2008
DOI: 10.1007/978-3-540-89598-5_8
|View full text |Cite
|
Sign up to set email alerts
|

Detecting Java Theft Based on Static API Trace Birthmark

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
19
0

Year Published

2009
2009
2023
2023

Publication Types

Select...
6
2
1

Relationship

2
7

Authors

Journals

citations
Cited by 22 publications
(19 citation statements)
references
References 11 publications
0
19
0
Order By: Relevance
“…These algorithms compute the birthmark from the sequence of method calls within a class, the inheritance path from the root class to a given class, and the types that a class employs, respectively, [24], [25]. In addition, Park et al proposed a static API-call-based birthmark for software theft detection of Java applications [26]. Choi et al additionally presented a static API birthmark for Windows execution files using a set of API calls identified as being static by a disassembler [27].…”
Section: Api-based Birthmarksmentioning
confidence: 99%
“…These algorithms compute the birthmark from the sequence of method calls within a class, the inheritance path from the root class to a given class, and the types that a class employs, respectively, [24], [25]. In addition, Park et al proposed a static API-call-based birthmark for software theft detection of Java applications [26]. Choi et al additionally presented a static API birthmark for Windows execution files using a set of API calls identified as being static by a disassembler [27].…”
Section: Api-based Birthmarksmentioning
confidence: 99%
“…Because the two approaches only consider the physical orders of instructions, they are susceptible to program modifications that change control flows of programs. Park et al presented methods for detecting software thefts by comparing the full traces of instructions [34] or API calls [33] of programs. These approaches can be applied only to small programs, because the number of traces may exponentially increase according to the program structures.…”
Section: Related Workmentioning
confidence: 99%
“…Thus, such approaches are susceptible to program transformations. Park et al [8] presented the API trace birthmark for Java programs that proceeds by constructing sets of static API traces, but the usage of this approach is limited to programs which use plentiful API calls.…”
Section: Related Work and Motivationmentioning
confidence: 99%
“…The numbers of total control flow edges ranged between 3,566 and 5,679, and the average numbers of control flow edges in a class file ranged between 84 and 127. For a comparative evaluation of the performance of the proposed birthmark, two previous approaches, the k-gram based [5], [6] and API Trace [8] birthmarks, were also evaluated.…”
Section: A Preliminariesmentioning
confidence: 99%