2015
DOI: 10.1109/tse.2015.2454508
|View full text |Cite
|
Sign up to set email alerts
|

Software Plagiarism Detection with Birthmarks Based on Dynamic Key Instruction Sequences

Abstract: A software birthmark is a unique characteristic of a program. Thus, comparing the birthmarks between the plaintiff and defendant programs provides an effective approach for software plagiarism detection. However, software birthmark generation faces two main challenges: the absence of source code and various code obfuscation techniques that attempt to hide the characteristics of a program. In this paper, we propose a new type of software birthmark called DYKIS (DYnamic Key Instruction Sequence) that can be extr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
23
0
4

Year Published

2016
2016
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 50 publications
(33 citation statements)
references
References 61 publications
0
23
0
4
Order By: Relevance
“…Arslan presented machine learning algorithms to detect the threats to mobile phones . Tian et al proposed a new type of software birthmark called DYnamic Key Instruction Sequence (DYKIS) that can be extracted from an executable without the need for source code. Nissim presented an active learning (AL) framework and introduced two new AL methods that could assist anti‐virus vendors to focus their analytical efforts by acquiring those files that are most likely malicious and later he also used a similar method to detect new, unknown malicious of DOCX files .…”
Section: Related Workmentioning
confidence: 99%
“…Arslan presented machine learning algorithms to detect the threats to mobile phones . Tian et al proposed a new type of software birthmark called DYnamic Key Instruction Sequence (DYKIS) that can be extracted from an executable without the need for source code. Nissim presented an active learning (AL) framework and introduced two new AL methods that could assist anti‐virus vendors to focus their analytical efforts by acquiring those files that are most likely malicious and later he also used a similar method to detect new, unknown malicious of DOCX files .…”
Section: Related Workmentioning
confidence: 99%
“…Their approaches are not suitable for programs that invoke few system calls. The latest dynamic birthmark work, DYKIS [29], measures the similarity of key instructions (e.g., value-updating instructions and inputcorrelated instructions in the execution traces, achieving good resilience to obfuscation schemes.…”
Section: A Software Plagiarism Detectionmentioning
confidence: 99%
“…There have been several techniques for detecting plagiarism, which mainly use software tools for detecting the different types of plagiarism (Cosma & Joy 2012;Halak & El-Hajjar, 2016;Jhi et al, 2015;Jiffriya, Jahan, Ragel, & Deegalla, 2013;Li, Chen, Xin, Bin, & Vitanyi, 2004;Rosales et al, 2008a;Tian et al, 2015). These techniques are mostly based on comparing text and finding any textual similarity to published material available in the software repositories, which is then validated by an instructor (Li et al, 2004).…”
Section: Introductionmentioning
confidence: 99%