Movatterモバイル変換


[0]ホーム

URL:


Skip to main content

Advertisement

Springer Nature Link
Log in

Detecting Java Theft Based on Static API Trace Birthmark

  • Conference paper

Part of the book series:Lecture Notes in Computer Science ((LNSC,volume 5312))

Included in the following conference series:

  • 670Accesses

  • 22Citations

Abstract

Software birthmark is the inherent program characteristics that can identify a program. In this paper, we propose a static API trace birthmark to detect Java theft. Because the API traces can reflect the behavior of a program, our birthmark is more resilient than the existing static birthmarks. Because the API traces are extracted by static analysis, they can be applied to library programs which earlier dynamic birthmarks cannot handle properly. We evaluate the proposed birthmark in terms of credibility and resilience. Experimental results show that our birthmark can detect common library modules of two packages while other birthmarks fail to detect.

This work was supported by the Korea Science and Engineering Foundation(KOSEF) grant funded by the Korea government(MEST) (No. R01-2008-000-11856-0).

This is a preview of subscription content,log in via an institution to check access.

Access this chapter

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Wise, M.: YAP3: improved detection of similarities in computer program and other texts. In: Proceedings of the twenty-seventh SIGCSE technical symposium on Computer science education, pp. 130–134 (1996)

    Google Scholar 

  2. Prechelt, L., Malpohl, G., Philippsen, M.: Finding plagiarisms among a set of programs with JPlag. Journal of Universal Computer Science 8(11), 1016–1038 (2002)

    Google Scholar 

  3. Schleimer, S., Wilkerson, D., Aiken, A.: Winnowing: local algorithms for document fingerprinting. In: Proceedings of the 2003 ACM SIGMOD international conference on Management of data, pp. 76–85 (2003)

    Google Scholar 

  4. Tamada, H., Nakamura, M., Monden, A., Matsumoto, K.: Java Birthmarks-Detecting the Software Theft. IEICE Transactions on Information and Systems, 2148–2158 (2005)

    Google Scholar 

  5. Myles, G., Collberg, C.: K-gram based software birthmarks. In: Proceedings of the 2005 ACM symposium on Applied computing, pp. 314–318 (2005)

    Google Scholar 

  6. Myles, G., Collberg, C.: Detecting software theft via whole program path birthmarks. In: Information Security Conference, pp. 404–415 (2004)

    Google Scholar 

  7. Collberg, C., Thomborson, C., Low, D.: Manufacturing cheap, resilient, and stealthy opaque constructs. In: Proceedings of the 25th ACM SIGPLAN-SIGACT symposium on Principles of programming languages, pp. 184–196 (1998)

    Google Scholar 

  8. Schuler, D., Dallmeier, V., Lindig, C.: A Dynamic Birthmark for Java. In: Proceedings of the 22nd IEEE/ACM International Conference on Automated Software Engineering, pp. 274–283 (2007)

    Google Scholar 

  9. Tamada, H., Okamoto, K., Nakamura, M., Monden, A., Matsumoto, K.: Dynamic Software Birthmarks to Detect the Theft of Windows Applications. In: International Symposium on Future Software Technology (ISFST 2004) (2004)

    Google Scholar 

  10. Choi, S., Park, H., Lim, H., Han, T.: A Static Birthmark of Binary Executables Based on API Call Structure. In: Cervesato, I. (ed.) ASIAN 2007. LNCS, vol. 4846, pp. 2–16. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  11. Needleman, S., Wunsch, C.: A general method applicable to search for similarities in amino acid sequence of 2 proteins. Journal of Molecular Biology 48, 443–453 (1970)

    Article  Google Scholar 

  12. Temple, F., Michael, S.: Identification of Common Molecular Subsequences. Journal of Molecular Biology 147, 195–197 (1981)

    Article  Google Scholar 

  13. Brudno, M., Malde, S., Poliakov, A., Do, C., Couronne, O., Dubchak, I., Batzoglou, S.: Glocal alignment: finding rearrangements during alignment. Bioinformatics 19, 54–62 (2003)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

  1. Division of Computer Science, KAIST, Gwahangno 335, Yuseong-gu, Daejeon, 305-701, Republic of Korea

    Heewan Park, Seokwoo Choi, Hyun-il Lim & Taisook Han

Authors
  1. Heewan Park
  2. Seokwoo Choi
  3. Hyun-il Lim
  4. Taisook Han

Editor information

Editors and Affiliations

  1. Institute of Industrial Science, University of Tokyo, 4-6-1 Komaba, Meguro-ku, 153-8505, Tokyo, Japan

    Kanta Matsuura

  2. NTT Information Sharing Platform Laboratories, NTT Corporation, Japan

    Eiichiro Fujisaki

Rights and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Park, H., Choi, S., Lim, Hi., Han, T. (2008). Detecting Java Theft Based on Static API Trace Birthmark. In: Matsuura, K., Fujisaki, E. (eds) Advances in Information and Computer Security. IWSEC 2008. Lecture Notes in Computer Science, vol 5312. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-89598-5_8

Download citation

Publish with us


[8]ページ先頭

©2009-2025 Movatter.jp