Java Birthmarks - Detecting the Software Theft -

نویسندگان

  • Haruaki Tamada
  • Masahide Nakamura
  • Akito Monden
  • Ken-ichi Matsumoto
چکیده

To detect the theft of Java class files efficiently, we propose a concept of Java birthmarks, which are unique and native characteristics of every class file. For a pair of class files p and q, if q has the same birthmark as p’s, q is suspected as a copy of p. Ideally, the birthmarks should satisfy the following properties: (a) preservation – the birthmarks should be preserved even if the original class file is tampered with, and (b) distinction – independent class files must be distinguished by completely different birthmarks. Taking (a) and (b) into account, we propose four types of birthmarks for Java class files. To show the effectiveness of the proposed birthmarks, we conduct three experiments. In the first experiment, we demonstrate that the proposed birthmarks are sufficiently robust against automatic program transformation (93.3876% of the birthmarks were preserved). The second experiment shows that the proposed birthmarks successfully distinguish non-copied files in a practical Java application (97.8005% of given class files were distinguished). In the third experiment, we exploit different Java compilers to confirm that the proposed Java birthmarks are core characteristics independent of compiler-specific issues. key words: copyright protection, software protection, watermark, birthmark

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Design and evaluation of birthmarks for detecting theft of java programs

¡¡¡¡¡¡¡ 200402.tex ABSTRACT To detect theft of Java class files efficiently, we have so far proposed a concept of Java birthmarks. Since the birthmarks are unique and native characteristics of every class file, a class file with the same birthmark of another can be easily suspected as a copy. However, performance and tolerance of the birthmarks against sophisticated attacks had not been evaluat...

متن کامل

Detecting Theft of Java Applications via a Static Birthmark Based on Weighted Stack Patterns

A software birthmark means the inherent characteristics of a program that can be used to identify the program. A comparison of such birthmarks facilitates the detection of software theft. In this paper, we propose a static Java birthmark based on a set of stack patterns, which reflect the characteristic of Java applications. A stack pattern denotes a sequence of bytecodes that share their opera...

متن کامل

Detecting Java Theft Based on Static API Trace Birthmark

Software birthmark is the inherent program characteristics that can identify a program. In this paper, we propose a static API trace birthmark to detect Java theft. Because the API traces can reflect the behavior of a program, our birthmark is more resilient than the existing static birthmarks. Because the API traces are extracted by static analysis, they can be applied to library programs whic...

متن کامل

A method for detecting the theft of Java programs through analysis of the control flow information

A software birthmark refers to the inherent characteristics of a program that can be used to identify the program. In this paper, a method for detecting the theft of Java programs through a static software birthmark is proposed that is based on the control flow information. The control flow information shows the structural characteristics and the possible behaviors during the execution of progr...

متن کامل

Dynamic Software Birthmarks to Detect the Theft of Windows Applications

This paper proposes dynamic software birthmarks which can be extracted during execution of Windows applications. Birthmarks are unique and native characteristics of software. For a pair of software p and q, if q has the same birthmarks as p’s, q is suspected as a copy of p. Our security analysis showed that the proposed birthmark has good tolerance against various kinds of program transformatio...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IEICE Transactions

دوره 88-D  شماره 

صفحات  -

تاریخ انتشار 2005