Design and Evaluation of Dynamic Software Birthmarks Based on API Calls
نویسندگان
چکیده
This paper presents a technique of dynamic software birthmarks to support efficient detection of software theft. A dynamic birthmark f(p, I) is a set of unique and native characteristics of a program p, obtained by executing p with a given input I . For a pair of software p and q, if f(p, I) = f(q, I) holds, q is suspected as a copy of p. In this paper, we propose two kinds of dynamic birthmarks, EXESEQ and EXEFREQ for the above f . In general, it is difficult for adversaries to alter API calls in the binary code automatically. Based on the fact, we extensively use runtime information of API calls as a strong signature of the program, specifically, the execution order for EXESEQ and the frequency distribution for EXEFREQ. We evaluated the proposed birthmarks through two experiments. The first experiment evaluates the preservation and distinction properties of the birthmarks with a set of the same-purpose applications. In the second experiment, we examined the impact of using different compilers. The results showed that the birthmarks of an extended-version application was very similar to that of its ancestor application, and that the birthmarks are robust enough to tolerate different compilers.
منابع مشابه
Detecting Java Theft Based on Static API Trace Birthmark
Software birthmark is the inherent program characteristics that can identify a program. In this paper, we propose a static API trace birthmark to detect Java theft. Because the API traces can reflect the behavior of a program, our birthmark is more resilient than the existing static birthmarks. Because the API traces are extracted by static analysis, they can be applied to library programs whic...
متن کاملDyVSoR: dynamic malware detection based on extracting patterns from value sets of registers
To control the exponential growth of malware files, security analysts pursue dynamic approaches that automatically identify and analyze malicious software samples. Obfuscation and polymorphism employed by malwares make it difficult for signature-based systems to detect sophisticated malware files. The dynamic analysis or run-time behavior provides a better technique to identify the threat. In t...
متن کاملExploiting thread-related system calls for plagiarism detection of multithreaded programs
Dynamic birthmarking used to be an effective approach to detecting software plagiarism. Yet the new trend towards multithreaded programming renders existing algorithms almost useless, due to the fact that thread scheduling nondeterminism severely perturbs birthmark generation and comparison. In this paper, we redesign birthmark based software plagiarism detection algorithms to make such approac...
متن کاملComputational Fluid Dynamics Simulation and Experimental Validation of Hydraulic Performance of a Vertical Suspended API Pump (RESEARCH NOTE)
For a long period of time, design and manufacturing technology of high flow rated vertically suspended pumps (VSPs) which have an extensive applications in many industries such as water and wastewater, mining, petrochemical and oil and gas industries, used to be imported from European countries. For the first time in Iran's pump industry, with the support of Ministry of Petrochemical[ah1] and ...
متن کاملModelface: an application programming interface (API) for homology modeling studies using Modeller software
An interactive application, Modelface, was presented for Modeller software based on windows platform. The application is able to run all steps of homology modeling including pdb to fasta generation, running clustal, model building and loop refinement. Other modules of modeler including energy calculation, energy minimization and the ability to make single point mutations in the PDB structures a...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007