K-gram software birthmarks

Ginger Myles, Christian Collberg

Research output: Contribution to conferencePaper

129 Scopus citations

Abstract

Software birthmarking relies on unique characteristics that are inherent to a program to identify the program in the event of suspected theft. In this paper we present and empirically evaluate a novel birthmarking technique which uniquely identifies a program through instruction sequences. To evaluate the strength of the birthmarking technique we examine two properties: credibility and resilience to semantics-preserving transformations. We show that the technique provides both high credibility and resilience. Additionally, it complements previously proposed static birthmarking techniques.

Original languageEnglish (US)
Pages314-318
Number of pages5
DOIs
StatePublished - Dec 1 2005
Event20th Annual ACM Symposium on Applied Computing - Santa Fe, NM, United States
Duration: Mar 13 2005Mar 17 2005

Other

Other20th Annual ACM Symposium on Applied Computing
CountryUnited States
CitySanta Fe, NM
Period3/13/053/17/05

Keywords

  • Software birthmarking
  • Software theft detection

ASJC Scopus subject areas

  • Software

Fingerprint Dive into the research topics of 'K-gram software birthmarks'. Together they form a unique fingerprint.

  • Cite this

    Myles, G., & Collberg, C. (2005). K-gram software birthmarks. 314-318. Paper presented at 20th Annual ACM Symposium on Applied Computing, Santa Fe, NM, United States. https://doi.org/10.1145/1066677.1066753