Filters








88 Hits in 5.8 sec

Semantics-based obfuscation-resilient binary code similarity comparison with applications to software plagiarism detection

Lannan Luo, Jiang Ming, Dinghao Wu, Peng Liu, Sencun Zhu
2014 Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering - FSE 2014  
Existing code similarity comparison methods, whether source or binary code based, are mostly not resilient to obfuscations.  ...  We then model the semantics similarity of two paths using the longest common subsequence with basic blocks as elements. This novel combination has resulted in strong resiliency to code obfuscation.  ...  Existing code similarity measurement methods include clone detection, binary similarity detection, and software plagiarism detection.  ... 
doi:10.1145/2635868.2635900 dblp:conf/sigsoft/LuoMW0Z14 fatcat:nze4yeccm5dwdmvbxkx2duckmq

Revisiting the Challenges and Opportunities in Software Plagiarism Detection

Xi Xu, Ming Fan, Ang Jia, Yin Wang, Zheng Yan, Qinghua Zheng, Ting Liu
2020 2020 IEEE 27th International Conference on Software Analysis, Evolution and Reengineering (SANER)  
Index Terms-software plagiarism detection, software birthmark, source code similarity, binary code similarity I. PUBLISHED WORK Software plagiarism plagues software industry.  ...  to detect partial plagiarism, the resiliency to code obfuscation, the interpretability on detection results, and the scalability to process large-scale software.  ... 
doi:10.1109/saner48275.2020.9054847 dblp:conf/wcre/XuFJW0ZL20 fatcat:adqsuz265jafjiyu2xygl2pvri

DKISB: Dynamic Key Instruction Sequence Birthmark for Software Plagiarism Detection

Zhenzhou Tian, Qinghua Zheng, Ting Liu, Ming Fan
2013 2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing  
of semantic-preserving code obfuscation techniques.  ...  With the burst of open source software, software plagiarism has been a serious threat to the healthy development of software industry.  ...  Similar results are also observed among all the binaries of gzip. 2) Resilience to special obfuscation tools.  ... 
doi:10.1109/hpcc.and.euc.2013.93 dblp:conf/hpcc/TianZLF13 fatcat:y3kwbmd4v5b4pmqn32xmltykyq

Program Logic Based Software Plagiarism Detection

Fangfang Zhang, Dinghao Wu, Peng Liu, Sencun Zhu
2014 2014 IEEE 25th International Symposium on Software Reliability Engineering  
In this paper, we propose LoPD, a program logic based approach to software plagiarism detection.  ...  LoPD is more resilient to current automatic obfuscation techniques, compared to the existing detection mechanisms.  ...  TABLE I THE I CODE OBFUSCATION RESILIENCE COMPARISON OF DIFFERENT executable binaries.  ... 
doi:10.1109/issre.2014.18 dblp:conf/issre/ZhangW0Z14 fatcat:kjaigmwyqza7rgjy2ra354o3wq

Comparative Analysis of Technical Methods for Detecting Software Thefts

Hyun-Il Lim
2016 Journal of Computers  
To deal with the problem, there have been researches on detecting software thefts.  ...  In this paper, we introduce technical methods for detecting software thefts, and compare characteristics of the methods according to several performance evaluation criteria.  ...  In comparing resilience of methods, source code plagiarism detection method has medium resilience, because source code can be easily understood and modified to hide the fact of software theft.  ... 
doi:10.17706/jcp.11.1.26-32 fatcat:lmkug52bgrcxrdaefxrbjn73um

Program Characterization Using Runtime Values and Its Application to Software Plagiarism Detection

Yoon-Chan Jhi, Xiaoqi Jia, Xinran Wang, Sencun Zhu, Peng Liu, Dinghao Wu
2015 IEEE Transactions on Software Engineering  
Our value-based plagiarism detection method (VaPD) uses the longest common subsequence based similarity measuring algorithms to check whether two code fragments belong to the same lineage.  ...  Identifying similar or identical code fragments becomes much more challenging in code theft cases where plagiarizers can use various automated code transformation or obfuscation techniques to hide stolen  ...  ACKNOWLEDGMENTS The authors would like to thank Jonas Maebe of University of Ghent for his help in compiling and using Loco and Diablo; Semantic Designs, Inc. for donating C/C++ obfuscators.  ... 
doi:10.1109/tse.2015.2418777 fatcat:uc2n42syy5fi7msp7lbfk4g2au

Value-based program characterization and its application to software plagiarism detection

Yoon-Chan Jhi, Xinran Wang, Xiaoqi Jia, Sencun Zhu, Peng Liu, Dinghao Wu
2011 Proceeding of the 33rd international conference on Software engineering - ICSE '11  
Identifying similar or identical code fragments becomes much more challenging in code theft cases where plagiarizers can use various automated code transformation techniques to hide stolen code from being  ...  We show how the values can be extracted and refined to expose the critical values and how we can apply this runtime property to help solve problems in software plagiarism detection.  ...  CONCLUSION Obfuscation resilient code characterization is important for many code analysis applications, including code theft detection.  ... 
doi:10.1145/1985793.1985899 dblp:conf/icse/JhiWJZLW11 fatcat:4ufcjnrpr5duxlo2ti5ue6oqcu

MobileFindr: Function Similarity Identification for Reversing Mobile Binaries [chapter]

Yibin Liao, Ruoyan Cai, Guodong Zhu, Yue Yin, Kang Li
2018 Lecture Notes in Computer Science  
Identifying binary code at function level has been applied to a broad range of software security applications and reverse engineering tasks, including patch analysis, vulnerability assessment, code plagiarism  ...  In this paper, we propose MobileFindr, an on-device trace-based function similarity identification framework on the mobile platform.  ...  Introduction With the general availability of closed-source applications, there is a need to identify function similarity among binary executables.  ... 
doi:10.1007/978-3-319-99073-6_4 fatcat:hcka2fobsfe5ljdzimzc4kcfha

A first step towards algorithm plagiarism detection

Fangfang Zhang, Yoon-Chan Jhi, Dinghao Wu, Peng Liu, Sencun Zhu
2012 Proceedings of the 2012 International Symposium on Software Testing and Analysis - ISSTA 2012  
The results show that our approaches to algorithm plagiarism detection are practical, effective and resilient to many automatic obfuscation techniques.  ...  In contrast to software plagiarism, which has been extensively studied, limited attention has been paid to algorithm plagiarism.  ...  [30] proposed a tree-based clone detection in binary code. Most clone detection techniques do not take code obfuscation into consideration.  ... 
doi:10.1145/2338965.2336767 dblp:conf/issta/ZhangJWLZ12 fatcat:kg3pa543gva2dhzg3ezpi7v6oy

Detecting Software Theft via System Call Based Birthmarks

Xinran Wang, Yoon-Chan Jhi, Sencun Zhu, Peng Liu
2009 2009 Annual Computer Security Applications Conference  
Along with the burst of open source projects, software theft (or plagiarism) has become a very serious threat to the healthiness of software industry.  ...  To our knowledge, our detection system based on SCSSB and IDSCSB is the first one that is capable of software component theft detection where only partial code is stolen.  ...  ACKNOWLEDGMENT The authors would like to thank Jonas Maebe of University of Ghent for his help in compiling and using Loco and Diablo; Semantic Designs, Inc. for donating C/C++ obfuscators.  ... 
doi:10.1109/acsac.2009.24 dblp:conf/acsac/WangJZL09 fatcat:fger2nwvxjfizkne6sw3yogi7y

Software Birthmark Usability for Source Code Transformation Using Machine Learning Algorithms

Keqing Guan, Shah Nazir, Xianli Kong, Sadaqat ur Rehman, Sikandar Ali
2021 Scientific Programming  
Among the existing approaches, software birthmark was one of the approaches developed with the aim to detect software piracy that exists in the software.  ...  Various features are extracted from software which are collectively termed as "software birthmark." Based on these extracted features, the piracy that exists in the software can be detected.  ...  To detect transformation in source code or software theft, the birthmarks of software applications are matched, and similar birthmark identifies software piracy.  ... 
doi:10.1155/2021/5547766 fatcat:aa23xr5avjb3hir7kktcmpovym

Plagiarism Detection of Multi-threaded Programs via Siamese Neural Networks

Zhenzhou Tian, Qing Wang, Cong Gao, Lingwei Chen, Dinghao Wu
2020 IEEE Access  
The experimental results based on a public software plagiarism sample set demonstrate that NeurMPD copes better with multi-threaded plagiarism detection than alternative approaches.  ...  In order to detect such evolving software plagiarism, software dynamic birthmark techniques of better anti-obfuscation ability serve as one of the most promising methods.  ...  In other words, resilience reflects the ability of plagiarism detection model to be resistant to all kinds of semantic-retention code obfuscations, while credibility characterizes the ability of plagiarism  ... 
doi:10.1109/access.2020.3021184 fatcat:ber4izh7j5ahrepa266dpyttcu

BinMatch: A Semantics-based Hybrid Approach on Binary Code Clone Analysis [article]

Yikun Hu, Yuanyuan Zhang, Juanru Li, Hui Wang, Bodong Li, Dawu Gu
2018 arXiv   pre-print
Binary code clone analysis is an important technique which has a wide range of applications in software engineering (e.g., plagiarism detection, bug detection).  ...  In this paper, we propose a semantics-based hybrid approach to detect binary clone functions.  ...  We would like to thank the anonymous reviewers for their insightful comments which greatly help to improve the manuscript. This work is partially sup-  ... 
arXiv:1808.06216v1 fatcat:f3gpblzi7fblnopeanutbxgqqq

Detecting Software Theft via Whole Program Path Birthmarks [chapter]

Ginger Myles, Christian Collberg
2004 Lecture Notes in Computer Science  
A software birthmark is a unique characteristic of a program that can be used as a software theft detection technique.  ...  Our evaluation demonstrates that, for the detection of theft of an entire program, Whole Program Path birthmarks are more resilient to attack than previously proposed techniques.  ...  Plagiarism detection is another area which is very similar to software birthmarking. A variety of plagiarism detection techniques have been proposed (e.g.  ... 
doi:10.1007/978-3-540-30144-8_34 fatcat:nvzt367npzdxhpvlez5zx32tta

BinSim: Trace-based Semantic Binary Diffing via System Call Sliced Segment Equivalence Checking

Jiang Ming, Dongpeng Xu, Yufei Jiang, Dinghao Wu
2017 USENIX Security Symposium  
Detecting differences between two binary executables (binary diffing), first derived from patch analysis, have been widely employed in various software security analysis tasks, such as software plagiarism  ...  Our approach improves existing semantics-based binary diffing by 1) inferring whether two executable binaries' behaviors are conditionally equivalent; 2) detecting the similarities or differences, whose  ...  The similarity between an intellectual property protected binary and a suspicious binary indicates a potential case of software plagiarism [41, 73] .  ... 
dblp:conf/uss/MingXJW17 fatcat:5ixykyxrnjbpnempcgjymijkdi
« Previous Showing results 1 — 15 out of 88 results