Software theft detection through static trace birthmarks for java자바의 정적 트레이스 버스마크를 통한 소프트웨어 도용 탐지

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 505
  • Download : 0
Recently, many software products have been developed as open source projects. Adopting an open source has the advantage of saving time and cost for developing software. For this reason, not only many programmers but also many software companies actively utilize open sources. However, illegal use of open sources may violate the license because open sources are released under the corresponding license. We need to be more cautious when developing software using open source because the licenses are strictly protected by copyright law. Generally, it is hard to recover original source codes from distributed commercial software because software is distributed in a binary format. However, Java applications are easy to analyze because Java applications are usually distributed as Java bytecodes that include much information to achieve high portability. Moreover, various decompilers were developed owing to the strict specification of the Java virtual machine. Thus, in most cases we can recover source codes from Java class files through decompilers even though the original source code is not available. As a result, Java applications are one of the most frequent targets of software theft. Hence, it is essential to devise techniques to detect code theft, especially for Java. Research on code theft has been conducted mostly on source code plagiarism detection techniques. If we can get the source code of a suspicious program, plagiarism detection may be the most effective technique. However, we cannot always get the source code because an application program is generally distributed in compiled binary format. There is another research, code clone detection, for software theft detection. Code clones are duplicated code lines of programs. If two different programs have code clones, we can suspect those programs as copied programs. However, such code clone techniques need source codes of two compared programs like code plagiarism detection. To identify copied software, software...
Advisors
Han, Tai-Sookresearcher한태숙researcher
Description
한국과학기술원 : 전산학과,
Publisher
한국과학기술원
Issue Date
2010
Identifier
418837/325007  / 000995169
Language
eng
Description

학위논문(박사) - 한국과학기술원 : 전산학과, 2010.2, [ xii, 116 p. ]

Keywords

GPL violation; static analysis; software theft detection; software birthmark; Java bytecode analysis; 자바 바이트코드 분석; GPL 위반; 정적 분석; 소프트웨어 도용 탐지; 소프트웨어 버스마크

URI
http://hdl.handle.net/10203/33304
Link
http://library.kaist.ac.kr/search/detail/view.do?bibCtrlNo=418837&flag=dissertation
Appears in Collection
CS-Theses_Ph.D.(박사논문)
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0