A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Semantics-based obfuscation-resilient binary code similarity comparison with applications to software plagiarism detection
2014
Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering - FSE 2014
Existing code similarity comparison methods, whether source or binary code based, are mostly not resilient to obfuscations. ...
We then model the semantics similarity of two paths using the longest common subsequence with basic blocks as elements. This novel combination has resulted in strong resiliency to code obfuscation. ...
Existing code similarity measurement methods include clone detection, binary similarity detection, and software plagiarism detection. ...
doi:10.1145/2635868.2635900
dblp:conf/sigsoft/LuoMW0Z14
fatcat:nze4yeccm5dwdmvbxkx2duckmq
Revisiting the Challenges and Opportunities in Software Plagiarism Detection
2020
2020 IEEE 27th International Conference on Software Analysis, Evolution and Reengineering (SANER)
Index Terms-software plagiarism detection, software birthmark, source code similarity, binary code similarity I. PUBLISHED WORK Software plagiarism plagues software industry. ...
to detect partial plagiarism, the resiliency to code obfuscation, the interpretability on detection results, and the scalability to process large-scale software. ...
doi:10.1109/saner48275.2020.9054847
dblp:conf/wcre/XuFJW0ZL20
fatcat:adqsuz265jafjiyu2xygl2pvri
DKISB: Dynamic Key Instruction Sequence Birthmark for Software Plagiarism Detection
2013
2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing
of semantic-preserving code obfuscation techniques. ...
With the burst of open source software, software plagiarism has been a serious threat to the healthy development of software industry. ...
Similar results are also observed among all the binaries of gzip.
2) Resilience to special obfuscation tools. ...
doi:10.1109/hpcc.and.euc.2013.93
dblp:conf/hpcc/TianZLF13
fatcat:y3kwbmd4v5b4pmqn32xmltykyq
Program Logic Based Software Plagiarism Detection
2014
2014 IEEE 25th International Symposium on Software Reliability Engineering
In this paper, we propose LoPD, a program logic based approach to software plagiarism detection. ...
LoPD is more resilient to current automatic obfuscation techniques, compared to the existing detection mechanisms. ...
TABLE I THE I CODE OBFUSCATION RESILIENCE COMPARISON OF DIFFERENT executable binaries. ...
doi:10.1109/issre.2014.18
dblp:conf/issre/ZhangW0Z14
fatcat:kjaigmwyqza7rgjy2ra354o3wq
Comparative Analysis of Technical Methods for Detecting Software Thefts
2016
Journal of Computers
To deal with the problem, there have been researches on detecting software thefts. ...
In this paper, we introduce technical methods for detecting software thefts, and compare characteristics of the methods according to several performance evaluation criteria. ...
In comparing resilience of methods, source code plagiarism detection method has medium resilience, because source code can be easily understood and modified to hide the fact of software theft. ...
doi:10.17706/jcp.11.1.26-32
fatcat:lmkug52bgrcxrdaefxrbjn73um
Program Characterization Using Runtime Values and Its Application to Software Plagiarism Detection
2015
IEEE Transactions on Software Engineering
Our value-based plagiarism detection method (VaPD) uses the longest common subsequence based similarity measuring algorithms to check whether two code fragments belong to the same lineage. ...
Identifying similar or identical code fragments becomes much more challenging in code theft cases where plagiarizers can use various automated code transformation or obfuscation techniques to hide stolen ...
ACKNOWLEDGMENTS The authors would like to thank Jonas Maebe of University of Ghent for his help in compiling and using Loco and Diablo; Semantic Designs, Inc. for donating C/C++ obfuscators. ...
doi:10.1109/tse.2015.2418777
fatcat:uc2n42syy5fi7msp7lbfk4g2au
Value-based program characterization and its application to software plagiarism detection
2011
Proceeding of the 33rd international conference on Software engineering - ICSE '11
Identifying similar or identical code fragments becomes much more challenging in code theft cases where plagiarizers can use various automated code transformation techniques to hide stolen code from being ...
We show how the values can be extracted and refined to expose the critical values and how we can apply this runtime property to help solve problems in software plagiarism detection. ...
CONCLUSION Obfuscation resilient code characterization is important for many code analysis applications, including code theft detection. ...
doi:10.1145/1985793.1985899
dblp:conf/icse/JhiWJZLW11
fatcat:4ufcjnrpr5duxlo2ti5ue6oqcu
MobileFindr: Function Similarity Identification for Reversing Mobile Binaries
[chapter]
2018
Lecture Notes in Computer Science
Identifying binary code at function level has been applied to a broad range of software security applications and reverse engineering tasks, including patch analysis, vulnerability assessment, code plagiarism ...
In this paper, we propose MobileFindr, an on-device trace-based function similarity identification framework on the mobile platform. ...
Introduction With the general availability of closed-source applications, there is a need to identify function similarity among binary executables. ...
doi:10.1007/978-3-319-99073-6_4
fatcat:hcka2fobsfe5ljdzimzc4kcfha
A first step towards algorithm plagiarism detection
2012
Proceedings of the 2012 International Symposium on Software Testing and Analysis - ISSTA 2012
The results show that our approaches to algorithm plagiarism detection are practical, effective and resilient to many automatic obfuscation techniques. ...
In contrast to software plagiarism, which has been extensively studied, limited attention has been paid to algorithm plagiarism. ...
[30] proposed a tree-based clone detection in binary code. Most clone detection techniques do not take code obfuscation into consideration. ...
doi:10.1145/2338965.2336767
dblp:conf/issta/ZhangJWLZ12
fatcat:kg3pa543gva2dhzg3ezpi7v6oy
Detecting Software Theft via System Call Based Birthmarks
2009
2009 Annual Computer Security Applications Conference
Along with the burst of open source projects, software theft (or plagiarism) has become a very serious threat to the healthiness of software industry. ...
To our knowledge, our detection system based on SCSSB and IDSCSB is the first one that is capable of software component theft detection where only partial code is stolen. ...
ACKNOWLEDGMENT The authors would like to thank Jonas Maebe of University of Ghent for his help in compiling and using Loco and Diablo; Semantic Designs, Inc. for donating C/C++ obfuscators. ...
doi:10.1109/acsac.2009.24
dblp:conf/acsac/WangJZL09
fatcat:fger2nwvxjfizkne6sw3yogi7y
Software Birthmark Usability for Source Code Transformation Using Machine Learning Algorithms
2021
Scientific Programming
Among the existing approaches, software birthmark was one of the approaches developed with the aim to detect software piracy that exists in the software. ...
Various features are extracted from software which are collectively termed as "software birthmark." Based on these extracted features, the piracy that exists in the software can be detected. ...
To detect transformation in source code or software theft, the birthmarks of software applications are matched, and similar birthmark identifies software piracy. ...
doi:10.1155/2021/5547766
fatcat:aa23xr5avjb3hir7kktcmpovym
Plagiarism Detection of Multi-threaded Programs via Siamese Neural Networks
2020
IEEE Access
The experimental results based on a public software plagiarism sample set demonstrate that NeurMPD copes better with multi-threaded plagiarism detection than alternative approaches. ...
In order to detect such evolving software plagiarism, software dynamic birthmark techniques of better anti-obfuscation ability serve as one of the most promising methods. ...
In other words, resilience reflects the ability of plagiarism detection model to be resistant to all kinds of semantic-retention code obfuscations, while credibility characterizes the ability of plagiarism ...
doi:10.1109/access.2020.3021184
fatcat:ber4izh7j5ahrepa266dpyttcu
BinMatch: A Semantics-based Hybrid Approach on Binary Code Clone Analysis
[article]
2018
arXiv
pre-print
Binary code clone analysis is an important technique which has a wide range of applications in software engineering (e.g., plagiarism detection, bug detection). ...
In this paper, we propose a semantics-based hybrid approach to detect binary clone functions. ...
We would like to thank the anonymous reviewers for their insightful comments which greatly help to improve the manuscript. This work is partially sup- ...
arXiv:1808.06216v1
fatcat:f3gpblzi7fblnopeanutbxgqqq
Detecting Software Theft via Whole Program Path Birthmarks
[chapter]
2004
Lecture Notes in Computer Science
A software birthmark is a unique characteristic of a program that can be used as a software theft detection technique. ...
Our evaluation demonstrates that, for the detection of theft of an entire program, Whole Program Path birthmarks are more resilient to attack than previously proposed techniques. ...
Plagiarism detection is another area which is very similar to software birthmarking. A variety of plagiarism detection techniques have been proposed (e.g. ...
doi:10.1007/978-3-540-30144-8_34
fatcat:nvzt367npzdxhpvlez5zx32tta
BinSim: Trace-based Semantic Binary Diffing via System Call Sliced Segment Equivalence Checking
2017
USENIX Security Symposium
Detecting differences between two binary executables (binary diffing), first derived from patch analysis, have been widely employed in various software security analysis tasks, such as software plagiarism ...
Our approach improves existing semantics-based binary diffing by 1) inferring whether two executable binaries' behaviors are conditionally equivalent; 2) detecting the similarities or differences, whose ...
The similarity between an intellectual property protected binary and a suspicious binary indicates a potential case of software plagiarism [41, 73] . ...
dblp:conf/uss/MingXJW17
fatcat:5ixykyxrnjbpnempcgjymijkdi
« Previous
Showing results 1 — 15 out of 88 results