2021
DOI: 10.1155/2021/5547766
|View full text |Cite
|
Sign up to set email alerts
|

Software Birthmark Usability for Source Code Transformation Using Machine Learning Algorithms

Abstract: Source code transformation is a way in which source code of a program is transformed by observing any operation for generating another or nearly the same program. This is mostly performed in situations of piracy where the pirates want the ownership of the software program. Various approaches are being practiced for source code transformation and code obfuscation. Researchers tried to overcome the issue of modifying the source code and prevent it from the people who want to change the source code. Among the exi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 41 publications
0
2
0
Order By: Relevance
“…A recent survey article identifies 24 types of techniques for generating software birthmarks [39]. These techniques mainly focus on detecting software theft and piracy [16], [40]. There are also birthmarks designed for software asset management [41] or malware detection [42].…”
Section: B Binary Code Similaritymentioning
confidence: 99%
“…A recent survey article identifies 24 types of techniques for generating software birthmarks [39]. These techniques mainly focus on detecting software theft and piracy [16], [40]. There are also birthmarks designed for software asset management [41] or malware detection [42].…”
Section: B Binary Code Similaritymentioning
confidence: 99%
“…Considering the broad applicability and objective security obtained for low cost, we focus on software-level protection. Software-level protection can be divided into protection before being damaged and forensics after being damaged, such as protecting core technologies through code obfuscation [10,11], encryption and decryption [12,13], software watermarking [7,14], or software birthmark [15,16] for effective tracking of software copyright.…”
Section: Introductionmentioning
confidence: 99%