Reference Hub2
Scaling Up Software Birthmarks Using Fuzzy Hashing

Scaling Up Software Birthmarks Using Fuzzy Hashing

Takehiro Tsuzaki, Teruaki Yamamoto, Haruaki Tamada, Akito Monden
Copyright: © 2017 |Volume: 5 |Issue: 3 |Pages: 14
ISSN: 2166-7160|EISSN: 2166-7179|EISBN13: 9781522515555|DOI: 10.4018/IJSI.2017070107
Cite Article Cite Article

MLA

Tsuzaki, Takehiro, et al. "Scaling Up Software Birthmarks Using Fuzzy Hashing." IJSI vol.5, no.3 2017: pp.89-102. http://doi.org/10.4018/IJSI.2017070107

APA

Tsuzaki, T., Yamamoto, T., Tamada, H., & Monden, A. (2017). Scaling Up Software Birthmarks Using Fuzzy Hashing. International Journal of Software Innovation (IJSI), 5(3), 89-102. http://doi.org/10.4018/IJSI.2017070107

Chicago

Tsuzaki, Takehiro, et al. "Scaling Up Software Birthmarks Using Fuzzy Hashing," International Journal of Software Innovation (IJSI) 5, no.3: 89-102. http://doi.org/10.4018/IJSI.2017070107

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

To detect the software theft, software birthmarks have been proposed. Software birthmark systems extract software birthmarks, which are native characteristics of software, from binary programs, and compare them by computing the similarity between birthmarks. This paper proposes a new procedure for scaling up the birthmark systems. While conventional birthmark systems are composed of the birthmark extraction phase and the birthmark comparison phase, the proposed method adds two new phases between extraction and comparison, namely, compression phase, which employs fuzzy hashing, and pre-comparison phase, which aims to increase distinction property of birthmarks. The proposed method enables us to reduce the required time in the comparison phase, so that it can be applied to detect software theft among many larger scale software products. From an experimental evaluation, the authors found that the proposed method significantly reduces the comparison time, and keeps the distinction performance, which is one of the important properties of the birthmark. Also, the preservation performance is acceptable when the threshold value is properly set.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.