Scaling Up Software Birthmarks Using Fuzzy Hashing

Scaling Up Software Birthmarks Using Fuzzy Hashing

Takehiro Tsuzaki, Teruaki Yamamoto, Haruaki Tamada, Akito Monden
ISBN13: 9781799830160|ISBN10: 1799830160|EISBN13: 9781799830177
DOI: 10.4018/978-1-7998-3016-0.ch039
Cite Chapter Cite Chapter

MLA

Tsuzaki, Takehiro, et al. "Scaling Up Software Birthmarks Using Fuzzy Hashing." Research Anthology on Recent Trends, Tools, and Implications of Computer Programming, edited by Information Resources Management Association, IGI Global, 2021, pp. 867-882. https://doi.org/10.4018/978-1-7998-3016-0.ch039

APA

Tsuzaki, T., Yamamoto, T., Tamada, H., & Monden, A. (2021). Scaling Up Software Birthmarks Using Fuzzy Hashing. In I. Management Association (Ed.), Research Anthology on Recent Trends, Tools, and Implications of Computer Programming (pp. 867-882). IGI Global. https://doi.org/10.4018/978-1-7998-3016-0.ch039

Chicago

Tsuzaki, Takehiro, et al. "Scaling Up Software Birthmarks Using Fuzzy Hashing." In Research Anthology on Recent Trends, Tools, and Implications of Computer Programming, edited by Information Resources Management Association, 867-882. Hershey, PA: IGI Global, 2021. https://doi.org/10.4018/978-1-7998-3016-0.ch039

Export Reference

Mendeley
Favorite

Abstract

To detect the software theft, software birthmarks have been proposed. Software birthmark systems extract software birthmarks, which are native characteristics of software, from binary programs, and compare them by computing the similarity between birthmarks. This paper proposes a new procedure for scaling up the birthmark systems. While conventional birthmark systems are composed of the birthmark extraction phase and the birthmark comparison phase, the proposed method adds two new phases between extraction and comparison, namely, compression phase, which employs fuzzy hashing, and pre-comparison phase, which aims to increase distinction property of birthmarks. The proposed method enables us to reduce the required time in the comparison phase, so that it can be applied to detect software theft among many larger scale software products. From an experimental evaluation, the authors found that the proposed method significantly reduces the comparison time, and keeps the distinction performance, which is one of the important properties of the birthmark. Also, the preservation performance is acceptable when the threshold value is properly set.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.