JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2014, Vol. 49 ›› Issue (09): 9-16.doi: 10.6040/j.issn.1671-9352.2.2014.123

Previous Articles     Next Articles

SODB:a novel method for software plagiarism detection based on stack operation dynamic birthmark

FAN Ming, LIU Jun, ZHENG Qing-hua, TIAN Zhen-zhou, ZHUANG Er-yue, LIU Ting   

  1. Ministry of Education Key Lab for Intelligent Networks and Network Security, Department of Computer Science and Technology, Xi'an Jiaotong University, Xi'an 710049, Shaanxi, China
  • Received:2014-06-24 Revised:2014-08-27 Online:2014-09-20 Published:2014-09-30

Abstract: Software plagiarism detection is one of the key techniques for the protection of software intellectual property. In this paper, a new kind of dynamic birthmark SODB (stack operation dynamic birthmark) was proposed, which utilizes the characteristics of push and pop operation of call stack during program execution, to uniquely identify the program. Plagiarism detection was realized by evaluating the similarity of their SODBs among different programs providing the same inputs. In the experiments, 35 versions of 14 different softwares taken from the Source Forge were selected, based on which 87 samples were generated totally by processing with different compilers and optimization levels and semantic-preserving code obfuscation techniques. The quality of our SODB was evaluated with these 87 experimental objects, and the results show that our method can accurately recognize plagiarism between copies and distinguish between independently implemented programs with only about 6.7% misjudgement rate and 7% false negative rate at the absence of software source code.

Key words: software plagiarism detection, software obfuscation, stack operation dynamic birthmark

CLC Number: 

  • TP309
[1] Tuicool. Samsung demands access to apple's iOS 6 source code innotification lawsuit in Korea[EB/OL]. [2013-01-25]. http://www.tuicool.com/articles/j2INVn.
[2] JHI Yoon-Chan, WANG Xinran, JIA Xiaoqi, et al. Value-based program characterization and its application to software plagiarism detection[C]//Proceedings of the 33rd International Conference on Software Engineering. Piscataway: IEEE Press, 2011:756-765.
[3] KIM D J, HAN Yongman, CHO Seong-je, et al. Measuring similarity of windows applications using static and dynamic birthmarks[C]//Proceedings of the 28th Annual ACM Symposium on Applied Computing. New York: ACM Press, 2013: 1628-1633.
[4] CHOI Jongcheon,HAN Yongman, CHO Seong-je, et al. A survey of feature extraction techniques to detect the theft of windows applications[C]//Proceedings of the 7th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS).[S.l.]:[s.n.], 2013:723-731.
[5] TAMADA H, NAKAMURA M, MONDEN A, et al. Java birthmarks-detecting the software theft[J]. IEICE Transactions on Information and Systems, 2005, E88D(9): 2148-2158.
[6] JANG M, KOOK J, RYU S, et al. An efficient similarity comparison based on core API calls[C]//Proceedings of the 28th Annual ACM Symposium on Applied Computing. New York: ACM Press, 2013:1634-1638.
[7] TIAN Zhenzhou,ZHENG Qinghua, LIU Ting, et al. DKISB: dynamic key instruction sequence birthmark for software plagiarism detection[C]//Proceedings of 2013 IEEE International Conference on High-Performance Computing and Communications (HPCC) & 2013 IEEE International Conference on Embedded and Ubiquitous Computing (EUC). Washington: IEEE Computer Society, 2013:619-627.
[8] PARK H, CHOI S, LIM H, et al. Detecting code theft via a static instruction trace birthmark for Java methods[C]//Proceedings of the 6th IEEE International Conference onIndustrial Informatics. Washington: IEEE Computer Society, 2008:519-524.
[9] 谢鑫.基于程序属性的Java静态软件胎记技术研究[D].郑州:解放军信息工程大学,2011. XIE Xin. Research on program properties based Java static software birth marking [D]. Zhengzhou: The PLA Information Engineering University, 2011.
[10] LIM Hyun-il, HAN Taisook. Analyzing stack flows to compare Java programs[J]. IEICE Transactions on Information and Systems, 2012, E95D(2): 565-576.
[11] SCHULER D, DALLMEIER V, LINDIG C. A dynamic birthmark for Java[C]//Proceedings of the 22nd IEEE/ACM International Conference on Automated Software Engineering. New York: ACM Press,2007:274-283.
[12] CHOI Jongcheon, HAN Yongman, CHO Seong-je, et al. A static birthmark for MS Windows applications using import address table[C]//Proceedings of the 7th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS). New York: IEEE, 2013:129-134.
[13] YESOL K, JEONGOH M, DONGJIN K, et al. A static birthmark of windows binary executables based on strings[C]//Proceedings of the 7th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS). Los Alamitos: IEEE Computer Society, 2013:734-738.
[14] 陈林,刘粉林,芦斌,等.基于k-gram频数的静态软件胎记[J].计算机工程,2011, 37(4):46-48. CHEN Lin, LIU Fenlin, LU Bin, et al. Static software birthmark based on k-gram frequency[J]. Computer Engineering, 2011, 37(4): 46-48.
[15] CHAE D, KIM S, HA J, et al. Software plagiarism detection via the static API call frequency birthmark[C]//Proceedings of the 28th Annual ACM Symposium on Applied Computing. New York: ACM Press, 2013:1639-1643.
[16] FUKUDA K, TAMADA H. A dynamic birthmark from analyzing operand stack runtime behavior to detect copied software[C]//Proceedings of the 14th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD). New York: IEEE, 2013:505-510.
[17] JANG J, CHOI S, HONG J. A method for resilient graph-based comparison of executable objects[C]//Proceedings of the 2012 ACM Research in Applied Computation Symposium. New York: ACM Press, 2012:288-289.
[18] TIAN Zhenzhou, ZHENG Qinghua, LIU Ting, et al. Plagiarism detection for multithread software based on thread-aware software birthmarks[C]//Proceedings of IEEE International Conference on Program Conprehension(ICPC14). New York: IEEE, 2014:303-314.
[19] COLLBERG C, MYLES G R, HUNTWORK A.Sandmark—a tool for software protection research[J]. IEEE Security & Privacy, 2003, 1(4): 40-49.
[1] YAN Yan, HAO Xiao-hong. Differential privacy partitioning algorithm based on adaptive density grids [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(9): 12-22.
[2] JIAO Hong-ru, QIN Jing. Quantum secret sharing scheme realizing all hyperstar quantum access structure [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(9): 62-68.
[3] XU Li-dong, WANG Ming-qiang. A meet-in-the-middle attack on 10-round AES-128 [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(7): 39-45.
[4] ZHANG Jian-biao, LI Zhi-gang, LIU Guo-jie, WANG Chao, WANG Wei. Process active dynamic measurement method for Windows environment [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(7): 46-50.
[5] CUI Zhao-yang, SUN Jia-qi, XU Song-yan, JIANG Xin. A secure clustering algorithm of Ad Hoc network for colony UAVs [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(7): 51-59.
[6] LIU Zheng, NIU Fang-lin, QIAN Da-xing, CAI Xi-biao, GUO Ying. Design of anti-eavesdropping code based on fountain codes [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(7): 60-64.
[7] LIU Ming-ming, ZHANG Min-qing, LIU Jia, GAO Pei-xian. Steganalysis method based on shallow convolution neural network [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(3): 63-70.
[8] RUAN Shu-hua, WENG Jun-hao, MAO Hui, CHEN Xue-lian. Metric model for cloud computing security risk assessment [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(3): 71-76.
[9] KANG Hai-yan, HUANG Yu-xuan, CHEN Chu-qiao. Enhancing privacy for geographic information based on video analysis [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(1): 19-29.
[10] MENG Bo, LU Jin-tian, WANG De-jun, HE Xu-dong. Survey of security analysis of security protocol implementations [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(1): 1-18.
[11] TAN Ren, YIN Xiao-chuan, JIAO Xian-long, LIAN Zhe, CHEN Yu-xin. Software defined APT attack moving target defense network architecture [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(1): 38-45.
[12] SUN Ze-rui, WANG Ji-jun, LI Guo-xiang, XIA Guo-en. New reversible data hiding algorithm based on interpolation images [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(1): 46-52.
[13] SUN Liang, CHEN Xiao-chun, ZHONG Yang, LIN Zhi-peng, REN Tong. Secure startup mechanism of server based on trusted BMC [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(1): 89-94.
[14] YAO Ke, ZHU Bin-rui, QIN Jing. Verifiable public key searchable encryption protocol based on biometrics [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(11): 11-22.
[15] HAN Pan-pan, QIN Jing. Verifiable and searchable encryption scheme for outsourced database in cloud computing [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(9): 41-53.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!