메뉴 건너뛰기




Volumn , Issue , 2009, Pages 280-290

Behavior based software theft detection

Author keywords

Dynamic analysis; Software birthmark; Software plagiarism; Software theft

Indexed keywords

BEHAVIOR-BASED; BEHAVIORAL CHARACTERISTICS; COMPILER OPTIMIZATIONS; DEPENDENCE GRAPHS; DETECTION SYSTEM; OPEN SOURCE PROJECTS; SOFTWARE COMPONENT; SOFTWARE INDUSTRY; SYSTEM CALLS; TWO-STATE;

EID: 74049163233     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1653662.1653696     Document Type: Conference Paper
Times cited : (98)

References (31)
  • 1
    • 74049165023 scopus 로고    scopus 로고
    • Available from World Wide Web
    • [online]Available from World Wide Web: http://news.zdnet.com/2100-3513- 22-5629876.html.
  • 3
    • 74049110260 scopus 로고    scopus 로고
    • The gecko engine, http://en.wikipedia.org/wiki/Gecko-layout-engine.
    • The gecko engine
  • 4
    • 74049092497 scopus 로고    scopus 로고
    • Khtml engine, http://en.wikipedia.org/wiki/KHTML.
    • Khtml engine
  • 6
    • 84976807106 scopus 로고
    • Minimizing reference count updating with deferred and anchored pointers for functional data structures
    • H. G. Baker. Minimizing reference count updating with deferred and anchored pointers for functional data structures. ACM SIGPLAN Notices, 29:29-9, 1994.
    • (1994) ACM SIGPLAN Notices , vol.29 , pp. 29-29
    • Baker, H.G.1
  • 11
    • 0004046658 scopus 로고    scopus 로고
    • A taxonomy of obfuscating transformations. Technical Report 148, The Univeristy of Auckland
    • July
    • C. Collberg, C. Thomborson, and D. Low. A taxonomy of obfuscating transformations. Technical Report 148, The Univeristy of Auckland, July 1997.
    • (1997)
    • Collberg, C.1    Thomborson, C.2    Low, D.3
  • 15
    • 0036648690 scopus 로고    scopus 로고
    • Ccfinder: A multilinguistic token-based code clone detection system for large scale source code
    • T. Kamiya, S. Kusumoto, and K. Inoue. Ccfinder: a multilinguistic token-based code clone detection system for large scale source code. IEEE Trans. Softw. Eng., 28(7), 2002.
    • (2002) IEEE Trans. Softw. Eng , vol.28 , Issue.7
    • Kamiya, T.1    Kusumoto, S.2    Inoue, K.3
  • 21
    • 35048854764 scopus 로고    scopus 로고
    • Detecting software theft via whole program path birthmarks
    • G. Myles and C. Collberg. Detecting software theft via whole program path birthmarks. In ISC, pages 404-415, 2004.
    • (2004) ISC , pp. 404-415
    • Myles, G.1    Collberg, C.2
  • 22
    • 74049120598 scopus 로고    scopus 로고
    • G. Myles and C. S. Collberg. K-gram based software birthmarks. In SAC, 2005.
    • G. Myles and C. S. Collberg. K-gram based software birthmarks. In SAC, 2005.
  • 24
    • 74049144309 scopus 로고    scopus 로고
    • Finding plagiarisms among a set of programs with jplag
    • Available from World Wide Web
    • L. Prechelt, G. Malpohl, and M. Philippsen. Finding plagiarisms among a set of programs with jplag. Universal Computer Science, 2000. Available from World Wide Web: citeseer.ist.psu.edu/article/ prechelt01finding.html.
    • (2000) Universal Computer Science
    • Prechelt, L.1    Malpohl, G.2    Philippsen, M.3
  • 29
    • 74049126356 scopus 로고    scopus 로고
    • Design and evaluation of dynamic software birthmarks based on api calls
    • Technical report, Nara Institute of Science and Technology
    • H. Tamada, K. Okamoto, M. Nakamura, A. Monden, and K. ichi Matsumoto. Design and evaluation of dynamic software birthmarks based on api calls. Technical report, Nara Institute of Science and Technology, 2007.
    • (2007)
    • Tamada, H.1    Okamoto, K.2    Nakamura, M.3    Monden, A.4    ichi Matsumoto, K.5
  • 30
    • 0016870630 scopus 로고
    • An algorithm for subgraph isomorphism
    • J. R. Ullmann. An algorithm for subgraph isomorphism. Journal of the ACM, 23(1):31-42, 1976.
    • (1976) Journal of the ACM , vol.23 , Issue.1 , pp. 31-42
    • Ullmann, J.R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.