Heap Graph Based Software Theft Detection

As JavaScript is becoming more and more popular, JavaScript programs are valuable assets to many companies. However, the source code of JavaScript programs can be easily obtained and plagiarism of JavaScript programs is a serious threat to the industry. There are techniques like code obfuscation and...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on information forensics and security Jg. 8; H. 1; S. 101 - 110
Hauptverfasser: Chan, P. P. F., Hui, L. C. K., Yiu, S. M.
Format: Journal Article
Sprache:Englisch
Veröffentlicht: New York, NY IEEE 01.01.2013
Institute of Electrical and Electronics Engineers
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Schlagworte:
ISSN:1556-6013, 1556-6021
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Abstract As JavaScript is becoming more and more popular, JavaScript programs are valuable assets to many companies. However, the source code of JavaScript programs can be easily obtained and plagiarism of JavaScript programs is a serious threat to the industry. There are techniques like code obfuscation and watermarking which can make the source code of a program difficult to understand by humans and prove the ownership of the program. However, code obfuscation cannot avoid the source code being copied and a watermark can be defaced. In this paper, we use a relatively new technique, software birthmark, to help detect code theft of JavaScript programs. A birthmark is a unique characteristic a program possesses that can be used to identify the program. We extend two recent birthmark systems that extract the birthmark of a software from the run-time heap. We propose a redesigned system with improved robustness and performed extensive experiments to justify the effectiveness and robustness of it. Our evaluation based on 200 large-scale websites showed that our birthmark system exhibits 100% accuracy. We remark that it is solid and ready for practical use.
AbstractList As JavaScript is becoming more and more popular, JavaScript programs are valuable assets to many companies. However, the source code of JavaScript programs can be easily obtained and plagiarism of JavaScript programs is a serious threat to the industry. There are techniques like code obfuscation and watermarking which can make the source code of a program difficult to understand by humans and prove the ownership of the program. However, code obfuscation cannot avoid the source code being copied and a watermark can be defaced. In this paper, we use a relatively new technique, software birthmark, to help detect code theft of JavaScript programs. A birthmark is a unique characteristic a program possesses that can be used to identify the program. We extend two recent birthmark systems that extract the birthmark of a software from the run-time heap. We propose a redesigned system with improved robustness and performed extensive experiments to justify the effectiveness and robustness of it. Our evaluation based on 200 large-scale websites showed that our birthmark system exhibits 100% accuracy. We remark that it is solid and ready for practical use.
Author Chan, P. P. F.
Yiu, S. M.
Hui, L. C. K.
Author_xml – sequence: 1
  givenname: P. P. F.
  surname: Chan
  fullname: Chan, P. P. F.
  email: pfchan@cs.hku.hk
  organization: Dept. of Comput. Sci., Univ. of Hong Kong, Hong Kong, China
– sequence: 2
  givenname: L. C. K.
  surname: Hui
  fullname: Hui, L. C. K.
  email: hui@cs.hku.hk
  organization: Dept. of Comput. Sci., Univ. of Hong Kong, Hong Kong, China
– sequence: 3
  givenname: S. M.
  surname: Yiu
  fullname: Yiu, S. M.
  email: smyiu@cs.hku.hk
  organization: Dept. of Comput. Sci., Univ. of Hong Kong, Hong Kong, China
BackLink http://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=27109864$$DView record in Pascal Francis
BookMark eNqFkU1Lw0AQhhepoFZ_gHgJiKCH1p2dzWZ71PpVKHhoPS_jdoKRNKm7KeK_N6G1Bw96mjk873y875HoVXXFQpyCHALI0fV88jAbKglqqJRCY9M9cQhpagZGKujtesADcRTju5Rag7GH4uqJaZU8Blq9JbcUeZHM6rz5pMDJ_I3zJrnjhn1T1NWx2M-pjHyyrX3x8nA_Hz8Nps-Pk_HNdODRjpqBZ7mQylqvX32Wm4zsqzQjQ4hWAxKy0ow2TxcarfcZWCBeyBQz7xWSldgXl5u5q1B_rDk2bllEz2VJFdfr6MBkkIJRevQ_iiYFbDdji57_Qt_rdajaRxwoY1KTaeyoiy1F0VOZB6p8Ed0qFEsKX05lrdXW6JbLNpwPdYyBc-eLhjqXmkBF6UC6LhXXpeK6VNw2lVYJv5Q_w__SnG00BTPveIPKtgfhN0TslaQ
CODEN ITIFA6
CitedBy_id crossref_primary_10_1007_s13369_016_2371_4
crossref_primary_10_1016_j_ipm_2021_102518
crossref_primary_10_1016_j_procs_2015_02_143
crossref_primary_10_1109_ACCESS_2021_3069367
crossref_primary_10_4018_IJSI_2017070107
crossref_primary_10_1109_TSE_2015_2454508
crossref_primary_10_1109_TSE_2017_2688383
crossref_primary_10_1007_s00500_016_2357_x
crossref_primary_10_1109_ACCESS_2017_2706943
crossref_primary_10_1016_j_jss_2016_06_014
Cites_doi 10.1145/1653662.1653696
10.1145/996841.996856
10.1109/COMPSAC.2011.60
10.1145/1321631.1321672
10.1007/978-3-642-24712-5_8
10.1145/947397.947399
10.1145/292540.292569
10.1145/1066677.1066753
10.1109/ICIAP.1999.797762
ContentType Journal Article
Copyright 2014 INIST-CNRS
Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Jan 2013
Copyright_xml – notice: 2014 INIST-CNRS
– notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Jan 2013
DBID 97E
RIA
RIE
AAYXX
CITATION
IQODW
7SC
7SP
7TB
8FD
FR3
JQ2
KR7
L7M
L~C
L~D
F28
DOI 10.1109/TIFS.2012.2223685
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005–Present
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Xplore
CrossRef
Pascal-Francis
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Mechanical & Transportation Engineering Abstracts
Technology Research Database
Engineering Research Database
ProQuest Computer Science Collection
Civil Engineering Abstracts
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
ANTE: Abstracts in New Technology & Engineering
DatabaseTitle CrossRef
Civil Engineering Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Mechanical & Transportation Engineering Abstracts
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Engineering Research Database
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
ANTE: Abstracts in New Technology & Engineering
DatabaseTitleList Civil Engineering Abstracts
Civil Engineering Abstracts

Civil Engineering Abstracts
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Computer Science
Applied Sciences
EISSN 1556-6021
EndPage 110
ExternalDocumentID 2858069201
27109864
10_1109_TIFS_2012_2223685
6328271
Genre orig-research
GroupedDBID 0R~
29I
4.4
5GY
5VS
6IK
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABQJQ
ABVLG
ACGFS
ACIWK
AENEX
AETIX
AGQYO
AGSQL
AHBIQ
AKJIK
AKQYR
ALMA_UNASSIGNED_HOLDINGS
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CS3
DU5
EBS
EJD
HZ~
IFIPE
IPLJI
JAVBF
LAI
M43
O9-
OCL
P2P
PQQKQ
RIA
RIE
RNS
AAYXX
CITATION
IQODW
RIG
7SC
7SP
7TB
8FD
FR3
JQ2
KR7
L7M
L~C
L~D
F28
ID FETCH-LOGICAL-c389t-ce0d0288c4bc7f67a8b0696a338413a3e24e38f5d438cc7181aed0537cc23a803
IEDL.DBID RIE
ISICitedReferencesCount 22
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000318595000009&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1556-6013
IngestDate Thu Oct 02 08:23:37 EDT 2025
Sun Sep 28 07:08:44 EDT 2025
Sun Nov 30 04:53:12 EST 2025
Wed Apr 02 07:49:42 EDT 2025
Sat Nov 29 03:49:34 EST 2025
Tue Nov 18 21:18:39 EST 2025
Tue Aug 26 17:09:09 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 1
Keywords Code generation
software protection
JAVA language
Evaluation scale
Scripting language
Program transformation
heap graph
Theft prevention
Stéganography
Graph theory
Copyright
Partially ordered set
Plagiarism
Efficiency
Intellectual property
Object oriented
Robustness
Large scale
Web site
software birthmark
Computer security
Digital watermarking
Software engineering
Code theft detection
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
CC BY 4.0
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c389t-ce0d0288c4bc7f67a8b0696a338413a3e24e38f5d438cc7181aed0537cc23a803
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ObjectType-Article-2
ObjectType-Feature-1
content type line 23
PQID 1266567433
PQPubID 23500
PageCount 10
ParticipantIDs proquest_journals_1266567433
pascalfrancis_primary_27109864
proquest_miscellaneous_1671516249
crossref_citationtrail_10_1109_TIFS_2012_2223685
crossref_primary_10_1109_TIFS_2012_2223685
proquest_miscellaneous_1365133383
ieee_primary_6328271
PublicationCentury 2000
PublicationDate 2013-Jan.
2013-01-00
2013
20130101
PublicationDateYYYYMMDD 2013-01-01
PublicationDate_xml – month: 01
  year: 2013
  text: 2013-Jan.
PublicationDecade 2010
PublicationPlace New York, NY
PublicationPlace_xml – name: New York, NY
– name: New York
PublicationTitle IEEE transactions on information forensics and security
PublicationTitleAbbrev TIFS
PublicationYear 2013
Publisher IEEE
Institute of Electrical and Electronics Engineers
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: Institute of Electrical and Electronics Engineers
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References tamada (ref11) 2004
(ref18) 0
ref24
ref12
ref23
ref15
(ref20) 0
ref14
myles (ref7) 2004
tamada (ref10) 2004
tamada (ref9) 2007
ref2
data (ref1) 2008
collberg (ref5) 1997
(ref19) 0
ref8
team (ref16) 0
tamada (ref13) 2003
ref4
ref6
monden (ref3) 1999
(ref22) 0
(ref21) 0
proietti (ref17) 0
References_xml – year: 2004
  ident: ref11
  article-title: Dynamic software birthmarks to detect the theft of windows applications
  publication-title: Proc Int l Symp Future Software Technology
– year: 0
  ident: ref17
  publication-title: Mootools JavaScript Framework
– ident: ref6
  doi: 10.1145/1653662.1653696
– year: 0
  ident: ref16
  publication-title: Prototype JavaScript framework
– start-page: 569
  year: 2004
  ident: ref10
  article-title: Design and evaluation of birthmarks for detecting theft of java programs
  publication-title: Proc IASTED Int Conf Software Eng
– ident: ref4
  doi: 10.1145/996841.996856
– year: 0
  ident: ref21
  publication-title: Content Scripts
– year: 0
  ident: ref18
  publication-title: Google Chromium Project
– ident: ref14
  doi: 10.1109/COMPSAC.2011.60
– ident: ref8
  doi: 10.1145/1321631.1321672
– year: 2008
  ident: ref1
  publication-title: JavaScript Dominates EMEA Development
– ident: ref15
  doi: 10.1007/978-3-642-24712-5_8
– year: 0
  ident: ref22
  publication-title: Jasob 3
– ident: ref24
  doi: 10.1145/947397.947399
– year: 1999
  ident: ref3
  article-title: Watermarking java programs
  publication-title: Proc Int l Symp Future Software Technology
– year: 1997
  ident: ref5
  publication-title: A Taxonomy of Obfuscating Transformations
– year: 0
  ident: ref20
  publication-title: VFLib
– ident: ref2
  doi: 10.1145/292540.292569
– ident: ref12
  doi: 10.1145/1066677.1066753
– year: 2007
  ident: ref9
  publication-title: Design and Evaluation of Dynamic Software Birthmarks based on API Calls
– start-page: 404
  year: 2004
  ident: ref7
  article-title: Detecting software theft via whole program path birthmarks
  publication-title: Proc Inf Security 7th Int Conf (ISC 2004)
– year: 0
  ident: ref19
  publication-title: Google v8 JavaScript Engine
– year: 2003
  ident: ref13
  publication-title: Detecting the theft of programs using birthmarks
– ident: ref23
  doi: 10.1109/ICIAP.1999.797762
SSID ssj0044168
Score 2.1605694
Snippet As JavaScript is becoming more and more popular, JavaScript programs are valuable assets to many companies. However, the source code of JavaScript programs can...
SourceID proquest
pascalfrancis
crossref
ieee
SourceType Aggregation Database
Index Database
Enrichment Source
Publisher
StartPage 101
SubjectTerms Applied sciences
Arrays
Browsers
Code theft detection
Computer programs
Computer science; control theory; systems
Exact sciences and technology
heap graph
Information retrieval. Graph
Java (programming language)
Libraries
Memory and file management (including protection and security)
Memory organisation. Data processing
Mercury (metals)
Open source software
Reproduction
Robustness
Software
software birthmark
Software industry
software protection
Source code
Studies
Theft
Theoretical computing
Watermarking
Title Heap Graph Based Software Theft Detection
URI https://ieeexplore.ieee.org/document/6328271
https://www.proquest.com/docview/1266567433
https://www.proquest.com/docview/1365133383
https://www.proquest.com/docview/1671516249
Volume 8
WOSCitedRecordID wos000318595000009&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVIEE
  databaseName: IEEE Electronic Library (IEL)
  customDbUrl:
  eissn: 1556-6021
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0044168
  issn: 1556-6013
  databaseCode: RIE
  dateStart: 20060101
  isFulltext: true
  titleUrlDefault: https://ieeexplore.ieee.org/
  providerName: IEEE
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3fS9xAEB7Ow4f64FWtGH8cEfrS0mgum2w2j9r2tC9S0IJvYbM7C4Lkjruc_vvObHLB0iL4FtgNLDO7883szswH8JkMY1VYI6PMMYWZcSrSVaIja0SqTZU6a50nm8hvbtT9ffF7AN_6WhhE9MlneMaf_i3fzsyKr8rOpaAAgQvGN_JctrVaa6tLqN6WvWWZjCjIEN0L5iQuzu9-TW85iSs5YzCUTJv8CoM8qQqnROolScW1dBb_WGYPN9PR-xb6EbY7tzK8aPfBDgyw3oXRmrIh7E7wLmy96j-4B1-uUc_DK-5ZHV4SnNnwlqzys15gSNvHNeEPbHyqVv0J_kx_3n2_jjruhMiQC9JEBmNLroMyaWVyJ3OtqlgWUlNESrClBSYpCuUymwplDAHURKPl3i7GJEKrWOzDsJ7VeAChI1DXuphoF2OaoayM0HlSKZs7UqjNAojX0ixN11ic-S0eSx9gxEXJCihZAWWngAC-9r_M264ab03eYwn3EzvhBjD-S2X9eMLppUqmARyvdVh2B3NZTsghybjwQgRw2g_TkeJ3El3jbEVzhGTWG4rd35gjc_KVJAWvh_9f3hF8SDxzBt_WHMOwWazwBDbNU_OwXIz93n0BgOvqiQ
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1Ra9RAEB5KLagP1rYWo7Wm4Iti2lx2s9k8au15pe0h9IS-hc3uLAiSK3c5_fvObHKhohT6FtgNLDO7883szswH8I4MY106q5LcM4WZ9ToxdWYSZ4U0tpbeOR_IJorpVN_clN824ONQC4OIIfkMj_kzvOW7uV3xVdmJEhQgcMH4o1zKLO2qtdZ2l3C9K3zLc5VQmCH6N8xRWp7MzsfXnMaVHTMcKiZOvoNCgVaFkyLNkuTiO0KLf2xzAJzx9sOW-hye9Y5l_KnbCTuwgc0ubK9JG-L-DO_C0zsdCPfg_QTNbfyVu1bHnwnQXHxNdvm3WWBMG8i38RdsQ7JW8wK-j89mp5OkZ09ILDkhbWIxdeQ8aCtrW3hVGF2nqlSGYlICLiMwkyi0z50U2lqCqJFBx91drM2E0anYh81m3uBLiD3BujHlyPgUZY6qtsIUWa1d4UmlLo8gXUuzsn1rcWa4-FmFECMtK1ZAxQqoegVE8GH45bbrq3Hf5D2W8DCxF24Eh3-pbBjPOMFUKxnBwVqHVX80l9WIXJKcSy9EBEfDMB0qfikxDc5XNEco5r2h6P2eOaogb0lR-Prq_8t7C48ns6vL6vJ8evEanmSBR4Pvbg5gs12s8A1s2V_tj-XiMOzjP9sB7dA
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Heap+Graph+Based+Software+Theft+Detection&rft.jtitle=IEEE+transactions+on+information+forensics+and+security&rft.au=CHAN%2C+Patrick+P.+F&rft.au=HUI%2C+Lucas+C.+K&rft.au=YIU%2C+S.+M&rft.date=2013&rft.pub=Institute+of+Electrical+and+Electronics+Engineers&rft.issn=1556-6013&rft.volume=8&rft.issue=1-2&rft.spage=101&rft.epage=110&rft_id=info:doi/10.1109%2FTIFS.2012.2223685&rft.externalDBID=n%2Fa&rft.externalDocID=27109864
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1556-6013&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1556-6013&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1556-6013&client=summon