Preview

Proceedings of the Institute for System Programming of the RAS (Proceedings of ISP RAS)

Advanced search

Graphs Resemblance based Software Birthmarks through Data Mining for Piracy Contro

https://doi.org/10.15514/ISPRAS-2019-31(2)-12

Abstract

The emergence of software artifacts greatly emphasizes the need for protecting intellectual property rights (IPR) hampered by software piracy requiring effective measures for software piracy control. Software birthmarking targets to counter ownership theft of software by identifying similarity of their origins. A novice birthmarking approach has been proposed in this paper that is based on hybrid of text-mining and graph-mining techniques. The code elements of a program and their relations with other elements have been identified through their properties (i.e code constructs) and transformed into Graph Manipulation Language (GML). The software birthmarks generated by exploiting the graph theoretic properties (through clustering coefficient) are used for the classifications of similarity or dissimilarity of two programs. The proposed technique has been evaluated over metrics of credibility, resilience, method theft, modified code detection and self-copy detection for programs asserting the effectiveness of proposed approach against software ownership theft. The comparative analysis of proposed approach with contemporary ones shows better results for having properties and relations of program nodes and for employing dynamic techniques of graph mining without adding any overhead (such as increased program size and processing cost).

About the Authors

Sohail Sarwar
Department of Computing, University of Gujrat
Pakistan


Zia Ul Qayyum
University of Gujra
Pakistan
Professor at University of Gujrat


Muhammad Safyan
Government College University (GCU), Lahore
Pakistan


Muddessar Iqbal
London South Bank University; University of Essex
United Kingdom
Senior lecturer in London South Bank University and University of Essex, England


Yasir Mahmood
Government College University (GCU), Lahore
Pakistan


References

1. . Ninth Annual BSA Global Software 2013 Piracy Study, Business Software Alliance (BSA), 2013.

2. . Anckaert B., De Sutter, D. Chanet, and Bosschere K. Steganography for executables and code Transformation Signatures. Lecture Notes in Computer Science, volume 3506, 2005, pp. 425–439.

3. . Fu B., Richard G., and Chen Y. Some New Approaches for Preventing Software Tampering. In Proc. of the 44th Annual Southeast regional conference, pp. 655–660, 2006.

4. . Collberg S., Thomborson C. Watermarking, tamper-proofing, and obfuscation-tools for software protection. IEEE Transactions on Software Engineering, vol. 28, issue 8, 2002, pp. 735–746.

5. . Udupa S. K., Debray K., and Madou M. Deobfuscation: Reverse engineering obfuscated code. In Proc. of the 12th Conference on Reverse Engineering, 2009, pp. 10–19.

6. . Palsberg J., Krishnaswamy S., Kwon M. Experience with software watermarking. In Proc. of the 16th Computer Security Applications Conference, 2003, pp. 308–316.

7. . Bai Y., Sun X., Sun G., Deng X., and Zhou X. Dynamic k-gram based software birthmark. In Proc. of the 19th Australian Conference on Software Engineering, 2008, pp. 644–649.

8. . Mahmood Y., Pervez Z., Sarwar S., and Ahmed H. F. Similarity Level Method Based Static Software Birthmarks. In Proc. of the International Symposium on High Capacity Optical Networks and Enabling Technologies, 2008, pp. 205–210.

9. . Schuler D., Dallmeier V., Lindig C. A dynamic birthmark for java. In Proc. of the 22nd IEEE/ACM International conference on Automated software engineering, 2007, pp. 274–283.

10. . Nazir S., Shahzad S., Binti N., Alias, and Anwar S. A Novel Rules Based Approach for Estimating Software Birthmark. The Scientific World Journal, 2015.

11. . Jorge E. N., Pirmez L., Costa O., Boccardo R., Bento M. Tiny Watermark: a code obfuscation-based software watermarking framework for wireless sensor networks. In Proc. of the ICWN’14-The 2014 International Conference on Wireless Networks, 2014.

12. . Nayakoji N., Sonavane S. JavaScript Theft Detection using Birthmark and Subgraph Isomorphism. Journal of Engineering Computers & Applied Sciences, vol. 3, no. 8, 2014, pp. 1–5.

13. . Che S. and Wang Y. A Software Watermarking Based on PE File with Tamper-proof Function. TELKOMNIKA Indonesian Journal of Electrical Engineering, vol. 12, no. 2, 2014, pp. 1012–1021.

14. . Zhu F. Concepts and techniques in software watermarking and obfuscation. PhD Thesis, The University of Auckland, New Zealand, 2007, 160 p.

15. . Myles G., and Collberg C. Detecting software theft via whole program path birthmarks. Lecture Notes in Computer Science, vol. 3225, 2004, pp. 404–415.

16. . Myles G. and Collberg C. K-gram based software birthmarks. In Proc. of the 2005 ACM symposium on Applied computing, 2005, pp. 314–318.

17. . Tian Z., Liu T., Zheng Q. A new thread-aware birthmark for plagiarism detection of multithreaded programs. In Proc. of the 38th International Conference on Software Engineering Companion, 2016, pp. 734–736.

18. . Tian Z., Liu T., Zheng Q. Exploiting Thread-Related System Calls for Plagiarism Detection of Multithreaded Programs. Journal of Systems and Software, vol. 119, 2016, pp. 136-148.

19. . Bhattacharya S. Survey on Digital Watermarking–A Digital Forensics & Security Application. International Journal of Advanced Research in Computer Science and Software Engineering, vol. 4, issue 11, 2014.

20. . Khan A., Siddiqa A., Munib S. A recent survey of reversible watermarking techniques. Information Sciences, vol. 279, 2014, pp. 251–272.

21. . Zhou W., Zhang X., and Jiang X. AppInk: watermarking android apps for repackaging deterrence. In Proc. of the 8th ACM SIGSAC symposium on Information, computer and communications security, 2013, pp. 1–12.

22. . Ren C., Chen K., and Liu P. Droidmarking: resilient software watermarking for impeding android application repackaging. In Proc. of the 29th ACM/IEEE international conference on Automated software engineering, 2014, pp. 635–646.

23. . Guang S., Xiaoping F., Sha F., Yingjie S. Software Watermarking in the Cloud: Analysis and Rigorous Theoretic Treatment. Journal of Software Engineering, vol. 9, issue 2, 2015, pp. 410–418.

24. . Rubini P., Leela S. A Survey On Plagiarism Detection In Text Mining. International Journal of Research in Computer Applications and Robotics, vol. 1, issue 9, 2013, pp. 117-119.

25. . Oberreuter G., and Velásquez J. D. Text mining applied to plagiarism detection: The use of words for detecting deviations in the writing style. Expert Systems with Applications, vol. 40, issue 9, 2013, pp. 3756–3763.

26. . Rana H., Stamp M. Hunting for Pirated Software Using Metamorphic Analysis. Information Security Journal: A Global Perspective, vol. 23, issue 3, 2014, pp. 68–85.

27. . Costa M., Gong Z. Web structure mining: an introduction. In Proc. of the 2005 IEEE International Conference on Information Acquisition, 2005, pp. 590-595.

28. . Vemparala S., Di Troia F., Corrado V., Austin H., and Stamo M. Malware Detection Using Dynamic Birthmarks. In Proc. of the 2016 ACM- International Workshop on Security And Privacy Analytics, 2016, pp. 41–46.

29. . Zeng K., and Athanas P. A q-gram birthmarking approach to predicting reusable hardware. Design, Automation & Test in Europe Conference & Exhibition (DATE), 2016, pp. 1112–1115.

30. . Bogdanov P., Baumer B., Basu P. As Strong as the Weakest Link: Mining Diverse Cliques in Weighted Graphs. Lecture Notes in Computer Science, vol. 8188, 2013, pp. 525–540.

31. . Getoor L., Diehl P. Link mining: a survey. ACM SIGKDD Explorations Newsletter, vol. 7, issue 2, 2005, pp. 3–12.

32. . Kavitha D., Rao M., Babu K. A Survey on Assorted Approaches to Graph Data Mining, International Journal of Computer Applications, vol. 14, no. 1, 2011, pp. 43–46.

33. . Tamada H., Nakamura M., Monden A. Java Birthmarks–Detecting the Software Theft. IEICE transactions on information and systems, Vol. E88-D, issue 9, 2005, pp. 2148–2158.

34. . Sorceforge.net, accessed on Nov 2, 2017.

35. . Fan M., Liu J., Luo X. et al. Android Malware Familial Classification and Representative Sample Selection via Frequent Sub-graph Analysis, IEEE Transactions on Information Forensics and Security, vol. 13, issue 8, 2018, pp. 1890-1905.

36. . Tian Z., T. Liu, Zheng Q. et al. Reviving Sequential Program Birthmarking for Multithreaded Software Plagiarism Detection. IEEE Transactions on Software Engineering, vol. 44, issue 5, 2018, pp. 491-511.


Review

For citations:


Sarwar S., Ul Qayyum Z., Safyan M., Iqbal M., Mahmood Ya. Graphs Resemblance based Software Birthmarks through Data Mining for Piracy Contro. Proceedings of the Institute for System Programming of the RAS (Proceedings of ISP RAS). 2019;31(2):171-185. (In Russ.) https://doi.org/10.15514/ISPRAS-2019-31(2)-12



Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 2079-8156 (Print)
ISSN 2220-6426 (Online)