Prachi M. Tamgadge, S. A. Murab
Watermarking, Obfuscation, Software Birthmark, Heap Graph, Theft Detection
- C. Collberg and C. Thomborson, “Software watermarking: Models and dynamic embeddings,” in Proceeding Symposium Principles of Programming Languages (POPL’99), 1999, pp. 311–324.
- A. Monden, H. Iida, K. I. Matsumoto, K. Inoue, and K. Torii, “Watermarking java programs,” in Proceeding International Symposium Future Software Technology, Nanjing, China, 1999.
- C. Collberg, E. Carter, S. Debray, A. Huntwork, J. Kececioglu, C. Linn, and M. Stepp, “Dynamic path-based software watermarking,” in Proceeding ACM SIGPLAN 2004 Conference Programming Language Design and Implementation (PLDI ’04), New York, 2004, pp. 107–118, ACM.
- Derrick Grover. Program identiﬁcation. In Derrick Grover, editor, The Protection of Computer Software – Its Technology and Applications, pages 122–154. Cambridge University Press, 1989.
- G. Myles and C. Collberg, “Detecting software theft via whole program path birthmarks,” in Proceeding Inf. Security 7th International Conference (ISC 2004), Palo Alto, CA, Sep. 27–29, 2004, pp. 404–415.
- H. Tamada, K. Okamoto, M. Nakamura, and A. Monden, “Dynamic software birthmarks to detect the theft of windows applications,” in Proceeding International Symposium Future Software Technology Xian, China, 2004.
- H. Tamada, K. Okamoto, M. Nakamura, A. Monden, and K. I. Matsumoto, “Design and Evaluation of birthmarks for detecting theft of java programs”, in Proceeding IASTED International Conference Software Engineering, 2004, pp. 569-575.
- G. Myles and C. Collberg, “K-gram based software birthmarks,” in Proceeding 2005 ACM Symposium Application Computing (SAC ’05), New York, 2005, pp. 314–318, ACM.
- H. Tamada, K. Okamoto, M. Nakamura, A. Monden, and K. I. Matsumoto, “Design and Evaluation of Dynamic Software Birthmarks based on API Calls”, Nara Institute of Science and Technology, Rep., 2007.
- D. Schuler, V. Dallmeier, and C. Lindig, “A dynamic birthmark for java,” in Proceeding 22nd IEEE/ACM International Conference Automated Software Engineering (ASE ’07), New York, 2007, pp. 274–283, ACM.
- X. Wang, Y. C. Jhi, S. Zhu, and P. Liu, “Behavior based software theft detection,” in Proceeding 16th ACM Conference Comput. and Commun. Security (CCS ’09), New York, 2009, pp. 280–290, ACM
- P. Chan, L. Hui, and S. Yiu, “Heap graph based software theft detection” 2013 IEEE Transactions on Information Forensics and Security, 2013,v. 8 n. 1, p.101
|Published in :
||Volume 2 | Issue 2 | March-April - 2016
|Date of Publication
Cite This Article
Prachi M. Tamgadge, S. A. Murab, "Improving Performance of Graph Selector in Heap Graph Based Software Theft Detection", International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 2, Issue 2, pp.306-310, March-April-2016.
URL : http://ijsrset.com/IJSRSET162291.php