A method for detecting the theft of Java programs through analysis of the control flow information

Cited 33 time in webofscience Cited 42 time in scopus
  • Hit : 411
  • Download : 31
DC FieldValueLanguage
dc.contributor.authorLim, Hyun-ilko
dc.contributor.authorPark, Heewanko
dc.contributor.authorChoi, Seokwooko
dc.contributor.authorHan, Taisookko
dc.date.accessioned2010-02-03T05:23:40Z-
dc.date.available2010-02-03T05:23:40Z-
dc.date.created2012-02-06-
dc.date.created2012-02-06-
dc.date.issued2009-09-
dc.identifier.citationINFORMATION AND SOFTWARE TECHNOLOGY, v.51, no.9, pp.1338 - 1350-
dc.identifier.issn0950-5849-
dc.identifier.urihttp://hdl.handle.net/10203/16447-
dc.description.abstractA software birthmark refers to the inherent characteristics of a program that can be used to identify the program. In this paper, a method for detecting the theft of Java programs through a static software birthmark is proposed that is based on the control flow information. The control flow information shows the structural characteristics and the possible behaviors during the execution of program. Flow paths (FP) and behaviors in Java programs are formally described here, and a set of behaviors of FPs is used as a software birthmark. The similarity is calculated by matching the pairs of similar behaviors from two birthmarks. Experiments centered on the proposed birthmark with respect to precision and recall. The performance was evaluated by analyzing the F-measure curves. The experimental results show that the proposed birthmark is a more effective measure compared to earlier approaches for detecting copied programs. even in cases where such programs are aggressively modified. (C) 2009 Elsevier B.V. All rights reserved.-
dc.description.sponsorshipThis work was supported by the Korea Science and Engineering Foundation (KOSEF) grant funded by the Korea government (MEST) (R01-2008-000-11856-0).en
dc.languageEnglish-
dc.language.isoen_USen
dc.publisherElsevier Science Bv-
dc.titleA method for detecting the theft of Java programs through analysis of the control flow information-
dc.typeArticle-
dc.identifier.wosid000268561700005-
dc.identifier.scopusid2-s2.0-67649306203-
dc.type.rimsART-
dc.citation.volume51-
dc.citation.issue9-
dc.citation.beginningpage1338-
dc.citation.endingpage1350-
dc.citation.publicationnameINFORMATION AND SOFTWARE TECHNOLOGY-
dc.identifier.doi10.1016/j.infsof.2009.04.011-
dc.embargo.liftdate9999-12-31-
dc.embargo.terms9999-12-31-
dc.contributor.localauthorHan, Taisook-
dc.type.journalArticleArticle-
dc.subject.keywordAuthorSoftware birthmark-
dc.subject.keywordAuthorSoftware copyright protection-
dc.subject.keywordAuthorSoftware theft detection-
dc.subject.keywordAuthorJava bytecode analysis-
Appears in Collection
CS-Journal Papers(저널논문)
Files in This Item
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 33 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0