Dynamic software birthmarks to detect the theft of Windows applications

Haruaki Tamada, Keiji Okamoto, Masahide Nakamura, Akito Monden, Kenichi Matsumoto

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

This paper proposes dynamic software birthmarks which can be extracted during execution of Windows applications. Birthmarks are unique and native characteristics of software. For a pair of software p and q, if q has the same birthmarks as p’s, q is suspected as a copy of p.
Our security analysis showed that the proposed birthmark has good tolerance against various kinds of program transformation attacks.
Original languageEnglish
Title of host publicationProceedings of International Symposium on Future Software Technology 2004
Publication statusPublished - Oct 2004
Externally publishedYes
EventInternational Symposium on Future Software Technology 2004 (ISFST 2004) - Xi'an, China
Duration: Oct 20 2004Oct 22 2004

Conference

ConferenceInternational Symposium on Future Software Technology 2004 (ISFST 2004)
CountryChina
CityXi'an
Period10/20/0410/22/04

Cite this

Tamada, H., Okamoto, K., Nakamura, M., Monden, A., & Matsumoto, K. (2004). Dynamic software birthmarks to detect the theft of Windows applications. In Proceedings of International Symposium on Future Software Technology 2004

Dynamic software birthmarks to detect the theft of Windows applications. / Tamada, Haruaki; Okamoto, Keiji; Nakamura, Masahide; Monden, Akito; Matsumoto, Kenichi.

Proceedings of International Symposium on Future Software Technology 2004. 2004.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Tamada, H, Okamoto, K, Nakamura, M, Monden, A & Matsumoto, K 2004, Dynamic software birthmarks to detect the theft of Windows applications. in Proceedings of International Symposium on Future Software Technology 2004. International Symposium on Future Software Technology 2004 (ISFST 2004), Xi'an, China, 10/20/04.
Tamada H, Okamoto K, Nakamura M, Monden A, Matsumoto K. Dynamic software birthmarks to detect the theft of Windows applications. In Proceedings of International Symposium on Future Software Technology 2004. 2004
Tamada, Haruaki ; Okamoto, Keiji ; Nakamura, Masahide ; Monden, Akito ; Matsumoto, Kenichi. / Dynamic software birthmarks to detect the theft of Windows applications. Proceedings of International Symposium on Future Software Technology 2004. 2004.
@inproceedings{da576ed6ab674c169669a3635d73055e,
title = "Dynamic software birthmarks to detect the theft of Windows applications",
abstract = "This paper proposes dynamic software birthmarks which can be extracted during execution of Windows applications. Birthmarks are unique and native characteristics of software. For a pair of software p and q, if q has the same birthmarks as p’s, q is suspected as a copy of p.Our security analysis showed that the proposed birthmark has good tolerance against various kinds of program transformation attacks.",
author = "Haruaki Tamada and Keiji Okamoto and Masahide Nakamura and Akito Monden and Kenichi Matsumoto",
year = "2004",
month = "10",
language = "English",
booktitle = "Proceedings of International Symposium on Future Software Technology 2004",

}

TY - GEN

T1 - Dynamic software birthmarks to detect the theft of Windows applications

AU - Tamada, Haruaki

AU - Okamoto, Keiji

AU - Nakamura, Masahide

AU - Monden, Akito

AU - Matsumoto, Kenichi

PY - 2004/10

Y1 - 2004/10

N2 - This paper proposes dynamic software birthmarks which can be extracted during execution of Windows applications. Birthmarks are unique and native characteristics of software. For a pair of software p and q, if q has the same birthmarks as p’s, q is suspected as a copy of p.Our security analysis showed that the proposed birthmark has good tolerance against various kinds of program transformation attacks.

AB - This paper proposes dynamic software birthmarks which can be extracted during execution of Windows applications. Birthmarks are unique and native characteristics of software. For a pair of software p and q, if q has the same birthmarks as p’s, q is suspected as a copy of p.Our security analysis showed that the proposed birthmark has good tolerance against various kinds of program transformation attacks.

M3 - Conference contribution

BT - Proceedings of International Symposium on Future Software Technology 2004

ER -