K-gram software birthmarks

Ginger Myles, Christian S Collberg

Research output: Chapter in Book/Report/Conference proceedingConference contribution

119 Citations (Scopus)

Abstract

Software birthmarking relies on unique characteristics that are inherent to a program to identify the program in the event of suspected theft. In this paper we present and empirically evaluate a novel birthmarking technique which uniquely identifies a program through instruction sequences. To evaluate the strength of the birthmarking technique we examine two properties: credibility and resilience to semantics-preserving transformations. We show that the technique provides both high credibility and resilience. Additionally, it complements previously proposed static birthmarking techniques.

Original languageEnglish (US)
Title of host publicationProceedings of the ACM Symposium on Applied Computing
Pages314-318
Number of pages5
Volume1
DOIs
StatePublished - 2005
Event20th Annual ACM Symposium on Applied Computing - Santa Fe, NM, United States
Duration: Mar 13 2005Mar 17 2005

Other

Other20th Annual ACM Symposium on Applied Computing
CountryUnited States
CitySanta Fe, NM
Period3/13/053/17/05

Fingerprint

Semantics

Keywords

  • Software birthmarking
  • Software theft detection

ASJC Scopus subject areas

  • Computer Science(all)

Cite this

Myles, G., & Collberg, C. S. (2005). K-gram software birthmarks. In Proceedings of the ACM Symposium on Applied Computing (Vol. 1, pp. 314-318) https://doi.org/10.1145/1066677.1066753

K-gram software birthmarks. / Myles, Ginger; Collberg, Christian S.

Proceedings of the ACM Symposium on Applied Computing. Vol. 1 2005. p. 314-318.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Myles, G & Collberg, CS 2005, K-gram software birthmarks. in Proceedings of the ACM Symposium on Applied Computing. vol. 1, pp. 314-318, 20th Annual ACM Symposium on Applied Computing, Santa Fe, NM, United States, 3/13/05. https://doi.org/10.1145/1066677.1066753
Myles G, Collberg CS. K-gram software birthmarks. In Proceedings of the ACM Symposium on Applied Computing. Vol. 1. 2005. p. 314-318 https://doi.org/10.1145/1066677.1066753
Myles, Ginger ; Collberg, Christian S. / K-gram software birthmarks. Proceedings of the ACM Symposium on Applied Computing. Vol. 1 2005. pp. 314-318
@inproceedings{f196e60c8f714fa79d2285eb751c855f,
title = "K-gram software birthmarks",
abstract = "Software birthmarking relies on unique characteristics that are inherent to a program to identify the program in the event of suspected theft. In this paper we present and empirically evaluate a novel birthmarking technique which uniquely identifies a program through instruction sequences. To evaluate the strength of the birthmarking technique we examine two properties: credibility and resilience to semantics-preserving transformations. We show that the technique provides both high credibility and resilience. Additionally, it complements previously proposed static birthmarking techniques.",
keywords = "Software birthmarking, Software theft detection",
author = "Ginger Myles and Collberg, {Christian S}",
year = "2005",
doi = "10.1145/1066677.1066753",
language = "English (US)",
volume = "1",
pages = "314--318",
booktitle = "Proceedings of the ACM Symposium on Applied Computing",

}

TY - GEN

T1 - K-gram software birthmarks

AU - Myles, Ginger

AU - Collberg, Christian S

PY - 2005

Y1 - 2005

N2 - Software birthmarking relies on unique characteristics that are inherent to a program to identify the program in the event of suspected theft. In this paper we present and empirically evaluate a novel birthmarking technique which uniquely identifies a program through instruction sequences. To evaluate the strength of the birthmarking technique we examine two properties: credibility and resilience to semantics-preserving transformations. We show that the technique provides both high credibility and resilience. Additionally, it complements previously proposed static birthmarking techniques.

AB - Software birthmarking relies on unique characteristics that are inherent to a program to identify the program in the event of suspected theft. In this paper we present and empirically evaluate a novel birthmarking technique which uniquely identifies a program through instruction sequences. To evaluate the strength of the birthmarking technique we examine two properties: credibility and resilience to semantics-preserving transformations. We show that the technique provides both high credibility and resilience. Additionally, it complements previously proposed static birthmarking techniques.

KW - Software birthmarking

KW - Software theft detection

UR - http://www.scopus.com/inward/record.url?scp=33644528723&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=33644528723&partnerID=8YFLogxK

U2 - 10.1145/1066677.1066753

DO - 10.1145/1066677.1066753

M3 - Conference contribution

AN - SCOPUS:33644528723

VL - 1

SP - 314

EP - 318

BT - Proceedings of the ACM Symposium on Applied Computing

ER -