Software theft detection through analysis of the semantic units of program프로그램의 의미 단위 분석을 통한 소프트웨어의 도용 탐지 방법

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 472
  • Download : 0
DC FieldValueLanguage
dc.contributor.advisorHan, Tai-Sook-
dc.contributor.advisor한태숙-
dc.contributor.authorLim, Hyun-il-
dc.contributor.author임현일-
dc.date.accessioned2011-12-13T05:27:06Z-
dc.date.available2011-12-13T05:27:06Z-
dc.date.issued2009-
dc.identifier.urihttp://library.kaist.ac.kr/search/detail/view.do?bibCtrlNo=327792&flag=dissertation-
dc.identifier.urihttp://hdl.handle.net/10203/33277-
dc.description학위논문(박사) - 한국과학기술원 : 전산학전공, 2009. 8., [ ix, 127 p. ]-
dc.description.abstractSoftware is an intellectual property of the developers. Nevertheless, software piracy is one of the major obstacles to the growth of software industries. In order to cope with this problem, several researches are ongoing, such as software watermark, code obfuscation, code encryption, source code plagiarism detection, and software birthmark. A software birthmark refers to program`s inherent characteristics that can be used to identify a program. Similarities measured by comparing birthmarks of programs can provide a guideline for detecting software thefts. In this thesis, we present approaches to detecting software thefts through software birthmarks based on semantic units of programs. A semantic unit refers to a cohesive fragment in a program code that shows meaningful behavior of the program. So, a semantic unit may correspond to a basic behavior for performing some arranged tasks in a program. Detecting software theft is accomplished by comparing such semantic units between programs. We propose two approaches to analyzing semantic units of programs. First, the control flow-based approach is presented. The control flow information shows the structural characteristics and the possible behaviors while a program is executed. Flow paths and their behaviors in Java programs are formally described, and a set of behaviors of flow paths is used as a software birthmark. Second, the stack simulation-based approach is presented for Java programs. Because operand stack manipulations are fundamental operations among instructions in Java programs, they can show coherent relations among instructions. Stack behaviors are analyzed by statically simulating operand stack variations of Java programs. A set of stack behaviors of a Java program is used as a birthmark of the program. Similarity between two birthmarks is calculated by comparing and matching the similar elements of the birthmarks. Experiments are performed on the proposed methods with respect to credibilit...eng
dc.languageeng-
dc.publisher한국과학기술원-
dc.subjectsoftware theft detection-
dc.subjectsoftware protection-
dc.subjectprogram analysis-
dc.subjectsoftware birthmark-
dc.subjectJava bytecode analysis-
dc.subject소프트웨어 도용 탐지-
dc.subject소프트웨어 보호-
dc.subject프로그램 분석-
dc.subject소프트웨어 버스마크-
dc.subject자바 바이트코드 분석-
dc.subjectsoftware theft detection-
dc.subjectsoftware protection-
dc.subjectprogram analysis-
dc.subjectsoftware birthmark-
dc.subjectJava bytecode analysis-
dc.subject소프트웨어 도용 탐지-
dc.subject소프트웨어 보호-
dc.subject프로그램 분석-
dc.subject소프트웨어 버스마크-
dc.subject자바 바이트코드 분석-
dc.titleSoftware theft detection through analysis of the semantic units of program-
dc.title.alternative프로그램의 의미 단위 분석을 통한 소프트웨어의 도용 탐지 방법-
dc.typeThesis(Ph.D)-
dc.identifier.CNRN327792/325007 -
dc.description.department한국과학기술원 : 전산학전공, -
dc.identifier.uid000975329-
dc.contributor.localauthorHan, Tai-Sook-
dc.contributor.localauthor한태숙-
Appears in Collection
CS-Theses_Ph.D.(박사논문)
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0