Detecting Software Theft via System Call Based Birthmarks. Xinran Wang, Yoon-Chan Jhi, Sencun Zhu, Peng Liu ACSAC 2009. OUTLINE. Introduction and Related Work System Call Based Birthmarks System Design and Implementation Evaluation Discussion and Conclusion.
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
Detecting Software Theft via System Call Based Birthmarks
Xinran Wang, Yoon-Chan Jhi, Sencun Zhu,
SCSSB(p, I, k) is a subset of set S(p, I, k) that satisfies
Here A is the birthmark of a plaintiff program or its component, and B is the birthmark of a suspect program.