期刊文献+

基于特征字符串动态引用频率的库引用识别

Identify library reference based on dynamic frequency of character strings
下载PDF
导出
摘要 提出基于特征字符串动态引用频率的程序胎记,分析了其应对编译优化、压缩混淆的能力,设计了其提取算法;通过对库引用问题的分析,提出了其相似性函数,通过实例验证了上述动态程序胎记和相似性函数在分析库引用问题上的有效性。 This paper proposes a dynamic software birthmark, analyzes its ability against of compiling optimization and compress confusion, designs its extraction algorithms. It analyzes the character of lib reference and proposes the similar function of lib reference. It verifies the validity of the dynamic software birthmark and similar function through instance.
出处 《计算机工程与应用》 CSCD 2014年第18期109-112,151,共5页 Computer Engineering and Applications
关键词 程序胎记 库引用识别 相似性函数 动态二进制插桩 software birthmark lib reference detection similar function dynamic binary instrument
  • 相关文献

参考文献14

  • 1Hemel A, Kalleberg K T, Vermaas R, et al.Finding soft- ware license violations through binary code clone detec- tion[C]//Proceedings of the 8th Working Conference on Mining Software Repositories,2011:63-72.
  • 2Cesare S, Xiang Y.Soflware similarity and classification[M]. [S,1.] : Springer, 2012.
  • 3Wehner S.Analyzing worms and network traffic using com- pression[J].Journal of Computer Security, 2007, 15 (3) : 303-320.
  • 4Myles G,Collberg C.K-gram based soilware birthmarks[C]// Proceedings of the 2005 ACM Symposium on Applied Computing, 2005 : 314-318.
  • 5Tamada H,Nakamura M, Monden A, et al.Design and eval- uation of birthmarks for detecting theft of java pro- grams[C]//IASTED Conf on Software Engineering,2004: 569-574.
  • 6Son J W,Park S B,Park S Y.Program plagiarism detec- tion using parse tree kernels[C]//PRICAI 2006: Trends in Artificial Intelligence.Berlin Heidelberg: Springer, 2006: 1000-1004.
  • 7Gheorghescu M.An automated virus classification system[C]// Virus Bulletin Conference, 2005 : 294-300.
  • 8Choi S,Park H, Lim H,et al.A static birthmark of binary executables based on API call structure[C]//Advanees in Computer Science.Berlin Heidelberg : Springer, 2007 : 2-16.
  • 9Tamada H,Okamoto K,Nakamura M,et al.Dynamic soft- ware birthmarks to detect the theft of windows applica- tions[C]//Intemational Symposium on Future Software Tech- nology, 2004.
  • 10Flake H.Structural comparison of executable objects[C]// Proceedings of Detection of Intrusions and Malware & Vulnerability Assessment DIMVA, 2004 : 161-173.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部