Behavior based software theft detection. Wang, X., Jhi, Y., Zhu, S., & Liu, P. In Proc. of the 16th ACM Conf. on Computer and Communications Security, pages 280--290, 2009. biblatexdata[__markedentry=[remco:];acmid=1653696;numpages=11] bibtex: Wang2009abstract bibtex Along with the burst of open source projects, software theft (or plagiarism) has become a very serious threat to the healthiness of software industry. Software birthmark, which represents the unique characteristics of a program, can be used for software theft detection. We propose a system call dependence graph based software birthmark called SCDG birthmark, and examine how well it reflects unique behavioral characteristics of a program. To our knowledge, our detection system based on SCDG birthmark is the first one that is capable of detecting software component theft where only partial code is stolen. We demonstrate the strength of our birthmark against various evasion techniques, including those based on different compilers and different compiler optimization levels as well as two state-of-the-art obfuscation tools. Unlike the existing work that were evaluated through small or toy software, we also evaluate our birthmark on a set of large software. Our results show that SCDG birthmark is very practical and effective in detecting software theft that even adopts advanced evasion techniques.
@inproceedings{wang_behavior_2009,
title = {Behavior based software theft detection},
abstract = {Along with the burst of open source projects, software theft (or plagiarism) has become a very serious threat to the healthiness of software industry. Software birthmark, which represents the unique characteristics of a program, can be used for software theft detection. We propose a system call dependence graph based software birthmark called SCDG birthmark, and examine how well it reflects unique behavioral characteristics of a program. To our knowledge, our detection system based on SCDG birthmark is the first one that is capable of detecting software component theft where only partial code is stolen. We demonstrate the strength of our birthmark against various evasion techniques, including those based on different compilers and different compiler optimization levels as well as two state-of-the-art obfuscation tools. Unlike the existing work that were evaluated through small or toy software, we also evaluate our birthmark on a set of large software. Our results show that SCDG birthmark is very practical and effective in detecting software theft that even adopts advanced evasion techniques.},
booktitle = {Proc. of the 16th {ACM} {Conf}. on {Computer} and {Communications} {Security}},
author = {Wang, Xinran and Jhi, Yoon-Chan and Zhu, Sencun and Liu, Peng},
year = {2009},
note = {biblatexdata[\_\_markedentry=[remco:];acmid=1653696;numpages=11]
bibtex: Wang2009},
keywords = {bdiff\_, dynamic analysis, program analysis, software birthmark, software plagiarism, software similarity, software theft},
pages = {280--290}
}
Downloads: 0
{"_id":"s6qdujY3nmyFbFRTz","bibbaseid":"wang-jhi-zhu-liu-behaviorbasedsoftwaretheftdetection-2009","downloads":0,"creationDate":"2016-10-15T13:23:23.249Z","title":"Behavior based software theft detection","author_short":["Wang, X.","Jhi, Y.","Zhu, S.","Liu, P."],"year":2009,"bibtype":"inproceedings","biburl":"http://bibbase.org/zotero/pentarious","bibdata":{"bibtype":"inproceedings","type":"inproceedings","title":"Behavior based software theft detection","abstract":"Along with the burst of open source projects, software theft (or plagiarism) has become a very serious threat to the healthiness of software industry. Software birthmark, which represents the unique characteristics of a program, can be used for software theft detection. We propose a system call dependence graph based software birthmark called SCDG birthmark, and examine how well it reflects unique behavioral characteristics of a program. To our knowledge, our detection system based on SCDG birthmark is the first one that is capable of detecting software component theft where only partial code is stolen. We demonstrate the strength of our birthmark against various evasion techniques, including those based on different compilers and different compiler optimization levels as well as two state-of-the-art obfuscation tools. Unlike the existing work that were evaluated through small or toy software, we also evaluate our birthmark on a set of large software. Our results show that SCDG birthmark is very practical and effective in detecting software theft that even adopts advanced evasion techniques.","booktitle":"Proc. of the 16th ACM Conf. on Computer and Communications Security","author":[{"propositions":[],"lastnames":["Wang"],"firstnames":["Xinran"],"suffixes":[]},{"propositions":[],"lastnames":["Jhi"],"firstnames":["Yoon-Chan"],"suffixes":[]},{"propositions":[],"lastnames":["Zhu"],"firstnames":["Sencun"],"suffixes":[]},{"propositions":[],"lastnames":["Liu"],"firstnames":["Peng"],"suffixes":[]}],"year":"2009","note":"biblatexdata[__markedentry=[remco:];acmid=1653696;numpages=11] bibtex: Wang2009","keywords":"bdiff_, dynamic analysis, program analysis, software birthmark, software plagiarism, software similarity, software theft","pages":"280--290","bibtex":"@inproceedings{wang_behavior_2009,\n\ttitle = {Behavior based software theft detection},\n\tabstract = {Along with the burst of open source projects, software theft (or plagiarism) has become a very serious threat to the healthiness of software industry. Software birthmark, which represents the unique characteristics of a program, can be used for software theft detection. We propose a system call dependence graph based software birthmark called SCDG birthmark, and examine how well it reflects unique behavioral characteristics of a program. To our knowledge, our detection system based on SCDG birthmark is the first one that is capable of detecting software component theft where only partial code is stolen. We demonstrate the strength of our birthmark against various evasion techniques, including those based on different compilers and different compiler optimization levels as well as two state-of-the-art obfuscation tools. Unlike the existing work that were evaluated through small or toy software, we also evaluate our birthmark on a set of large software. Our results show that SCDG birthmark is very practical and effective in detecting software theft that even adopts advanced evasion techniques.},\n\tbooktitle = {Proc. of the 16th {ACM} {Conf}. on {Computer} and {Communications} {Security}},\n\tauthor = {Wang, Xinran and Jhi, Yoon-Chan and Zhu, Sencun and Liu, Peng},\n\tyear = {2009},\n\tnote = {biblatexdata[\\_\\_markedentry=[remco:];acmid=1653696;numpages=11] \nbibtex: Wang2009},\n\tkeywords = {bdiff\\_, dynamic analysis, program analysis, software birthmark, software plagiarism, software similarity, software theft},\n\tpages = {280--290}\n}\n\n","author_short":["Wang, X.","Jhi, Y.","Zhu, S.","Liu, P."],"key":"wang_behavior_2009","id":"wang_behavior_2009","bibbaseid":"wang-jhi-zhu-liu-behaviorbasedsoftwaretheftdetection-2009","role":"author","urls":{},"keyword":["bdiff_","dynamic analysis","program analysis","software birthmark","software plagiarism","software similarity","software theft"],"downloads":0},"search_terms":["behavior","based","software","theft","detection","wang","jhi","zhu","liu"],"keywords":["bdiff_","dynamic analysis","program analysis","software birthmark","software plagiarism","software similarity","software theft"],"authorIDs":[],"dataSources":["QiRZ7m7shEMvADZkd"]}