Abstract
Software birthmarking relies on unique characteristics that are inherent to a program to identify the program in the event of suspected theft. In this paper we present and empirically evaluate a novel birthmarking technique which uniquely identifies a program through instruction sequences. To evaluate the strength of the birthmarking technique we examine two properties: credibility and resilience to semantics-preserving transformations. We show that the technique provides both high credibility and resilience. Additionally, it complements previously proposed static birthmarking techniques.
Original language | English (US) |
---|---|
Pages | 314-318 |
Number of pages | 5 |
DOIs | |
State | Published - 2005 |
Event | 20th Annual ACM Symposium on Applied Computing - Santa Fe, NM, United States Duration: Mar 13 2005 → Mar 17 2005 |
Other
Other | 20th Annual ACM Symposium on Applied Computing |
---|---|
Country/Territory | United States |
City | Santa Fe, NM |
Period | 3/13/05 → 3/17/05 |
Keywords
- Software birthmarking
- Software theft detection
ASJC Scopus subject areas
- Software