A fuzzy hashing technique for large scale software birthmarks

Takehiro Tsuzaki, Teruaki Yamamoto, Haruaki Tamada, Akito Monden

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Abstract

Software birthmarks have been proposed as a method for enabling the detection of programs that may have been stolen by measuring the similarity between the two programs. A birthmark is created from each program by extracting its native characteristics. The birthmarks of the programs can then be compared. However, because the extracted birthmarks contain a large amount of information, a large amount of time is needed when using them to compare large programs. This paper describes our work to reduce this comparison time. Achieving faster comparisons will enable the evaluation of large programs and simplify the use of birthmarks. Specifically, our method creates hashes from conventional birthmark information using fuzzy hashing, and then measures the similarity of the programs using the obtained hash values. Using the proposed method, we achieved a major speed increase over the conventional birthmark method with distinction rates of over 90%. On the other hand, because preservation performance decreased substantially, the similarity threshold value needed to be lowered when using the proposed method.

Original languageEnglish
Title of host publication2016 IEEE/ACIS 15th International Conference on Computer and Information Science, ICIS 2016 - Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781509008063
DOIs
Publication statusPublished - Aug 23 2016
Event15th IEEE/ACIS International Conference on Computer and Information Science, ICIS 2016 - Okayama, Japan
Duration: Jun 26 2016Jun 29 2016

Other

Other15th IEEE/ACIS International Conference on Computer and Information Science, ICIS 2016
Country/TerritoryJapan
CityOkayama
Period6/26/166/29/16

ASJC Scopus subject areas

  • Computer Science(all)
  • Energy Engineering and Power Technology
  • Control and Optimization

Fingerprint

Dive into the research topics of 'A fuzzy hashing technique for large scale software birthmarks'. Together they form a unique fingerprint.

Cite this