K-gram software birthmarks

Ginger Myles, Christian Collberg

Research output: Contribution to conferencePaperpeer-review

164 Scopus citations

Abstract

Software birthmarking relies on unique characteristics that are inherent to a program to identify the program in the event of suspected theft. In this paper we present and empirically evaluate a novel birthmarking technique which uniquely identifies a program through instruction sequences. To evaluate the strength of the birthmarking technique we examine two properties: credibility and resilience to semantics-preserving transformations. We show that the technique provides both high credibility and resilience. Additionally, it complements previously proposed static birthmarking techniques.

Original languageEnglish (US)
Pages314-318
Number of pages5
DOIs
StatePublished - 2005
Event20th Annual ACM Symposium on Applied Computing - Santa Fe, NM, United States
Duration: Mar 13 2005Mar 17 2005

Other

Other20th Annual ACM Symposium on Applied Computing
Country/TerritoryUnited States
CitySanta Fe, NM
Period3/13/053/17/05

Keywords

  • Software birthmarking
  • Software theft detection

ASJC Scopus subject areas

  • Software

Fingerprint

Dive into the research topics of 'K-gram software birthmarks'. Together they form a unique fingerprint.

Cite this