메뉴 건너뛰기




Volumn , Issue , 2007, Pages 111-120

Fast approximate matching of programs for protecting libre/open source software by using spatial indexes

Author keywords

[No Author keywords available]

Indexed keywords

INFORMATION SERVICES; NATURAL LANGUAGE PROCESSING SYSTEMS; SOFTWARE ENGINEERING; TREES (MATHEMATICS);

EID: 47749097882     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SCAM.2007.15     Document Type: Conference Paper
Times cited : (4)

References (48)
  • 1
    • 47749106239 scopus 로고    scopus 로고
    • http://lucene.apache.org/.
  • 2
    • 47749126727 scopus 로고    scopus 로고
    • http://sandmark.cs.arizona.edu/index.html.
  • 3
    • 47749128289 scopus 로고    scopus 로고
    • http://www.catb.org/ẽsr/comparator/.
  • 4
    • 47749091079 scopus 로고    scopus 로고
    • and, http://gplviolations.org
    • http://www.fsf.org/licensing/licenses/ and http://gplviolations.org/.
  • 5
    • 47749107007 scopus 로고    scopus 로고
    • http://www.jpackage.org/.
  • 6
    • 47749123125 scopus 로고    scopus 로고
    • http://www.zelix.com.
  • 12
    • 0001802606 scopus 로고    scopus 로고
    • The X-tree: An index structure for high-dimensional data
    • T. M. Vijayaraman, A. P. Buchmann, C. Mohan, and N. L. Sarda, editors, San Francisco, U.S.A, Morgan Kaufmann Publishers
    • S. Berchtold, D. A. Keim, and H.-P. Kriegel. The X-tree: An index structure for high-dimensional data. In T. M. Vijayaraman, A. P. Buchmann, C. Mohan, and N. L. Sarda, editors, Proceedings of the 22nd International Conference on Very Large Databases, pages 28-39, San Francisco, U.S.A., 1996. Morgan Kaufmann Publishers.
    • (1996) Proceedings of the 22nd International Conference on Very Large Databases , pp. 28-39
    • Berchtold, S.1    Keim, D.A.2    Kriegel, H.-P.3
  • 14
    • 84924223669 scopus 로고    scopus 로고
    • Static analysis of executables to detect malicious patterns
    • M. Christodorescu and S. Jha. Static analysis of executables to detect malicious patterns. 12th USENIX Security Symposium, pages 169-186, 2003.
    • (2003) 12th USENIX Security Symposium , pp. 169-186
    • Christodorescu, M.1    Jha, S.2
  • 15
    • 84993661659 scopus 로고    scopus 로고
    • M-tree: An efficient access method for similarity search in metric spaces
    • P. Ciaccia, M. Patella, and P. Zezula. M-tree: An efficient access method for similarity search in metric spaces. In VLDB, pages 426-435, 1997.
    • (1997) VLDB , pp. 426-435
    • Ciaccia, P.1    Patella, M.2    Zezula, P.3
  • 18
  • 20
    • 77954316719 scopus 로고    scopus 로고
    • Graph-based comparison of executable objects
    • T. Dullien and R. Rolles. Graph-based comparison of executable objects. In SSTIC, 2005.
    • (2005) SSTIC
    • Dullien, T.1    Rolles, R.2
  • 24
    • 29844445531 scopus 로고    scopus 로고
    • Efficient similarity search for hierarchical data in large databases
    • K. Kailing, H.-P. Kriegel, S. Schoenauer, and T. Seidl. Efficient similarity search for hierarchical data in large databases. In EDBT 2004, pages 676-693, 2004.
    • (2004) EDBT 2004 , pp. 676-693
    • Kailing, K.1    Kriegel, H.-P.2    Schoenauer, S.3    Seidl, T.4
  • 25
    • 17644397978 scopus 로고    scopus 로고
    • A. Kiss, J. Jasz, G. Lehotai, and T. Gyimothy. Interprocedural static slicing of binary executables. SCAM, 00:118, 2003.
    • A. Kiss, J. Jasz, G. Lehotai, and T. Gyimothy. Interprocedural static slicing of binary executables. SCAM, 00:118, 2003.
  • 27
    • 0027029758 scopus 로고
    • Undecidability of static analysis
    • W. Landi. Undecidability of static analysis. ACM Lett. Program. Lang. Syst., 1(4):323-337, 1992.
    • (1992) ACM Lett. Program. Lang. Syst , vol.1 , Issue.4 , pp. 323-337
    • Landi, W.1
  • 28
    • 0029701640 scopus 로고    scopus 로고
    • W. M. YAP3: Improved detection of similarities in computer program and other texts. SIGCSEB: SIGCSE Bulletin, 28:130-134, 1996.
    • W. M. YAP3: Improved detection of similarities in computer program and other texts. SIGCSEB: SIGCSE Bulletin, 28:130-134, 1996.
  • 29
    • 0034504466 scopus 로고    scopus 로고
    • A. Monden, H. Iida, K. Matsumoto, K. Inoue, and K. Torii. A practical method for watermarking java programs. In compsac2000, 24th Computer Software and Applications Conference, pages 191-197, 2000
    • A. Monden, H. Iida, K. Matsumoto, K. Inoue, and K. Torii. A practical method for watermarking java programs. In compsac2000, 24th Computer Software and Applications Conference, pages 191-197, 2000.
  • 36
    • 0036648690 scopus 로고    scopus 로고
    • A multilinguistic token-based code clone detection system for large scale source code
    • K. T., K. S., and I. K. Ccfinder: A multilinguistic token-based code clone detection system for large scale source code. In IEEE Transactions on Software Engineering 28(7), pages 654-670, 2002.
    • (2002) IEEE Transactions on Software Engineering , vol.28 , Issue.7 , pp. 654-670
    • Ccfinder, I.K.1
  • 37
    • 0018491659 scopus 로고
    • The tree-to-tree correction problem
    • K.-C. Tai. The tree-to-tree correction problem. J. ACM, 26(3):422-433, 1979.
    • (1979) J. ACM , vol.26 , Issue.3 , pp. 422-433
    • Tai, K.-C.1
  • 42
    • 26444552144 scopus 로고    scopus 로고
    • A linear tree edit distance algorithm for similar ordered trees
    • H. Touzet. A linear tree edit distance algorithm for similar ordered trees. In Lecture Notes in Computer Science, volume 3537, pages 334-345, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3537 , pp. 334-345
    • Touzet, H.1
  • 43
    • 84928594241 scopus 로고    scopus 로고
    • F. Umemori, K. Konda, R. Yokomori, and K. Inoue. Design and implementation of bytecode-based java slicing system. SCAM, 00:108-117, 2003.
    • F. Umemori, K. Konda, R. Yokomori, and K. Inoue. Design and implementation of bytecode-based java slicing system. SCAM, 00:108-117, 2003.
  • 45
    • 3042816530 scopus 로고    scopus 로고
    • Automatic validation of code-improving transformations on low-level program representations
    • R. van Engelen, D. Whalley, and X. Yuan. Automatic validation of code-improving transformations on low-level program representations. Sci. Comput. Program., 52(1-3):257-280, 2004.
    • (2004) Sci. Comput. Program , vol.52 , Issue.1-3 , pp. 257-280
    • van Engelen, R.1    Whalley, D.2    Yuan, X.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.