JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2014, Vol. 49 ›› Issue (09): 9-16.doi: 10.6040/j.issn.1671-9352.2.2014.123
Previous Articles Next Articles
FAN Ming, LIU Jun, ZHENG Qing-hua, TIAN Zhen-zhou, ZHUANG Er-yue, LIU Ting
CLC Number:
[1] Tuicool. Samsung demands access to apple's iOS 6 source code innotification lawsuit in Korea[EB/OL]. [2013-01-25]. http://www.tuicool.com/articles/j2INVn. [2] JHI Yoon-Chan, WANG Xinran, JIA Xiaoqi, et al. Value-based program characterization and its application to software plagiarism detection[C]//Proceedings of the 33rd International Conference on Software Engineering. Piscataway: IEEE Press, 2011:756-765. [3] KIM D J, HAN Yongman, CHO Seong-je, et al. Measuring similarity of windows applications using static and dynamic birthmarks[C]//Proceedings of the 28th Annual ACM Symposium on Applied Computing. New York: ACM Press, 2013: 1628-1633. [4] CHOI Jongcheon,HAN Yongman, CHO Seong-je, et al. A survey of feature extraction techniques to detect the theft of windows applications[C]//Proceedings of the 7th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS).[S.l.]:[s.n.], 2013:723-731. [5] TAMADA H, NAKAMURA M, MONDEN A, et al. Java birthmarks-detecting the software theft[J]. IEICE Transactions on Information and Systems, 2005, E88D(9): 2148-2158. [6] JANG M, KOOK J, RYU S, et al. An efficient similarity comparison based on core API calls[C]//Proceedings of the 28th Annual ACM Symposium on Applied Computing. New York: ACM Press, 2013:1634-1638. [7] TIAN Zhenzhou,ZHENG Qinghua, LIU Ting, et al. DKISB: dynamic key instruction sequence birthmark for software plagiarism detection[C]//Proceedings of 2013 IEEE International Conference on High-Performance Computing and Communications (HPCC) & 2013 IEEE International Conference on Embedded and Ubiquitous Computing (EUC). Washington: IEEE Computer Society, 2013:619-627. [8] PARK H, CHOI S, LIM H, et al. Detecting code theft via a static instruction trace birthmark for Java methods[C]//Proceedings of the 6th IEEE International Conference onIndustrial Informatics. Washington: IEEE Computer Society, 2008:519-524. [9] 谢鑫.基于程序属性的Java静态软件胎记技术研究[D].郑州:解放军信息工程大学,2011. XIE Xin. Research on program properties based Java static software birth marking [D]. Zhengzhou: The PLA Information Engineering University, 2011. [10] LIM Hyun-il, HAN Taisook. Analyzing stack flows to compare Java programs[J]. IEICE Transactions on Information and Systems, 2012, E95D(2): 565-576. [11] SCHULER D, DALLMEIER V, LINDIG C. A dynamic birthmark for Java[C]//Proceedings of the 22nd IEEE/ACM International Conference on Automated Software Engineering. New York: ACM Press,2007:274-283. [12] CHOI Jongcheon, HAN Yongman, CHO Seong-je, et al. A static birthmark for MS Windows applications using import address table[C]//Proceedings of the 7th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS). New York: IEEE, 2013:129-134. [13] YESOL K, JEONGOH M, DONGJIN K, et al. A static birthmark of windows binary executables based on strings[C]//Proceedings of the 7th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS). Los Alamitos: IEEE Computer Society, 2013:734-738. [14] 陈林,刘粉林,芦斌,等.基于k-gram频数的静态软件胎记[J].计算机工程,2011, 37(4):46-48. CHEN Lin, LIU Fenlin, LU Bin, et al. Static software birthmark based on k-gram frequency[J]. Computer Engineering, 2011, 37(4): 46-48. [15] CHAE D, KIM S, HA J, et al. Software plagiarism detection via the static API call frequency birthmark[C]//Proceedings of the 28th Annual ACM Symposium on Applied Computing. New York: ACM Press, 2013:1639-1643. [16] FUKUDA K, TAMADA H. A dynamic birthmark from analyzing operand stack runtime behavior to detect copied software[C]//Proceedings of the 14th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD). New York: IEEE, 2013:505-510. [17] JANG J, CHOI S, HONG J. A method for resilient graph-based comparison of executable objects[C]//Proceedings of the 2012 ACM Research in Applied Computation Symposium. New York: ACM Press, 2012:288-289. [18] TIAN Zhenzhou, ZHENG Qinghua, LIU Ting, et al. Plagiarism detection for multithread software based on thread-aware software birthmarks[C]//Proceedings of IEEE International Conference on Program Conprehension(ICPC14). New York: IEEE, 2014:303-314. [19] COLLBERG C, MYLES G R, HUNTWORK A.Sandmark—a tool for software protection research[J]. IEEE Security & Privacy, 2003, 1(4): 40-49. |
[1] | YAN Yan, HAO Xiao-hong. Differential privacy partitioning algorithm based on adaptive density grids [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(9): 12-22. |
[2] | JIAO Hong-ru, QIN Jing. Quantum secret sharing scheme realizing all hyperstar quantum access structure [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(9): 62-68. |
[3] | XU Li-dong, WANG Ming-qiang. A meet-in-the-middle attack on 10-round AES-128 [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(7): 39-45. |
[4] | ZHANG Jian-biao, LI Zhi-gang, LIU Guo-jie, WANG Chao, WANG Wei. Process active dynamic measurement method for Windows environment [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(7): 46-50. |
[5] | CUI Zhao-yang, SUN Jia-qi, XU Song-yan, JIANG Xin. A secure clustering algorithm of Ad Hoc network for colony UAVs [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(7): 51-59. |
[6] | LIU Zheng, NIU Fang-lin, QIAN Da-xing, CAI Xi-biao, GUO Ying. Design of anti-eavesdropping code based on fountain codes [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(7): 60-64. |
[7] | LIU Ming-ming, ZHANG Min-qing, LIU Jia, GAO Pei-xian. Steganalysis method based on shallow convolution neural network [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(3): 63-70. |
[8] | RUAN Shu-hua, WENG Jun-hao, MAO Hui, CHEN Xue-lian. Metric model for cloud computing security risk assessment [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(3): 71-76. |
[9] | KANG Hai-yan, HUANG Yu-xuan, CHEN Chu-qiao. Enhancing privacy for geographic information based on video analysis [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(1): 19-29. |
[10] | MENG Bo, LU Jin-tian, WANG De-jun, HE Xu-dong. Survey of security analysis of security protocol implementations [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(1): 1-18. |
[11] | TAN Ren, YIN Xiao-chuan, JIAO Xian-long, LIAN Zhe, CHEN Yu-xin. Software defined APT attack moving target defense network architecture [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(1): 38-45. |
[12] | SUN Ze-rui, WANG Ji-jun, LI Guo-xiang, XIA Guo-en. New reversible data hiding algorithm based on interpolation images [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(1): 46-52. |
[13] | SUN Liang, CHEN Xiao-chun, ZHONG Yang, LIN Zhi-peng, REN Tong. Secure startup mechanism of server based on trusted BMC [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(1): 89-94. |
[14] | YAO Ke, ZHU Bin-rui, QIN Jing. Verifiable public key searchable encryption protocol based on biometrics [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(11): 11-22. |
[15] | HAN Pan-pan, QIN Jing. Verifiable and searchable encryption scheme for outsourced database in cloud computing [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(9): 41-53. |
|