Code theft detection by software birthmarks for binary executables바이너리 실행파일의 소프트웨어 버스마크를 이용한 코드 도용 탐지

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 505
  • Download : 0
DC FieldValueLanguage
dc.contributor.advisorHan, Tai-Sook-
dc.contributor.advisor한태숙-
dc.contributor.authorChoi, Seok-Woo-
dc.contributor.author최석우-
dc.date.accessioned2011-12-13T05:21:41Z-
dc.date.available2011-12-13T05:21:41Z-
dc.date.issued2009-
dc.identifier.urihttp://library.kaist.ac.kr/search/detail/view.do?bibCtrlNo=309339&flag=dissertation-
dc.identifier.urihttp://hdl.handle.net/10203/32921-
dc.description학위논문(박사) - 한국과학기술원 : 전산학전공, 2009.2, [ vi, 81 p. ]-
dc.description.abstractA code theft may make severe damages to the companies that have software as their major assets. To deal with code thefts, various methods have been developed such as software tamper proofing, code obfuscation, software watermarking, and software birthmarking. Software tamper proofing and code obfuscation are techniques to prevent or hinder illegal uses of program codes. Software watermarking and software birthmarking are techniques to confirm that software is illegally copied or contained in another programs. Software watermarking is different from software birthmarking in a sense that software watermarking embeds watermarks in software and extracts them to verify the originality of programs, while techniques of software birthmarking only utilize program codes themselves. Software birthmarking is considered as one of code plagiarism detection techniques. However, the term software birthmarking is used for detecting code theft in executable files, while the term code plagiarism detection is used for detecting code theft in source codes. In this thesis, software birthmarking techniques for binary executables are proposed. Prior to this research, software birthmarking has been targeted to executable files that are composed of intermediate codes such as Java bytecodes, which are simpler to analyze than OS-dependant binary executables. However, these binary executables account for higher proportion in real world applications than intermediate code executables. Besides, most lawsuits on code theft are related to binary executables. For these reasons, most birthmarking techniques target binary executables for the practical usage. The proposed birthmarks for binary executables are as follow: - a static API birthmark for binary executables that utilizes call graphs and API function calls, and - a dynamic API birthmark for binary executables that utilizes API function call traces at run-time. API functions are utilized as birthmarks for two reasons. The...eng
dc.languageeng-
dc.publisher한국과학기술원-
dc.subjectsoftware birthmark-
dc.subjectcode theft detection-
dc.subjectbinary analysis-
dc.subjectstatic analysis-
dc.subjectdynamic analysis-
dc.subject소프트웨어 버스마크-
dc.subject코드 도용 탐지-
dc.subject이진코드 분석-
dc.subject정적 분석-
dc.subject동적 분석-
dc.subjectsoftware birthmark-
dc.subjectcode theft detection-
dc.subjectbinary analysis-
dc.subjectstatic analysis-
dc.subjectdynamic analysis-
dc.subject소프트웨어 버스마크-
dc.subject코드 도용 탐지-
dc.subject이진코드 분석-
dc.subject정적 분석-
dc.subject동적 분석-
dc.titleCode theft detection by software birthmarks for binary executables-
dc.title.alternative바이너리 실행파일의 소프트웨어 버스마크를 이용한 코드 도용 탐지-
dc.typeThesis(Ph.D)-
dc.identifier.CNRN309339/325007 -
dc.description.department한국과학기술원 : 전산학전공, -
dc.identifier.uid020005326-
dc.contributor.localauthorHan, Tai-Sook-
dc.contributor.localauthor한태숙-
Appears in Collection
CS-Theses_Ph.D.(박사논문)
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0