Research Article

Software Birthmark Usability for Source Code Transformation Using Machine Learning Algorithms

Table 1

Software birthmark.

S. no.Ref.Approaches of software birthmark
1[8]Birthmark-based approach for intellectual software asset management
2[9]DKISB
3[10]Instruction-words based software birthmark
4[11]JSBiRTH
5[29]API call structure
6[15]CVFV, SMC, IS, and UC
7[18]Detecting software theft via whole program path birthmarks
8[30]Birthmark-based android application filtering
9[31]System call dependence graph
10[24]Dynamic k-gram-based software birthmark
11[32]k-gram-based software birthmarks
12[33]Dynamic key instruction sequences
13[23]Features-based software birthmark
14[34]Method-based static software birthmarks
15[35]CHI-based instruction-words based software birthmark
16[36]Thread-aware software birthmarks
17[37]System call-based birthmarks