Watermarking, tamper-proffing, and obfuscation: tools for software protection
IEEE Transactions on Software Engineering
Behavior based software theft detection
Proceedings of the 16th ACM conference on Computer and communications security
Detecting Software Theft via System Call Based Birthmarks
ACSAC '09 Proceedings of the 2009 Annual Computer Security Applications Conference
A static birthmark of binary executables based on API call structure
ASIAN'07 Proceedings of the 12th Asian computing science conference on Advances in computer science: computer and network security
ICSM '10 Proceedings of the 2010 IEEE International Conference on Software Maintenance
Software Asset Management: Analysis, Development and Implementation
Information Resources Management Journal
A Static Birthmark for MS Windows Applications Using Import Address Table
IMIS '13 Proceedings of the 2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing
Hi-index | 0.00 |
The software industry has been increasingly aware of the need to employ copyright protection techniques against software piracy or illegal distribution. Recently, as the value of software as intellectual property grows, so does the rate of global software piracy. Software piracy is a real threat to software industry. Moreover, Pirated software is more vulnerable to attacks since such software is less likely to be supported with critical security patches and updates. In this paper, we propose a birthmark-based software asset management technique to keep track of the lists and licenses of software assets (on desktop computers, servers, and intranet network components), and then assure the legal use and regular inspection of software assets. A software birthmark is the inherent and unique program characteristics that can identify a program. Using software birthmark, we investigate what kinds of software are installed on the system, whether software is purchased from a vendor or pirated, etc. The proposed technique can (1) control copyright infringement of software and protect software intellectual property based on software birthmark, (2) reduce cyber vulnerability by letting employees use legal software, and (3) reduce the software management cost of organizations.