Modern Information Retrieval
K-gram based software birthmarks
Proceedings of the 2005 ACM symposium on Applied computing
Software theft detection through program identification
Software theft detection through program identification
Detours: binary interception of Win32 functions
WINSYM'99 Proceedings of the 3rd conference on USENIX Windows NT Symposium - Volume 3
Hi-index | 0.00 |
Software piracy causes serious problems in many software-related industries. Dynamic binary similarity comparison methods can be used to detect software piracy. However, such methods generate large logs that require long periods of time to perform similarity comparisons. In this paper, we propose an extraction method that facilitates effective binary similarity comparisons. Using the cosine similarity and k-gram similarity, the proposed scheme is shown to be effective for binary similarity comparisons.