Acknowledgement
Supported by : 문화체육관광부, 한국저작권위원회
References
- H. Tamada, M. Nakamura, A. Monden, and K. Matsumoto, "Java birthmark Detecting the software theft," IEICE Transactions on Information and Systems, Vol. 88, No. 9, pp. 2148-2158, Sep. 2005.
- G. Myles and C. Collberg, "k-gram Based Software Birthmarks," Proceeding of the 2005 ACM Symposium on Applied Computing, pp. 314-318, 2005.
- S. Park, S. Ryu, and H. Han, "Software similarity comparison using API sequences on static major path," Proc. of KIISE Korea Computer Congress 2014, pp. 71-73, Jun. 2014. (in Korean)
- G. Myles, "Software Theft Detection Through Program Identification," Ph.D. Thesis, Dept. of Computer Science, The Univ. of Arizona, 2006.
- S. Park, S. Ko, and H. Han, "Binary Similarity comparison using trace-based function sequences," KIISE Workshop on Dependable Computing System, pp. 14-18, Aug. 2013. (in Korean)
- Smith T. F., and Waterman M. S., "Identification of Common Molecular Subsequences," Journal of Molecular Biology, Vol. 147, No. 1, pp. 195-197, 1981. https://doi.org/10.1016/0022-2836(81)90087-5
- Rognes, T., "Faster Smith-Waterman database searches with inter-sequence SIMD parallelisation," BMC Bioinformatics, Vol. 12, No. 1, pp. 221, 2011. https://doi.org/10.1186/1471-2105-12-221
- Brudno M., Malde S., Poliakov A., Do CB., Couronne O., Dubchak I., and Batzoglou S., "Glocal Alignment : finding rearrangements during alignment," Bioinformatics, Vol. 19, Suppl. 1, pp. i54-i62, 2003. https://doi.org/10.1093/bioinformatics/btg1005
- S. Schleimer, D. S. Wilkerson, and A. Aiken, "Winnowing: Local algorithms for document fingerprinting," Proceedings of the 2003 ACM SIGMOD International Conference on Management of Data, pp. 76-85, 2003.
- S. Choi, H. Park, H. Lim, and T. Han, "A static birthmark of binary executables based on API call structure," Advances in Computer Science-ASIAN 2007, Computer and Network Security, pp. 2-16, 2007.
- Wang, X., Jhi, Y., Zhu, S., and Liu, P., "Detecting software theft via system call based birthmarks," Proceedings of 25th Annual Computer Security Applications Conference, pp. 149-158, 2009.
Cited by
- Software Similarity Detection Using Highly Credible Dynamic API Sequences vol.43, pp.10, 2016, https://doi.org/10.5626/JOK.2016.43.10.1067
- Software Birthmark Design and Estimation: A Systematic Literature Review pp.2191-4281, 2019, https://doi.org/10.1007/s13369-019-03718-9