Software plagiarism detection with birthmarks based on dynamic key instruction sequences

Z Tian, Q Zheng, T Liu, M Fan… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
A software birthmark is a unique characteristic of a program. Thus, comparing the birthmarks
between the plaintiff and defendant programs provides an effective approach for software …

Program characterization using runtime values and its application to software plagiarism detection

YC Jhi, X Jia, X Wang, S Zhu, P Liu… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Illegal code reuse has become a serious threat to the software community. Identifying similar
or identical code fragments becomes much more challenging in code theft cases where …

Memoized semantics-based binary diffing with application to malware lineage inference

J Ming, D Xu, D Wu - IFIP International Information Security and Privacy …, 2015 - Springer
Identifying differences between two executable binaries (binary diffing) has compelling
security applications, such as software vulnerability exploration,“1-day” exploit generation …

Binary code reuse detection for reverse engineering and malware analysis

H Huang - 2015 - spectrum.library.concordia.ca
Code reuse detection is a key technique in reverse engineering. However, existing source
code similarity comparison techniques are not applicable to binary code. Moreover …

[引用][C] Survey of Obfuscated Plagiarism Detection Techniques

N Shenoy, S Pawar - International Journal Computer Technology & …, 2015