Graphs Resemblance based Software Birthmarks through Data Mining for Piracy Contro
https://doi.org/10.15514/ISPRAS-2019-31(2)-12
Abstract
About the Authors
Sohail SarwarPakistan
Zia Ul Qayyum
Pakistan
Professor at University of Gujrat
Muhammad Safyan
Pakistan
Muddessar Iqbal
United Kingdom
Senior lecturer in London South Bank University and University of Essex, England
Yasir Mahmood
Pakistan
References
1. . Ninth Annual BSA Global Software 2013 Piracy Study, Business Software Alliance (BSA), 2013.
2. . Anckaert B., De Sutter, D. Chanet, and Bosschere K. Steganography for executables and code Transformation Signatures. Lecture Notes in Computer Science, volume 3506, 2005, pp. 425–439.
3. . Fu B., Richard G., and Chen Y. Some New Approaches for Preventing Software Tampering. In Proc. of the 44th Annual Southeast regional conference, pp. 655–660, 2006.
4. . Collberg S., Thomborson C. Watermarking, tamper-proofing, and obfuscation-tools for software protection. IEEE Transactions on Software Engineering, vol. 28, issue 8, 2002, pp. 735–746.
5. . Udupa S. K., Debray K., and Madou M. Deobfuscation: Reverse engineering obfuscated code. In Proc. of the 12th Conference on Reverse Engineering, 2009, pp. 10–19.
6. . Palsberg J., Krishnaswamy S., Kwon M. Experience with software watermarking. In Proc. of the 16th Computer Security Applications Conference, 2003, pp. 308–316.
7. . Bai Y., Sun X., Sun G., Deng X., and Zhou X. Dynamic k-gram based software birthmark. In Proc. of the 19th Australian Conference on Software Engineering, 2008, pp. 644–649.
8. . Mahmood Y., Pervez Z., Sarwar S., and Ahmed H. F. Similarity Level Method Based Static Software Birthmarks. In Proc. of the International Symposium on High Capacity Optical Networks and Enabling Technologies, 2008, pp. 205–210.
9. . Schuler D., Dallmeier V., Lindig C. A dynamic birthmark for java. In Proc. of the 22nd IEEE/ACM International conference on Automated software engineering, 2007, pp. 274–283.
10. . Nazir S., Shahzad S., Binti N., Alias, and Anwar S. A Novel Rules Based Approach for Estimating Software Birthmark. The Scientific World Journal, 2015.
11. . Jorge E. N., Pirmez L., Costa O., Boccardo R., Bento M. Tiny Watermark: a code obfuscation-based software watermarking framework for wireless sensor networks. In Proc. of the ICWN’14-The 2014 International Conference on Wireless Networks, 2014.
12. . Nayakoji N., Sonavane S. JavaScript Theft Detection using Birthmark and Subgraph Isomorphism. Journal of Engineering Computers & Applied Sciences, vol. 3, no. 8, 2014, pp. 1–5.
13. . Che S. and Wang Y. A Software Watermarking Based on PE File with Tamper-proof Function. TELKOMNIKA Indonesian Journal of Electrical Engineering, vol. 12, no. 2, 2014, pp. 1012–1021.
14. . Zhu F. Concepts and techniques in software watermarking and obfuscation. PhD Thesis, The University of Auckland, New Zealand, 2007, 160 p.
15. . Myles G., and Collberg C. Detecting software theft via whole program path birthmarks. Lecture Notes in Computer Science, vol. 3225, 2004, pp. 404–415.
16. . Myles G. and Collberg C. K-gram based software birthmarks. In Proc. of the 2005 ACM symposium on Applied computing, 2005, pp. 314–318.
17. . Tian Z., Liu T., Zheng Q. A new thread-aware birthmark for plagiarism detection of multithreaded programs. In Proc. of the 38th International Conference on Software Engineering Companion, 2016, pp. 734–736.
18. . Tian Z., Liu T., Zheng Q. Exploiting Thread-Related System Calls for Plagiarism Detection of Multithreaded Programs. Journal of Systems and Software, vol. 119, 2016, pp. 136-148.
19. . Bhattacharya S. Survey on Digital Watermarking–A Digital Forensics & Security Application. International Journal of Advanced Research in Computer Science and Software Engineering, vol. 4, issue 11, 2014.
20. . Khan A., Siddiqa A., Munib S. A recent survey of reversible watermarking techniques. Information Sciences, vol. 279, 2014, pp. 251–272.
21. . Zhou W., Zhang X., and Jiang X. AppInk: watermarking android apps for repackaging deterrence. In Proc. of the 8th ACM SIGSAC symposium on Information, computer and communications security, 2013, pp. 1–12.
22. . Ren C., Chen K., and Liu P. Droidmarking: resilient software watermarking for impeding android application repackaging. In Proc. of the 29th ACM/IEEE international conference on Automated software engineering, 2014, pp. 635–646.
23. . Guang S., Xiaoping F., Sha F., Yingjie S. Software Watermarking in the Cloud: Analysis and Rigorous Theoretic Treatment. Journal of Software Engineering, vol. 9, issue 2, 2015, pp. 410–418.
24. . Rubini P., Leela S. A Survey On Plagiarism Detection In Text Mining. International Journal of Research in Computer Applications and Robotics, vol. 1, issue 9, 2013, pp. 117-119.
25. . Oberreuter G., and Velásquez J. D. Text mining applied to plagiarism detection: The use of words for detecting deviations in the writing style. Expert Systems with Applications, vol. 40, issue 9, 2013, pp. 3756–3763.
26. . Rana H., Stamp M. Hunting for Pirated Software Using Metamorphic Analysis. Information Security Journal: A Global Perspective, vol. 23, issue 3, 2014, pp. 68–85.
27. . Costa M., Gong Z. Web structure mining: an introduction. In Proc. of the 2005 IEEE International Conference on Information Acquisition, 2005, pp. 590-595.
28. . Vemparala S., Di Troia F., Corrado V., Austin H., and Stamo M. Malware Detection Using Dynamic Birthmarks. In Proc. of the 2016 ACM- International Workshop on Security And Privacy Analytics, 2016, pp. 41–46.
29. . Zeng K., and Athanas P. A q-gram birthmarking approach to predicting reusable hardware. Design, Automation & Test in Europe Conference & Exhibition (DATE), 2016, pp. 1112–1115.
30. . Bogdanov P., Baumer B., Basu P. As Strong as the Weakest Link: Mining Diverse Cliques in Weighted Graphs. Lecture Notes in Computer Science, vol. 8188, 2013, pp. 525–540.
31. . Getoor L., Diehl P. Link mining: a survey. ACM SIGKDD Explorations Newsletter, vol. 7, issue 2, 2005, pp. 3–12.
32. . Kavitha D., Rao M., Babu K. A Survey on Assorted Approaches to Graph Data Mining, International Journal of Computer Applications, vol. 14, no. 1, 2011, pp. 43–46.
33. . Tamada H., Nakamura M., Monden A. Java Birthmarks–Detecting the Software Theft. IEICE transactions on information and systems, Vol. E88-D, issue 9, 2005, pp. 2148–2158.
34. . Sorceforge.net, accessed on Nov 2, 2017.
35. . Fan M., Liu J., Luo X. et al. Android Malware Familial Classification and Representative Sample Selection via Frequent Sub-graph Analysis, IEEE Transactions on Information Forensics and Security, vol. 13, issue 8, 2018, pp. 1890-1905.
36. . Tian Z., T. Liu, Zheng Q. et al. Reviving Sequential Program Birthmarking for Multithreaded Software Plagiarism Detection. IEEE Transactions on Software Engineering, vol. 44, issue 5, 2018, pp. 491-511.
Review
For citations:
Sarwar S., Ul Qayyum Z., Safyan M., Iqbal M., Mahmood Ya. Graphs Resemblance based Software Birthmarks through Data Mining for Piracy Contro. Proceedings of the Institute for System Programming of the RAS (Proceedings of ISP RAS). 2019;31(2):171-185. (In Russ.) https://doi.org/10.15514/ISPRAS-2019-31(2)-12