2014
DOI: 10.1080/19393555.2014.975557
|View full text |Cite
|
Sign up to set email alerts
|

Hunting for Pirated Software Using Metamorphic Analysis

Abstract: Hunting for Pirated Software Using Metamorphic Analysis by Hardikkumar RanaIn this paper, we consider the problem of detecting software that has been pirated and modified. We analyze a variety of detection techniques that have been previously studied in the context of malware detection. For each technique, we empirically determine the detection rate as a function of the degree of modification of the original code. We show that the code must be greatly modified before we fail to reliably distinguish it, and we … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
10
0
1

Year Published

2016
2016
2023
2023

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 11 publications
(11 citation statements)
references
References 25 publications
0
10
0
1
Order By: Relevance
“…As malware has become increasingly difficult to detect with traditional techniques, new approaches are needed, and machine learning based tools seem a promising avenue. Hidden Markov models are one such technique that has been used effectively for malware detection in previous work [1,4,19,21,26,31,43]. In contrast, Profile Hidden Markov Models seem to have rarely been studied in this context, with previous results being mixed, at best [3].…”
Section: Discussionmentioning
confidence: 99%
See 3 more Smart Citations
“…As malware has become increasingly difficult to detect with traditional techniques, new approaches are needed, and machine learning based tools seem a promising avenue. Hidden Markov models are one such technique that has been used effectively for malware detection in previous work [1,4,19,21,26,31,43]. In contrast, Profile Hidden Markov Models seem to have rarely been studied in this context, with previous results being mixed, at best [3].…”
Section: Discussionmentioning
confidence: 99%
“…Next, we briefly discuss examples of analysis techniques that use static and dynamic birthmarks for malware detection As previously mentioned, static analysis involves analyzing the program without executing it. In [26], static analysis is performed by extracting opcode sequences with the help of a disassembler. The key advantage of static analysis is that it is relatively faster and efficient.…”
Section: Software Birthmarksmentioning
confidence: 99%
See 2 more Smart Citations
“…If the two birthmarks are the same, the similarity in the birthmarks implies that one software is a copy of another. Based on this, there has been a lot of research in the field of software birthmarks [12,14,18,21,31,32,35,36].…”
mentioning
confidence: 99%