Dynamic key command sequence birthmark-based software plagiarism detecting method

A technology of key instructions and detection methods, applied in the field of plagiarism detection based on dynamic software birthmarks, can solve problems such as small scope of application, obfuscation technology, and difficult to cope with codes

Active Publication Date: 2014-02-12
XI AN JIAOTONG UNIV
View PDF3 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although existing research has solved the problem of plagiarism detection to a certain extent, there are still a series of limitations: 1) most existing software birthmarks are difficult to cope with deep code obfuscation techniques; 2) many methods are based on source code , and before there is no conclusive evidence, usually only the binary code of the suspicious program can be obtained; 3) Most software birthmarks depend on a specific operating system or programming language, and the scope of application is small

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Dynamic key command sequence birthmark-based software plagiarism detecting method
  • Dynamic key command sequence birthmark-based software plagiarism detecting method
  • Dynamic key command sequence birthmark-based software plagiarism detecting method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] The implementation of the software plagiarism detection method based on the dynamic key instruction sequence birthmark of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0058] figure 1 It is the processing flow of the software plagiarism detection method based on the birthmark of dynamic key instruction sequence, where the first program (plaintiff program) refers to the original program developed by the program owner, and the second program (defendant program) refers to the software that is considered to have copied the original program. Suspicious program.

[0059] A kind of software plagiarism detection method based on dynamic key instruction sequence birthmark of the present invention comprises the following steps:

[0060] Step S101: Use dynamic instrumentation tools such as Pin, Valgrind, etc., to implant analysis code before each instruction of the program to be analyzed is executed, so as to monitor the i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a dynamic key command sequence birthmark-based software plagiarism detecting method, which comprises the steps of (1) monitoring a program to be analyzed based on a dynamic instrumentation and identifying and recording a key command by combining with dynamic stain analysis in real time; (2), preprocessing the recorded key command sequence, stripping an operation number and extracting a mnemonic sequence; (3) on the basis, respectively generating a dynamic key command sequence birthmark for two software to be detected; (4) calculating the similarity of the birthmarks; (5) making the design of plagiarism or not by the average value of the similarity of the birthmarks and a given threshold value. The dynamic key command sequence birthmark-based software plagiarism detecting method directly aims at the binary codes without the need of existence of source codes and has more practical significance; the detection means does not depend on a specific platform or programming language, has wider application range and has better resistance to the code obfuscation technology with reversed semantics, so the detection capability of deep plagiarism is improved.

Description

Technical field: [0001] The invention relates to the fields of program feature discovery and software plagiarism detection, in particular to a plagiarism detection method based on dynamic software birthmarks. Background technique: [0002] Free or open source software projects allow users to use, modify or distribute software in compliance with the License, such as the GPL public license as the most widely used free software license, which allows users to freely modify the software, but requires the deduction based on the GPL program Works must also be subject to the GPL, such as gcc and the Linux kernel are subject to the GPL. This aspect has promoted the vigorous development of the software industry. On the other hand, some companies privately integrate the code of open source software into their own commercial products in violation of the software license for their own benefit; of course, there are also some companies, especially large companies, which often receive some...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F11/36
Inventor 郑庆华田振洲刘烃范铭
Owner XI AN JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products