Proceedings of the twenty-second IEEE/ACM international conference on Automated software engineering
A static API birthmark for Windows binary executables
Journal of Systems and Software
Detecting Theft of Java Applications via a Static Birthmark Based on Weighted Stack Patterns
IEICE - Transactions on Information and Systems
A method for detecting the theft of Java programs through analysis of the control flow information
Information and Software Technology
A static birthmark of binary executables based on API call structure
ASIAN'07 Proceedings of the 12th Asian computing science conference on Advances in computer science: computer and network security
Measuring similarity of windows applications using static and dynamic birthmarks
Proceedings of the 28th Annual ACM Symposium on Applied Computing
An effective API extraction scheme for dynamic binary similarity comparison
Proceedings of the 2013 Research in Adaptive and Convergent Systems
Hi-index | 0.00 |
Prior to the general availability of high speed Internet, the spread of pirated software required the transfer of a physical copy like a disk, which limited the rate at which illegal software could be distributed. The low transfer rate restricted software piracy to levels which producers found acceptable because the associated losses could be absorbed. Large scale cases of piracy were rare and when they did occur the legal system provided suitable retribution. However, recent advances in computer technology have made the need for a physical copy obsolete. Piracy is now a widespread, decentralized problem in which millions of individuals take part. Without technical means of identifying pirated software, the protection afforded by the legal system is no longer easy to enforce or cost effective. The research in this dissertation addresses the threat of software piracy through the exploration of two techniques: software watermarking and software birthmarking. Neither of these techniques can be used to prevent software theft entirely. Instead, they are used to detect occurrences of theft after the fact. One of the limiting factors of the protection provided by the legal system is that it cannot be used to identify an incidence of piracy. Software watermarking and birthmarking fill this gap, thus providing complimentary protection to the established legal protection. In this research, we analyze the state of the art in both software watermarking and birthmarking and we propose a novel scheme in each of the areas which make significant improvements over existing techniques.