Heap Graph Based Software Theft Detection
As JavaScript is becoming more and more popular, JavaScript programs are valuable assets to many companies. However, the source code of JavaScript programs can be easily obtained and plagiarism of JavaScript programs is a serious threat to the industry. There are techniques like code obfuscation and...
Gespeichert in:
| Veröffentlicht in: | IEEE transactions on information forensics and security Jg. 8; H. 1; S. 101 - 110 |
|---|---|
| Hauptverfasser: | , , |
| Format: | Journal Article |
| Sprache: | Englisch |
| Veröffentlicht: |
New York, NY
IEEE
01.01.2013
Institute of Electrical and Electronics Engineers The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Schlagworte: | |
| ISSN: | 1556-6013, 1556-6021 |
| Online-Zugang: | Volltext |
| Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
| Abstract | As JavaScript is becoming more and more popular, JavaScript programs are valuable assets to many companies. However, the source code of JavaScript programs can be easily obtained and plagiarism of JavaScript programs is a serious threat to the industry. There are techniques like code obfuscation and watermarking which can make the source code of a program difficult to understand by humans and prove the ownership of the program. However, code obfuscation cannot avoid the source code being copied and a watermark can be defaced. In this paper, we use a relatively new technique, software birthmark, to help detect code theft of JavaScript programs. A birthmark is a unique characteristic a program possesses that can be used to identify the program. We extend two recent birthmark systems that extract the birthmark of a software from the run-time heap. We propose a redesigned system with improved robustness and performed extensive experiments to justify the effectiveness and robustness of it. Our evaluation based on 200 large-scale websites showed that our birthmark system exhibits 100% accuracy. We remark that it is solid and ready for practical use. |
|---|---|
| AbstractList | As JavaScript is becoming more and more popular, JavaScript programs are valuable assets to many companies. However, the source code of JavaScript programs can be easily obtained and plagiarism of JavaScript programs is a serious threat to the industry. There are techniques like code obfuscation and watermarking which can make the source code of a program difficult to understand by humans and prove the ownership of the program. However, code obfuscation cannot avoid the source code being copied and a watermark can be defaced. In this paper, we use a relatively new technique, software birthmark, to help detect code theft of JavaScript programs. A birthmark is a unique characteristic a program possesses that can be used to identify the program. We extend two recent birthmark systems that extract the birthmark of a software from the run-time heap. We propose a redesigned system with improved robustness and performed extensive experiments to justify the effectiveness and robustness of it. Our evaluation based on 200 large-scale websites showed that our birthmark system exhibits 100% accuracy. We remark that it is solid and ready for practical use. |
| Author | Chan, P. P. F. Yiu, S. M. Hui, L. C. K. |
| Author_xml | – sequence: 1 givenname: P. P. F. surname: Chan fullname: Chan, P. P. F. email: pfchan@cs.hku.hk organization: Dept. of Comput. Sci., Univ. of Hong Kong, Hong Kong, China – sequence: 2 givenname: L. C. K. surname: Hui fullname: Hui, L. C. K. email: hui@cs.hku.hk organization: Dept. of Comput. Sci., Univ. of Hong Kong, Hong Kong, China – sequence: 3 givenname: S. M. surname: Yiu fullname: Yiu, S. M. email: smyiu@cs.hku.hk organization: Dept. of Comput. Sci., Univ. of Hong Kong, Hong Kong, China |
| BackLink | http://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=27109864$$DView record in Pascal Francis |
| BookMark | eNqFkU1Lw0AQhhepoFZ_gHgJiKCH1p2dzWZ71PpVKHhoPS_jdoKRNKm7KeK_N6G1Bw96mjk873y875HoVXXFQpyCHALI0fV88jAbKglqqJRCY9M9cQhpagZGKujtesADcRTju5Rag7GH4uqJaZU8Blq9JbcUeZHM6rz5pMDJ_I3zJrnjhn1T1NWx2M-pjHyyrX3x8nA_Hz8Nps-Pk_HNdODRjpqBZ7mQylqvX32Wm4zsqzQjQ4hWAxKy0ow2TxcarfcZWCBeyBQz7xWSldgXl5u5q1B_rDk2bllEz2VJFdfr6MBkkIJRevQ_iiYFbDdji57_Qt_rdajaRxwoY1KTaeyoiy1F0VOZB6p8Ed0qFEsKX05lrdXW6JbLNpwPdYyBc-eLhjqXmkBF6UC6LhXXpeK6VNw2lVYJv5Q_w__SnG00BTPveIPKtgfhN0TslaQ |
| CODEN | ITIFA6 |
| CitedBy_id | crossref_primary_10_1007_s13369_016_2371_4 crossref_primary_10_1016_j_ipm_2021_102518 crossref_primary_10_1016_j_procs_2015_02_143 crossref_primary_10_1109_ACCESS_2021_3069367 crossref_primary_10_4018_IJSI_2017070107 crossref_primary_10_1109_TSE_2015_2454508 crossref_primary_10_1109_TSE_2017_2688383 crossref_primary_10_1007_s00500_016_2357_x crossref_primary_10_1109_ACCESS_2017_2706943 crossref_primary_10_1016_j_jss_2016_06_014 |
| Cites_doi | 10.1145/1653662.1653696 10.1145/996841.996856 10.1109/COMPSAC.2011.60 10.1145/1321631.1321672 10.1007/978-3-642-24712-5_8 10.1145/947397.947399 10.1145/292540.292569 10.1145/1066677.1066753 10.1109/ICIAP.1999.797762 |
| ContentType | Journal Article |
| Copyright | 2014 INIST-CNRS Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Jan 2013 |
| Copyright_xml | – notice: 2014 INIST-CNRS – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Jan 2013 |
| DBID | 97E RIA RIE AAYXX CITATION IQODW 7SC 7SP 7TB 8FD FR3 JQ2 KR7 L7M L~C L~D F28 |
| DOI | 10.1109/TIFS.2012.2223685 |
| DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005–Present IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Xplore CrossRef Pascal-Francis Computer and Information Systems Abstracts Electronics & Communications Abstracts Mechanical & Transportation Engineering Abstracts Technology Research Database Engineering Research Database ProQuest Computer Science Collection Civil Engineering Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional ANTE: Abstracts in New Technology & Engineering |
| DatabaseTitle | CrossRef Civil Engineering Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Mechanical & Transportation Engineering Abstracts Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Engineering Research Database Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional ANTE: Abstracts in New Technology & Engineering |
| DatabaseTitleList | Civil Engineering Abstracts Civil Engineering Abstracts Civil Engineering Abstracts |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering Computer Science Applied Sciences |
| EISSN | 1556-6021 |
| EndPage | 110 |
| ExternalDocumentID | 2858069201 27109864 10_1109_TIFS_2012_2223685 6328271 |
| Genre | orig-research |
| GroupedDBID | 0R~ 29I 4.4 5GY 5VS 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABQJQ ABVLG ACGFS ACIWK AENEX AETIX AGQYO AGSQL AHBIQ AKJIK AKQYR ALMA_UNASSIGNED_HOLDINGS ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ CS3 DU5 EBS EJD HZ~ IFIPE IPLJI JAVBF LAI M43 O9- OCL P2P PQQKQ RIA RIE RNS AAYXX CITATION IQODW RIG 7SC 7SP 7TB 8FD FR3 JQ2 KR7 L7M L~C L~D F28 |
| ID | FETCH-LOGICAL-c389t-ce0d0288c4bc7f67a8b0696a338413a3e24e38f5d438cc7181aed0537cc23a803 |
| IEDL.DBID | RIE |
| ISICitedReferencesCount | 22 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000318595000009&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1556-6013 |
| IngestDate | Thu Oct 02 08:23:37 EDT 2025 Sun Sep 28 07:08:44 EDT 2025 Sun Nov 30 04:53:12 EST 2025 Wed Apr 02 07:49:42 EDT 2025 Sat Nov 29 03:49:34 EST 2025 Tue Nov 18 21:18:39 EST 2025 Tue Aug 26 17:09:09 EDT 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 1 |
| Keywords | Code generation software protection JAVA language Evaluation scale Scripting language Program transformation heap graph Theft prevention Stéganography Graph theory Copyright Partially ordered set Plagiarism Efficiency Intellectual property Object oriented Robustness Large scale Web site software birthmark Computer security Digital watermarking Software engineering Code theft detection |
| Language | English |
| License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html CC BY 4.0 |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c389t-ce0d0288c4bc7f67a8b0696a338413a3e24e38f5d438cc7181aed0537cc23a803 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 ObjectType-Article-2 ObjectType-Feature-1 content type line 23 |
| PQID | 1266567433 |
| PQPubID | 23500 |
| PageCount | 10 |
| ParticipantIDs | proquest_journals_1266567433 pascalfrancis_primary_27109864 proquest_miscellaneous_1671516249 crossref_citationtrail_10_1109_TIFS_2012_2223685 crossref_primary_10_1109_TIFS_2012_2223685 proquest_miscellaneous_1365133383 ieee_primary_6328271 |
| PublicationCentury | 2000 |
| PublicationDate | 2013-Jan. 2013-01-00 2013 20130101 |
| PublicationDateYYYYMMDD | 2013-01-01 |
| PublicationDate_xml | – month: 01 year: 2013 text: 2013-Jan. |
| PublicationDecade | 2010 |
| PublicationPlace | New York, NY |
| PublicationPlace_xml | – name: New York, NY – name: New York |
| PublicationTitle | IEEE transactions on information forensics and security |
| PublicationTitleAbbrev | TIFS |
| PublicationYear | 2013 |
| Publisher | IEEE Institute of Electrical and Electronics Engineers The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Publisher_xml | – name: IEEE – name: Institute of Electrical and Electronics Engineers – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| References | tamada (ref11) 2004 (ref18) 0 ref24 ref12 ref23 ref15 (ref20) 0 ref14 myles (ref7) 2004 tamada (ref10) 2004 tamada (ref9) 2007 ref2 data (ref1) 2008 collberg (ref5) 1997 (ref19) 0 ref8 team (ref16) 0 tamada (ref13) 2003 ref4 ref6 monden (ref3) 1999 (ref22) 0 (ref21) 0 proietti (ref17) 0 |
| References_xml | – year: 2004 ident: ref11 article-title: Dynamic software birthmarks to detect the theft of windows applications publication-title: Proc Int l Symp Future Software Technology – year: 0 ident: ref17 publication-title: Mootools JavaScript Framework – ident: ref6 doi: 10.1145/1653662.1653696 – year: 0 ident: ref16 publication-title: Prototype JavaScript framework – start-page: 569 year: 2004 ident: ref10 article-title: Design and evaluation of birthmarks for detecting theft of java programs publication-title: Proc IASTED Int Conf Software Eng – ident: ref4 doi: 10.1145/996841.996856 – year: 0 ident: ref21 publication-title: Content Scripts – year: 0 ident: ref18 publication-title: Google Chromium Project – ident: ref14 doi: 10.1109/COMPSAC.2011.60 – ident: ref8 doi: 10.1145/1321631.1321672 – year: 2008 ident: ref1 publication-title: JavaScript Dominates EMEA Development – ident: ref15 doi: 10.1007/978-3-642-24712-5_8 – year: 0 ident: ref22 publication-title: Jasob 3 – ident: ref24 doi: 10.1145/947397.947399 – year: 1999 ident: ref3 article-title: Watermarking java programs publication-title: Proc Int l Symp Future Software Technology – year: 1997 ident: ref5 publication-title: A Taxonomy of Obfuscating Transformations – year: 0 ident: ref20 publication-title: VFLib – ident: ref2 doi: 10.1145/292540.292569 – ident: ref12 doi: 10.1145/1066677.1066753 – year: 2007 ident: ref9 publication-title: Design and Evaluation of Dynamic Software Birthmarks based on API Calls – start-page: 404 year: 2004 ident: ref7 article-title: Detecting software theft via whole program path birthmarks publication-title: Proc Inf Security 7th Int Conf (ISC 2004) – year: 0 ident: ref19 publication-title: Google v8 JavaScript Engine – year: 2003 ident: ref13 publication-title: Detecting the theft of programs using birthmarks – ident: ref23 doi: 10.1109/ICIAP.1999.797762 |
| SSID | ssj0044168 |
| Score | 2.1605694 |
| Snippet | As JavaScript is becoming more and more popular, JavaScript programs are valuable assets to many companies. However, the source code of JavaScript programs can... |
| SourceID | proquest pascalfrancis crossref ieee |
| SourceType | Aggregation Database Index Database Enrichment Source Publisher |
| StartPage | 101 |
| SubjectTerms | Applied sciences Arrays Browsers Code theft detection Computer programs Computer science; control theory; systems Exact sciences and technology heap graph Information retrieval. Graph Java (programming language) Libraries Memory and file management (including protection and security) Memory organisation. Data processing Mercury (metals) Open source software Reproduction Robustness Software software birthmark Software industry software protection Source code Studies Theft Theoretical computing Watermarking |
| Title | Heap Graph Based Software Theft Detection |
| URI | https://ieeexplore.ieee.org/document/6328271 https://www.proquest.com/docview/1266567433 https://www.proquest.com/docview/1365133383 https://www.proquest.com/docview/1671516249 |
| Volume | 8 |
| WOSCitedRecordID | wos000318595000009&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVIEE databaseName: IEEE Electronic Library (IEL) customDbUrl: eissn: 1556-6021 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0044168 issn: 1556-6013 databaseCode: RIE dateStart: 20060101 isFulltext: true titleUrlDefault: https://ieeexplore.ieee.org/ providerName: IEEE |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3fS9xAEB7Ow4f64FWtGH8cEfrS0mgum2w2j9r2tC9S0IJvYbM7C4Lkjruc_vvObHLB0iL4FtgNLDO7883szswH8JkMY1VYI6PMMYWZcSrSVaIja0SqTZU6a50nm8hvbtT9ffF7AN_6WhhE9MlneMaf_i3fzsyKr8rOpaAAgQvGN_JctrVaa6tLqN6WvWWZjCjIEN0L5iQuzu9-TW85iSs5YzCUTJv8CoM8qQqnROolScW1dBb_WGYPN9PR-xb6EbY7tzK8aPfBDgyw3oXRmrIh7E7wLmy96j-4B1-uUc_DK-5ZHV4SnNnwlqzys15gSNvHNeEPbHyqVv0J_kx_3n2_jjruhMiQC9JEBmNLroMyaWVyJ3OtqlgWUlNESrClBSYpCuUymwplDAHURKPl3i7GJEKrWOzDsJ7VeAChI1DXuphoF2OaoayM0HlSKZs7UqjNAojX0ixN11ic-S0eSx9gxEXJCihZAWWngAC-9r_M264ab03eYwn3EzvhBjD-S2X9eMLppUqmARyvdVh2B3NZTsghybjwQgRw2g_TkeJ3El3jbEVzhGTWG4rd35gjc_KVJAWvh_9f3hF8SDxzBt_WHMOwWazwBDbNU_OwXIz93n0BgOvqiQ |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1Ra9RAEB5KLagP1rYWo7Wm4Iti2lx2s9k8au15pe0h9IS-hc3uLAiSK3c5_fvObHKhohT6FtgNLDO7883szswH8I4MY106q5LcM4WZ9ToxdWYSZ4U0tpbeOR_IJorpVN_clN824ONQC4OIIfkMj_kzvOW7uV3xVdmJEhQgcMH4o1zKLO2qtdZ2l3C9K3zLc5VQmCH6N8xRWp7MzsfXnMaVHTMcKiZOvoNCgVaFkyLNkuTiO0KLf2xzAJzx9sOW-hye9Y5l_KnbCTuwgc0ubK9JG-L-DO_C0zsdCPfg_QTNbfyVu1bHnwnQXHxNdvm3WWBMG8i38RdsQ7JW8wK-j89mp5OkZ09ILDkhbWIxdeQ8aCtrW3hVGF2nqlSGYlICLiMwkyi0z50U2lqCqJFBx91drM2E0anYh81m3uBLiD3BujHlyPgUZY6qtsIUWa1d4UmlLo8gXUuzsn1rcWa4-FmFECMtK1ZAxQqoegVE8GH45bbrq3Hf5D2W8DCxF24Eh3-pbBjPOMFUKxnBwVqHVX80l9WIXJKcSy9EBEfDMB0qfikxDc5XNEco5r2h6P2eOaogb0lR-Prq_8t7C48ns6vL6vJ8evEanmSBR4Pvbg5gs12s8A1s2V_tj-XiMOzjP9sB7dA |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Heap+Graph+Based+Software+Theft+Detection&rft.jtitle=IEEE+transactions+on+information+forensics+and+security&rft.au=CHAN%2C+Patrick+P.+F&rft.au=HUI%2C+Lucas+C.+K&rft.au=YIU%2C+S.+M&rft.date=2013&rft.pub=Institute+of+Electrical+and+Electronics+Engineers&rft.issn=1556-6013&rft.volume=8&rft.issue=1-2&rft.spage=101&rft.epage=110&rft_id=info:doi/10.1109%2FTIFS.2012.2223685&rft.externalDBID=n%2Fa&rft.externalDocID=27109864 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1556-6013&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1556-6013&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1556-6013&client=summon |