DAAV: Dynamic API authority vectors for detecting software theft
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Chae, Dong-Kyu | - |
dc.contributor.author | Kim, Sang-Wook | - |
dc.contributor.author | Cho, Seong-Je | - |
dc.contributor.author | Kim, Yesol | - |
dc.date.accessioned | 2022-07-15T20:45:51Z | - |
dc.date.available | 2022-07-15T20:45:51Z | - |
dc.date.created | 2021-05-13 | - |
dc.date.issued | 2015-10 | - |
dc.identifier.issn | 0000-0000 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/hanyang/handle/2021.sw.hanyang/156187 | - |
dc.description.abstract | This paper proposes a novel birthmark, a dynamic API authority vector (DAAV), for detecting software theft. DAAV satisfies four essential requirements for good birthmarks-credibility, resiliency, scalability, and packing-free-while existing birthmarks fail to satisfy all of them together. In particular, existing static birthmarks are unable to handle the packed programs and existing dynamic birthmarks do not satisfy credibility and resiliency. Our experimental results demonstrate that DAAV provides satisfying credibility and resiliency compared with existing dynamic birthmarks and also can cover packed programs. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | Association for Computing Machinery | - |
dc.title | DAAV: Dynamic API authority vectors for detecting software theft | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Kim, Sang-Wook | - |
dc.identifier.doi | 10.1145/2806416.2806646 | - |
dc.identifier.scopusid | 2-s2.0-84958251177 | - |
dc.identifier.bibliographicCitation | International Conference on Information and Knowledge Management, Proceedings, v.19-23-Oct-2015, pp.1819 - 1822 | - |
dc.relation.isPartOf | International Conference on Information and Knowledge Management, Proceedings | - |
dc.citation.title | International Conference on Information and Knowledge Management, Proceedings | - |
dc.citation.volume | 19-23-Oct-2015 | - |
dc.citation.startPage | 1819 | - |
dc.citation.endPage | 1822 | - |
dc.type.rims | ART | - |
dc.type.docType | Conference Paper | - |
dc.description.journalClass | 1 | - |
dc.description.isOpenAccess | N | - |
dc.description.journalRegisteredClass | scopus | - |
dc.subject.keywordPlus | Crime | - |
dc.subject.keywordPlus | Knowledge management | - |
dc.subject.keywordPlus | Graph | - |
dc.subject.keywordPlus | Random Walk | - |
dc.subject.keywordPlus | Similarity | - |
dc.subject.keywordPlus | Theft detections | - |
dc.subject.keywordPlus | Computer crime | - |
dc.subject.keywordAuthor | Graph | - |
dc.subject.keywordAuthor | Random walk | - |
dc.subject.keywordAuthor | Similarity | - |
dc.subject.keywordAuthor | Software theft detection | - |
dc.identifier.url | https://dl.acm.org/doi/10.1145/2806416.2806646 | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
222, Wangsimni-ro, Seongdong-gu, Seoul, 04763, Korea+82-2-2220-1365
COPYRIGHT © 2021 HANYANG UNIVERSITY.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.