K-gram software birthmarks

Ginger Myles, Christian Collberg

Research output: Contribution to conferencePaperpeer-review

151 Scopus citations


Software birthmarking relies on unique characteristics that are inherent to a program to identify the program in the event of suspected theft. In this paper we present and empirically evaluate a novel birthmarking technique which uniquely identifies a program through instruction sequences. To evaluate the strength of the birthmarking technique we examine two properties: credibility and resilience to semantics-preserving transformations. We show that the technique provides both high credibility and resilience. Additionally, it complements previously proposed static birthmarking techniques.

Original languageEnglish (US)
Number of pages5
StatePublished - 2005
Event20th Annual ACM Symposium on Applied Computing - Santa Fe, NM, United States
Duration: Mar 13 2005Mar 17 2005


Other20th Annual ACM Symposium on Applied Computing
Country/TerritoryUnited States
CitySanta Fe, NM


  • Software birthmarking
  • Software theft detection

ASJC Scopus subject areas

  • Software


Dive into the research topics of 'K-gram software birthmarks'. Together they form a unique fingerprint.

Cite this