Выявление характерных особенностей программ для борьбы с компьютерным пиратством на основе интеллектуального анализа графов
https://doi.org/10.15514/ISPRAS-2019-31(2)-12
Аннотация
Об авторах
Сохаил СарварПакистан
Зия Уль Кайум
Пакистан
Профессор в университете Гуджарата
Мухаммад Сафьян
Пакистан
Муддессар Икбал
Великобритания
Старший преподаватель в Лондонском университете Саут Бэнк и в университете Эссекса
Ясир Махмуд
Пакистан
Список литературы
1. . Ninth Annual BSA Global Software 2013 Piracy Study, Business Software Alliance (BSA), 2013.
2. . Anckaert B., De Sutter, D. Chanet, and Bosschere K. Steganography for executables and code Transformation Signatures. Lecture Notes in Computer Science, volume 3506, 2005, pp. 425–439.
3. . Fu B., Richard G., and Chen Y. Some New Approaches for Preventing Software Tampering. In Proc. of the 44th Annual Southeast regional conference, pp. 655–660, 2006.
4. . Collberg S., Thomborson C. Watermarking, tamper-proofing, and obfuscation-tools for software protection. IEEE Transactions on Software Engineering, vol. 28, issue 8, 2002, pp. 735–746.
5. . Udupa S. K., Debray K., and Madou M. Deobfuscation: Reverse engineering obfuscated code. In Proc. of the 12th Conference on Reverse Engineering, 2009, pp. 10–19.
6. . Palsberg J., Krishnaswamy S., Kwon M. Experience with software watermarking. In Proc. of the 16th Computer Security Applications Conference, 2003, pp. 308–316.
7. . Bai Y., Sun X., Sun G., Deng X., and Zhou X. Dynamic k-gram based software birthmark. In Proc. of the 19th Australian Conference on Software Engineering, 2008, pp. 644–649.
8. . Mahmood Y., Pervez Z., Sarwar S., and Ahmed H. F. Similarity Level Method Based Static Software Birthmarks. In Proc. of the International Symposium on High Capacity Optical Networks and Enabling Technologies, 2008, pp. 205–210.
9. . Schuler D., Dallmeier V., Lindig C. A dynamic birthmark for java. In Proc. of the 22nd IEEE/ACM International conference on Automated software engineering, 2007, pp. 274–283.
10. . Nazir S., Shahzad S., Binti N., Alias, and Anwar S. A Novel Rules Based Approach for Estimating Software Birthmark. The Scientific World Journal, 2015.
11. . Jorge E. N., Pirmez L., Costa O., Boccardo R., Bento M. Tiny Watermark: a code obfuscation-based software watermarking framework for wireless sensor networks. In Proc. of the ICWN’14-The 2014 International Conference on Wireless Networks, 2014.
12. . Nayakoji N., Sonavane S. JavaScript Theft Detection using Birthmark and Subgraph Isomorphism. Journal of Engineering Computers & Applied Sciences, vol. 3, no. 8, 2014, pp. 1–5.
13. . Che S. and Wang Y. A Software Watermarking Based on PE File with Tamper-proof Function. TELKOMNIKA Indonesian Journal of Electrical Engineering, vol. 12, no. 2, 2014, pp. 1012–1021.
14. . Zhu F. Concepts and techniques in software watermarking and obfuscation. PhD Thesis, The University of Auckland, New Zealand, 2007, 160 p.
15. . Myles G., and Collberg C. Detecting software theft via whole program path birthmarks. Lecture Notes in Computer Science, vol. 3225, 2004, pp. 404–415.
16. . Myles G. and Collberg C. K-gram based software birthmarks. In Proc. of the 2005 ACM symposium on Applied computing, 2005, pp. 314–318.
17. . Tian Z., Liu T., Zheng Q. A new thread-aware birthmark for plagiarism detection of multithreaded programs. In Proc. of the 38th International Conference on Software Engineering Companion, 2016, pp. 734–736.
18. . Tian Z., Liu T., Zheng Q. Exploiting Thread-Related System Calls for Plagiarism Detection of Multithreaded Programs. Journal of Systems and Software, vol. 119, 2016, pp. 136-148.
19. . Bhattacharya S. Survey on Digital Watermarking–A Digital Forensics & Security Application. International Journal of Advanced Research in Computer Science and Software Engineering, vol. 4, issue 11, 2014.
20. . Khan A., Siddiqa A., Munib S. A recent survey of reversible watermarking techniques. Information Sciences, vol. 279, 2014, pp. 251–272.
21. . Zhou W., Zhang X., and Jiang X. AppInk: watermarking android apps for repackaging deterrence. In Proc. of the 8th ACM SIGSAC symposium on Information, computer and communications security, 2013, pp. 1–12.
22. . Ren C., Chen K., and Liu P. Droidmarking: resilient software watermarking for impeding android application repackaging. In Proc. of the 29th ACM/IEEE international conference on Automated software engineering, 2014, pp. 635–646.
23. . Guang S., Xiaoping F., Sha F., Yingjie S. Software Watermarking in the Cloud: Analysis and Rigorous Theoretic Treatment. Journal of Software Engineering, vol. 9, issue 2, 2015, pp. 410–418.
24. . Rubini P., Leela S. A Survey On Plagiarism Detection In Text Mining. International Journal of Research in Computer Applications and Robotics, vol. 1, issue 9, 2013, pp. 117-119.
25. . Oberreuter G., and Velásquez J. D. Text mining applied to plagiarism detection: The use of words for detecting deviations in the writing style. Expert Systems with Applications, vol. 40, issue 9, 2013, pp. 3756–3763.
26. . Rana H., Stamp M. Hunting for Pirated Software Using Metamorphic Analysis. Information Security Journal: A Global Perspective, vol. 23, issue 3, 2014, pp. 68–85.
27. . Costa M., Gong Z. Web structure mining: an introduction. In Proc. of the 2005 IEEE International Conference on Information Acquisition, 2005, pp. 590-595.
28. . Vemparala S., Di Troia F., Corrado V., Austin H., and Stamo M. Malware Detection Using Dynamic Birthmarks. In Proc. of the 2016 ACM- International Workshop on Security And Privacy Analytics, 2016, pp. 41–46.
29. . Zeng K., and Athanas P. A q-gram birthmarking approach to predicting reusable hardware. Design, Automation & Test in Europe Conference & Exhibition (DATE), 2016, pp. 1112–1115.
30. . Bogdanov P., Baumer B., Basu P. As Strong as the Weakest Link: Mining Diverse Cliques in Weighted Graphs. Lecture Notes in Computer Science, vol. 8188, 2013, pp. 525–540.
31. . Getoor L., Diehl P. Link mining: a survey. ACM SIGKDD Explorations Newsletter, vol. 7, issue 2, 2005, pp. 3–12.
32. . Kavitha D., Rao M., Babu K. A Survey on Assorted Approaches to Graph Data Mining, International Journal of Computer Applications, vol. 14, no. 1, 2011, pp. 43–46.
33. . Tamada H., Nakamura M., Monden A. Java Birthmarks–Detecting the Software Theft. IEICE transactions on information and systems, Vol. E88-D, issue 9, 2005, pp. 2148–2158.
34. . Sorceforge.net, accessed on Nov 2, 2017.
35. . Fan M., Liu J., Luo X. et al. Android Malware Familial Classification and Representative Sample Selection via Frequent Sub-graph Analysis, IEEE Transactions on Information Forensics and Security, vol. 13, issue 8, 2018, pp. 1890-1905.
36. . Tian Z., T. Liu, Zheng Q. et al. Reviving Sequential Program Birthmarking for Multithreaded Software Plagiarism Detection. IEEE Transactions on Software Engineering, vol. 44, issue 5, 2018, pp. 491-511.
Рецензия
Для цитирования:
Сарвар С., Уль Кайум З., Сафьян М., Икбал М., Махмуд Я. Выявление характерных особенностей программ для борьбы с компьютерным пиратством на основе интеллектуального анализа графов. Труды Института системного программирования РАН. 2019;31(2):171-185. https://doi.org/10.15514/ISPRAS-2019-31(2)-12
For citation:
Sarwar S., Ul Qayyum Z., Safyan M., Iqbal M., Mahmood Ya. Graphs Resemblance based Software Birthmarks through Data Mining for Piracy Contro. Proceedings of the Institute for System Programming of the RAS (Proceedings of ISP RAS). 2019;31(2):171-185. (In Russ.) https://doi.org/10.15514/ISPRAS-2019-31(2)-12