A Software Identification Method Based on Data Stream Slicing

A data flow and slicing technology, applied in the computer field, can solve problems such as the reduction of dynamic K-gram robustness

Inactive Publication Date: 2011-12-28
NORTHWEST UNIV(CN)
View PDF5 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If the attacker performs equivalent replacements for all instructions of the program, the robustness of dynamic K-grams decreases

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Software Identification Method Based on Data Stream Slicing
  • A Software Identification Method Based on Data Stream Slicing
  • A Software Identification Method Based on Data Stream Slicing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] The invention is a software identification method based on data flow slicing, which mainly uses a computer system to provide support for software identification and virus detection. A computer system model such as figure 1 As shown, it specifically includes the following modules:

[0055] The data dependency extraction module is used to extract the data flow and its dependencies of the original software itself, and express the extracted data flow with a data dependency graph;

[0056] The data flow described in this application is a data sequence formed by new data generated during software operation, which is different from the concept of data flow in software engineering. The specific definition is as follows:

[0057] Data Stream (Data Stream referred to as DS): When the software P inputs I, di is the new data generated by the software expression calculation, i represents the sequence of time, and a data string d1, d2...dn will be formed in turn. The data flow is d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a software identification method based on a data stream sliced sheet, which comprises the following steps: carrying out software identification and virus detection on software by adopting a computer system, wherein, the computer system comprises a feature extraction module which is provided with a data dependence extraction module, a data dependence graph sliced sheet module, a topological sorting module and a sliced sheet rule module, wherein, the data dependence extraction module is connected with the data collection module; the data dependence extraction module and the data collection module have an common input (I); the outputs of the feature extraction module and the data collection module are connected with a similarity comparison module, and give out a software feature extraction algorithm secondary flight display system (SFDS) based on the data stream sliced sheet; a software feature judgment system aiming to the data stream sliced sheet is realized; and on the judgment system, robustness and confidence experiment and analysis are carried out on the provided algorithm.

Description

technical field [0001] The invention belongs to the technical field of computers and relates to a software identification method, in particular to software copyright protection and virus feature detection applied to software security research. More precisely, it is a software identification method based on data stream slicing. Background technique [0002] With the popularization of software applications and the rapid development of computer technology, while the use of software brings huge benefits, due to the characteristics of software itself: intangible, abstract, systematic, domain-specific, dependent, non-destructive, copy Sex and evolution, etc., also bring huge security threats. Software security threats are mainly divided into two categories: one is the huge loss caused by software piracy, and the other is the huge loss caused by malicious code. [0003] Software piracy technology and malicious code attack technology continue to be intelligent and diversified, and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/22G06F21/10
Inventor 房鼎益李磊汤战勇陈晓江雷远晓郭俊何路龚晓庆王妮王怀军高宝健邢天璋
Owner NORTHWEST UNIV(CN)
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products