Browse > Article

Efficient Similarity Measurement Technique of Windows Software using Dynamic Birthmark based on API  

Park, Daeshin (숭실대학교 컴퓨터학과)
Jie, Hyunho (숭실대학교 컴퓨터학과)
Park, Youngsu (숭실대학교 컴퓨터학과)
Hong, JiMan (숭실대학교 컴퓨터학부)
Publication Information
Smart Media Journal / v.4, no.2, 2015 , pp. 34-45 More about this Journal
Abstract
The illegal copy of Windows software is one of the problems, because Windows is the most popular operating system in the country. The illegal copy can be infringe a software copyright, and software birthmark is one of solutions which is protecting software copyright. Software birthmark is a technique to distinguish software piracy using feature information from software. The type of software birthmark can be differentiated between static birthmark and dynamic birthmark through an extraction method. Static birthmark and dynamic birthmark have strengths and weaknesses. In this paper, we propose similarity measurement technique using dynamic birthmark based on API, and we explain extraction process of dynamic birthmark. In addition, we have verified that the proposed similarity measurement technique meet resilience and credibility through experiment. Furthermore, we saw that proposed measurement technique better than existing measurement technique.
Keywords
Software Birthmark; Similarity Measurement; Source Code Piracy;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Ginger Marie Myles, "Software Theft Detection Through Program Identification", Ph. D. Thesis, Department of Computer Science, The University of Arizona, 2006.
2 Collberg C. S., and Thomborson C., "Watermarking, tamper- proofing, and obfuscation-tools for software protection", IEEE Transactions on software engineering, Vol. 28, pp. 735-746, August. 2002.   DOI
3 N.R. Wanger, "Fingerprinting", IEEE Symposium on Security and Privacy, pp. 18-22, 1983.
4 Tamada, H., Okamoto, K., Nakamura, M., Monden, A., and Matsumoto, K. I., "Dynamic software birthmarks to detect the theft of windows applications", International Symposium on Future Software Technology, Vol. 2004, October. 2004,
5 Tamada, H., Nakamura, M., Monden, A., and Matsumoto, K. I., "Java Birthmarks--Detecting the Software Theft--", IEICE transactions on information and systems, Vol. 88, No.9, pp. 2148-2158, 2005.
6 Ginger Myles and Christian Collberg, "k-Gram Based Software Birthmarks", In Proceedings of the 2005 ACM Symposium on Applied Computing, pp. 314-318, 2005.
7 Ricardo B. Y. and Berthier R. N., "Modern Information Retrieval" ACM Press, Vol. 463, 1999.
8 Galen H. and Doug B., "Detours: binary interception of win32 functions", In Proceedings of the Third USENIX Windows NT Symposium, pp. 135-143, 1999.