Zobrazeno 1 - 10
of 117
pro vyhledávání: '"Software birthmark"'
Autor:
Chih-Ko Chung, Pi-Chung Wang
Publikováno v:
IEEE Access, Vol 9, Pp 110811-110825 (2021)
Identifying the credibility of executable files is critical for the security of an operating system. Modern operating systems rely on code signing, which uses a default-valid trust model, for executable files to identify their publishers. A malware c
Externí odkaz:
https://doaj.org/article/09d5318f22b3417eacea6fad26baa4b7
Publikováno v:
Scientific Programming, Vol 2021 (2021)
Source code transformation is a way in which source code of a program is transformed by observing any operation for generating another or nearly the same program. This is mostly performed in situations of piracy where the pirates want the ownership o
Publikováno v:
SANER
Software plagiarism seriously impedes the healthy development of open source software. To fight against code obfuscation and inherent non-determinism of thread scheduling applied against software plagiarism detection, we proposed a new dynamic birthm
Publikováno v:
The Computer Journal. 61:1202-1215
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
International Journal of Software Innovation. 5:89-102
To detect the software theft, software birthmarks have been proposed. Software birthmark systems extract software birthmarks, which are native characteristics of software, from binary programs, and compare them by computing the similarity between bir
Autor:
Seongsoo Park, Hwansoo Han
Publikováno v:
Journal of KIISE. 43:1067-1072
Autor:
Muhammad Ahsan, Jaime Lloret, Rahmita Wirza, Shah Nazir, Rohul Amin, Neelam Mukhtar, Iván García-Magariño, Sara Shahzad
Publikováno v:
RiuNet. Repositorio Institucional de la Universitat Politécnica de Valéncia
instname
instname
[EN] Piracy of software is an increasing problem of modern day software industry. Piracy of software is the unlawful use of software or part of it without proper permission as described in license agreement. Software piracy is a serious crime but not
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::a4171c27276c59ab4d51622614a27200
Autor:
Takanori Yokoi, Haruaki Tamada
Publikováno v:
SNPD
The software birthmark methods are proposed to find the stolen software from the huge number of suspects. The software birthmark methods are classified into two manners, static and dynamic manners. Different from the static birthmarks, dynamic birthm
Publikováno v:
IEICE Transactions on Information and Systems. :1836-1851