DC Field | Value | Language |
---|---|---|
dc.contributor.advisor | Han, Tai-Sook | - |
dc.contributor.advisor | 한태숙 | - |
dc.contributor.author | Park, Hee-Wan | - |
dc.contributor.author | 박희완 | - |
dc.date.accessioned | 2011-12-13T05:27:30Z | - |
dc.date.available | 2011-12-13T05:27:30Z | - |
dc.date.issued | 2010 | - |
dc.identifier.uri | http://library.kaist.ac.kr/search/detail/view.do?bibCtrlNo=418837&flag=dissertation | - |
dc.identifier.uri | http://hdl.handle.net/10203/33304 | - |
dc.description | 학위논문(박사) - 한국과학기술원 : 전산학과, 2010.2, [ xii, 116 p. ] | - |
dc.description.abstract | Recently, many software products have been developed as open source projects. Adopting an open source has the advantage of saving time and cost for developing software. For this reason, not only many programmers but also many software companies actively utilize open sources. However, illegal use of open sources may violate the license because open sources are released under the corresponding license. We need to be more cautious when developing software using open source because the licenses are strictly protected by copyright law. Generally, it is hard to recover original source codes from distributed commercial software because software is distributed in a binary format. However, Java applications are easy to analyze because Java applications are usually distributed as Java bytecodes that include much information to achieve high portability. Moreover, various decompilers were developed owing to the strict specification of the Java virtual machine. Thus, in most cases we can recover source codes from Java class files through decompilers even though the original source code is not available. As a result, Java applications are one of the most frequent targets of software theft. Hence, it is essential to devise techniques to detect code theft, especially for Java. Research on code theft has been conducted mostly on source code plagiarism detection techniques. If we can get the source code of a suspicious program, plagiarism detection may be the most effective technique. However, we cannot always get the source code because an application program is generally distributed in compiled binary format. There is another research, code clone detection, for software theft detection. Code clones are duplicated code lines of programs. If two different programs have code clones, we can suspect those programs as copied programs. However, such code clone techniques need source codes of two compared programs like code plagiarism detection. To identify copied software, software... | eng |
dc.language | eng | - |
dc.publisher | 한국과학기술원 | - |
dc.subject | GPL violation | - |
dc.subject | static analysis | - |
dc.subject | software theft detection | - |
dc.subject | software birthmark | - |
dc.subject | Java bytecode analysis | - |
dc.subject | 자바 바이트코드 분석 | - |
dc.subject | GPL 위반 | - |
dc.subject | 정적 분석 | - |
dc.subject | 소프트웨어 도용 탐지 | - |
dc.subject | 소프트웨어 버스마크 | - |
dc.title | Software theft detection through static trace birthmarks for java | - |
dc.title.alternative | 자바의 정적 트레이스 버스마크를 통한 소프트웨어 도용 탐지 | - |
dc.type | Thesis(Ph.D) | - |
dc.identifier.CNRN | 418837/325007 | - |
dc.description.department | 한국과학기술원 : 전산학과, | - |
dc.identifier.uid | 000995169 | - |
dc.contributor.localauthor | Han, Tai-Sook | - |
dc.contributor.localauthor | 한태숙 | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.