software birthmark algorithm

R. Kalyani,R. Dhivya,Senthil Kumar

Published in International Journal of Advanced Research in Computer Science Engineering and Information Technology

ISSN: 2321-3337          Impact Factor:1.521         Volume:3         Issue:1         Year: 25 August,2014         Pages:375-380

International Journal of Advanced Research in Computer Science Engineering and Information Technology

Abstract

Programs of online technological innovation enhance the quality of tracking and making decisions in intelligent lines. These online technological innovations are susceptible to harmful strikes, and limiting them can have serious technological and cost-effective problems. There are methods like rule obfuscation and watermarking which can make the source rule of a system difficult to understand by people and validate the ownership of the system. However, rule obfuscation cannot avoid the source program code being copied and a watermark can be defaced. In it uses a relatively new technique, program birthmark, to help identify program code theft of JavaScript applications. A birthmark is a unique attribute a system provides that can be used to identify the system. It improves two newest birthmark methods that attract out the birthmark of an program from the run-time load. It suggests a remodeled system with improved durability and performed comprehensive tests to justify the performance and durability of it.

Kewords

Code theft detection, heap graph, software birthmark, software protection.

Reference

[1] E. Data, JavaScript Dominates EMEA Development Jan. 2008 [Online]. Available: [2] C. Collberg and C. Thomborson, “Software watermarking: Models and dynamic embeddings,” in Proc. Symp. Principles of Programming Languages (POPL’99), 1999, pp. 311–324. [3] A. Monden, H. Iida, K. I.Matsumoto, K. Inoue, and K. Torii, “Watermarking java programs,” in Proc. Int. Symp. Future [4] C. Collberg, E. Carter, S. Debray, A. Huntwork, J. Kececioglu, C. Linn, and M. Stepp, “Dynamic path-based software watermarking,” in Proc. ACM SIGPLAN 2004 Conf. Programming Language Design and Implementation (PLDI ’04), New York, 2004, pp. 107–118, ACM. [5] C. Collberg, C. Thomborson, and D. Low, A Taxonomy of Obfuscating Transformations Tech. Rep. 148, Jul. 1997 [Online]. Available: http://www.cs.auckland.ac.nz/~collberg/Research/Publications/CollbergThomborsonLow97a/index.html [6] X. Wang,Y.-C. Jhi, S. Zhu, and P. Liu, “Behavior based software theft detection,” in Proc. 16th ACM Conf. Comput. and Commun. Security (CCS ’09), New York, 2009, pp. 280–290, ACM. [7] G.Myles and C. Collberg, “Detecting software theft via whole program path birthmarks,” in Proc. Inf. Security 7th Int. Conf. (ISC 2004), Palo Alto, CA, Sep. 27–29, 2004, pp. 404–415. [8] D. Schuler, V. Dallmeier, and C. Lindig, “A dynamic birthmark for java,” in Proc. [8] D. Schuler, V. Dallmeier, and C. Lindig, “A dynamic birthmark for java,” in Proc.22nd IEEE/ACM Int. Conf. Automated Software Eng. (ASE ’07), New York, 2007, pp. 274–283, ACM