group: Su Data: <searchLink fieldCode="DE" term="%22software+birthmark%22">software birthmark</searchLink><br /><searchLink fieldCode="DE" term="%22software+protection%22">software protection</searchLink><br /><searchLink fieldCode="DE" term="%22code+theft+detection%22">code theft detection</searchLink><br /><searchLink fieldCode="DE" term="%22Java%22">Java</searchLink><br /><searchLink fieldCode="DE" term="%22[INFO]Computer+Science+[cs]%22">[INFO]Computer Science [cs]</searchLink><br /><searchLink fieldCode="DE" term="%22[INFO%2EINFO-NI]Computer+Science+[cs]%2FNetworking+and+Internet+Architecture+[cs%2ENI]%22">[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]</searchLink> – Name: Subject Label: Subject Geographic Group: Su Data: <searchLink fieldCode="DE" term="%22Ghent%22">Ghent</searchLink><br /><searchLink fieldCode="DE" term="%22Belgium%22">Belgium</searchLink> – Name: Abstract Label: Description Group: Ab Data: Part 1: Research Papers ; International audience ; Code theft has been a serious threat to the survival of the software industry. A dynamic software birthmark can help detect code theft by comparing the intrinsic characteristics of two programs extracted during their execution. We propose a dynamic birthmark system for Java based on the object reference graph. To the best of our knowledge, it is the first dynamic software birthmark making use of the heap memory. We evaluated our birthmark using 25 large-scale programs with most of them of tens of megabytes in size. Our results show that it is effective in detecting partial code theft. No false positive or false negative were found. More importantly, the birthmark remained intact even after the testing programs were obfuscated by the state-of-the-art Allatori obfuscator. These promising results reflect that our birthmark is ready for practical use. – Name: TypeDocument Label: Document Type Group: TypDoc Data: conference object – Name: Language Label: Language Group: Lang Data: English – Name: DOI Label: DOI Group: ID Data: 10.1007/978-3-642-24712-5_8 – Name: URL Label: Availability Group: URL Data: https://inria.hal.science/hal-01596200<br />https://inria.hal.science/hal-01596200v1/document<br />https://inria.hal.science/hal-01596200v1/file/978-3-642-24712-5_8_Chapter.pdf<br />https://doi.org/10.1007/978-3-642-24712-5_8 – Name: Copyright Label: Rights Group: Cpyrght Data: http://creativecommons.org/licenses/by/ ; info:eu-repo/semantics/OpenAccess – Name: AN Label: Accession Number Group: ID Data: edsbas.D4D7DD42 |
| PLink | https://erproxy.cvtisr.sk/sfx/access?url=https://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=edsbas&AN=edsbas.D4D7DD42 |
| RecordInfo | BibRecord: BibEntity: Identifiers: – Type: doi Value: 10.1007/978-3-642-24712-5_8 Languages: – Text: English Subjects: – SubjectFull: Ghent Type: general – SubjectFull: Belgium Type: general – SubjectFull: software birthmark Type: general – SubjectFull: software protection Type: general – SubjectFull: code theft detection Type: general – SubjectFull: Java Type: general – SubjectFull: [INFO]Computer Science [cs] Type: general – SubjectFull: [INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI] Type: general Titles: – TitleFull: Dynamic Software Birthmark for Java Based on Heap Memory Analysis Type: main BibRelationships: HasContributorRelationships: – PersonEntity: Name: NameFull: Chan, Patrick – PersonEntity: Name: NameFull: Hui, Lucas – PersonEntity: Name: NameFull: Yiu, S., M. – PersonEntity: Name: NameFull: The University of Hong Kong (HKU) – PersonEntity: Name: NameFull: Bart Decker – PersonEntity: Name: NameFull: Jorn Lapon – PersonEntity: Name: NameFull: Vincent Naessens – PersonEntity: Name: NameFull: Andreas Uhl – PersonEntity: Name: NameFull: TC 6 – PersonEntity: Name: NameFull: TC 11 IsPartOfRelationships: – BibEntity: Dates: – D: 01 M: 01 Type: published Y: 2011 Identifiers: – Type: issn-locals Value: edsbas – Type: issn-locals Value: edsbas.oa Titles: – TitleFull: Lecture Notes in Computer Science ; 12th Communications and Multimedia Security (CMS) ; https://inria.hal.science/hal-01596200 ; 12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.94-107, ⟨10.1007/978-3-642-24712-5_8⟩ Type: main |
| ResultId | 1 |
Nájsť tento článok vo Web of Science