Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2015, Article ID 579390, 8 pages
http://dx.doi.org/10.1155/2015/579390
Research Article

A Novel Rules Based Approach for Estimating Software Birthmark

1Department of Computer Science, University of Peshawar, Peshawar 25000, Pakistan
2Department of Computer Science, Abdul Wali Khan University, Mardan 23200, Pakistan
3Ibnu Sina Institute for Fundamental Science Studies, Universiti Teknologi Malaysia, 81310 Johor Bahru, Malaysia
4Institute of Management Sciences, Peshawar 25000, Pakistan

Received 29 December 2014; Accepted 19 March 2015

Academic Editor: Patricia Melin

Copyright © 2015 Shah Nazir et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. D. Curtis, “Software piracy and copyright protection,” in Proceedings of the Idea/Microelectronics Conference Record (WESCON '94), Anaheim, Calif, USA, 1994.
  2. G. Myles and C. Collberg, “Software watermarking through register allocation: implementation, analysis, and attacks,” in Information Security and Cryptology—ICISC 2003, vol. 2971, pp. 274–293, Springer, Berlin, Germany, 2003. View at Google Scholar
  3. C. Collberg and T. R. Sahoo, “Software watermarking in the frequency domain: implementation, analysis, and attacks,” Journal of Computer Security, vol. 13, no. 5, pp. 721–755, 2005. View at Google Scholar · View at Scopus
  4. F. Liu, B. Lu, and X. Luo, “A chaos-based robust software watermarking,” in Information Security Practice and Experience, vol. 3903, pp. 355–366, Springer, Berlin, Germany, 2006. View at Google Scholar
  5. Y. Zeng, F. Liu, X. Luo, and C. Yang, “Software watermarking through obfuscated interpretation: implementation and analysis,” Journal of Multimedia, vol. 6, no. 4, pp. 329–340, 2011. View at Publisher · View at Google Scholar · View at Scopus
  6. S. Choi, H. Park, H.-I. Lim, and T. Han, “A static API birthmark for Windows binary executables,” Journal of Systems and Software, vol. 82, no. 5, pp. 862–873, 2009. View at Publisher · View at Google Scholar · View at Scopus
  7. P. Heewan, C. Seokwoo, L. Hyun-Il, and H. Taisook, “Detecting code theft via a static instruction trace birthmark for Java methods,” in Proceedings of the 6th IEEE International Conference on Industrial Informatics (INDIN '08), pp. 551–556, Daejeon, Republic of Korea, July 2008. View at Publisher · View at Google Scholar
  8. H. Park, S. Choi, H.-I. Lim, and T. Han, “Detecting java theft based on static API trace birthmark,” in Advances in Information and Computer Security, vol. 5312 of Lecture Notes in Computer Science, pp. 121–135, Springer, Berlin, Germany, 2008. View at Publisher · View at Google Scholar
  9. H. Park, H.-I. Lim, S. Choi, and T. Han, “Detecting common modules in java packages based on static object trace birthmark,” Computer Journal, vol. 54, no. 1, pp. 108–124, 2011. View at Publisher · View at Google Scholar · View at Scopus
  10. Y. Zeng, F. Liu, X. Luo, and S. Lian, “Abstract interpretation-based semantic framework for software birthmark,” Computers & Security, vol. 31, no. 4, pp. 377–390, 2012. View at Publisher · View at Google Scholar · View at Scopus
  11. G. Myles and C. Collberg, “Detecting software theft via whole program path birthmarks,” in Information Security, vol. 3225, pp. 404–415, Springer, Berlin, Germany, 2004. View at Google Scholar
  12. T. Kakimoto, A. Monden, Y. Kamei, H. Tamada, M. Tsunoda, and K.-I. Matsumoto, “Using software birthmarks to identify similar classes and major functionalities,” in Proceedings of the International Workshop on Mining Software Repositories (MSR '06), pp. 171–172, ACM, Shanghai, China, May 2006. View at Publisher · View at Google Scholar · View at Scopus
  13. P. P. F. Chan, L. C. K. Hui, and S. M. Yiu, “Dynamic software birthmark for java based on heap memory analysis,” in Communications and Multimedia Security, vol. 7025, pp. 94–107, Springer, Berlin, Germany, 2011. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  14. Y. Wang, F. Liu, D. Gong, B. Lu, and S. Ma, “CHI based instruction-words software birthmark selection,” in Proceedings of the 4th International Conference on Multimedia and Security (MINES '12), pp. 892–895, November 2012. View at Publisher · View at Google Scholar · View at Scopus
  15. H.-I. Lim, “Customizing k-gram based birthmark through partial matching in detecting software thefts,” in Proceedings of the 37th IEEE Annual Computer Software and Applications Conference Workshops (COMPSACW '13), pp. 1–4, July 2013. View at Publisher · View at Google Scholar
  16. K. Tyagi and A. Sharma, “A rule-based approach for estimating the reliability of component-based systems,” Advances in Engineering Software, vol. 54, pp. 24–29, 2012. View at Publisher · View at Google Scholar · View at Scopus
  17. H. Tamada, M. Nakamura, A. Monden, and K.-I. Matsumoto, “Design and evaluation of birthmarks for detecting theft of java programs,” in Proceedings of the IASTED International Conference on Software Engineering (IASTED SE '04), pp. 569–575, 2004.
  18. C. Collberg and J. Nagra, Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection, Addison Wesley, Boston, Mass, USA, 1st edition, 2009.
  19. G. M. Myles, Software theft detection through program identification [Ph.D. thesis], Department of Computer Science, University of Arizona, Tucson, Ariz, USA, 2006.
  20. L. A. Zadeh, “Fuzzy logic,” Computer, vol. 21, no. 4, pp. 83–93, 1988. View at Publisher · View at Google Scholar · View at Scopus
  21. MATLAB 7.10.0, The MathWorks, Natick, Mass, USA, 2010.
  22. G. Myles and C. Collberg, “K-gram software birthmarks,” in Proceedings of the 20th Annual ACM Symposium on Applied Computing, pp. 314–318, ACM, Santa Fe, NM, USA, March 2005. View at Publisher · View at Google Scholar · View at Scopus
  23. C. Collberg, G. Myles, and A. Huntwork, “Sandmark—a tool for software protection research,” IEEE Security and Privacy, vol. 1, no. 4, pp. 40–49, 2003. View at Publisher · View at Google Scholar · View at Scopus
  24. C. P. Ltd, CodeShield Java Byte Obfuscator, 2014, http://www.xmarks.com/s/site/www.codingart.com/codeshield.html.
  25. L. Saeidiasl, T. Ahmad, N. Alias, and M. Ghanbari, “Comparison of EEG source localization using meromorphic approximation to fuzzy C-mean,” Malaysian Journal of Fundamental and Applied Science, vol. 9, pp. 215–220, 2013. View at Google Scholar