Software theft detection through static trace birthmarks for java자바의 정적 트레이스 버스마크를 통한 소프트웨어 도용 탐지

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 504
  • Download : 0
DC FieldValueLanguage
dc.contributor.advisorHan, Tai-Sook-
dc.contributor.advisor한태숙-
dc.contributor.authorPark, Hee-Wan-
dc.contributor.author박희완-
dc.date.accessioned2011-12-13T05:27:30Z-
dc.date.available2011-12-13T05:27:30Z-
dc.date.issued2010-
dc.identifier.urihttp://library.kaist.ac.kr/search/detail/view.do?bibCtrlNo=418837&flag=dissertation-
dc.identifier.urihttp://hdl.handle.net/10203/33304-
dc.description학위논문(박사) - 한국과학기술원 : 전산학과, 2010.2, [ xii, 116 p. ]-
dc.description.abstractRecently, many software products have been developed as open source projects. Adopting an open source has the advantage of saving time and cost for developing software. For this reason, not only many programmers but also many software companies actively utilize open sources. However, illegal use of open sources may violate the license because open sources are released under the corresponding license. We need to be more cautious when developing software using open source because the licenses are strictly protected by copyright law. Generally, it is hard to recover original source codes from distributed commercial software because software is distributed in a binary format. However, Java applications are easy to analyze because Java applications are usually distributed as Java bytecodes that include much information to achieve high portability. Moreover, various decompilers were developed owing to the strict specification of the Java virtual machine. Thus, in most cases we can recover source codes from Java class files through decompilers even though the original source code is not available. As a result, Java applications are one of the most frequent targets of software theft. Hence, it is essential to devise techniques to detect code theft, especially for Java. Research on code theft has been conducted mostly on source code plagiarism detection techniques. If we can get the source code of a suspicious program, plagiarism detection may be the most effective technique. However, we cannot always get the source code because an application program is generally distributed in compiled binary format. There is another research, code clone detection, for software theft detection. Code clones are duplicated code lines of programs. If two different programs have code clones, we can suspect those programs as copied programs. However, such code clone techniques need source codes of two compared programs like code plagiarism detection. To identify copied software, software...eng
dc.languageeng-
dc.publisher한국과학기술원-
dc.subjectGPL violation-
dc.subjectstatic analysis-
dc.subjectsoftware theft detection-
dc.subjectsoftware birthmark-
dc.subjectJava bytecode analysis-
dc.subject자바 바이트코드 분석-
dc.subjectGPL 위반-
dc.subject정적 분석-
dc.subject소프트웨어 도용 탐지-
dc.subject소프트웨어 버스마크-
dc.titleSoftware theft detection through static trace birthmarks for java-
dc.title.alternative자바의 정적 트레이스 버스마크를 통한 소프트웨어 도용 탐지-
dc.typeThesis(Ph.D)-
dc.identifier.CNRN418837/325007 -
dc.description.department한국과학기술원 : 전산학과, -
dc.identifier.uid000995169-
dc.contributor.localauthorHan, Tai-Sook-
dc.contributor.localauthor한태숙-
Appears in Collection
CS-Theses_Ph.D.(박사논문)
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0