9 Implemented Birthmarks
\r
13 [Proposers] H. Tamada, et al.
\r
15 [Description] Constant values of field variables and its field type
\r
17 [Paper] Haruaki Tamada, Masahide Nakamura, Akito Monden, and Ken-ichi
\r
18 Matsumoto, "Java Birthmarks --Detecting the Software Theft--," IEICE
\r
19 Transactions on Information and Systems, Vol. E88-D, No. 9, September
\r
24 [Proposers] H. Tamada, et al.
\r
26 [Description] Sequence of method calls in definition order (not execution order).
\r
28 [Paper] Haruaki Tamada, Masahide Nakamura, Akito Monden, and Ken-ichi
\r
29 Matsumoto, "Java Birthmarks --Detecting the Software Theft--," IEICE
\r
30 Transactions on Information and Systems, Vol. E88-D, No. 9, September
\r
35 [Proposers] H. Tamada, et al.
\r
37 [Description] Inheritance structure of target class. If a class in
\r
38 this birthmark elements is not wellknown-class, replace it to <null>.
\r
40 [Paper] Haruaki Tamada, Masahide Nakamura, Akito Monden, and Ken-ichi
\r
41 Matsumoto, "Java Birthmarks --Detecting the Software Theft--," IEICE
\r
42 Transactions on Information and Systems, Vol. E88-D, No. 9, September
\r
47 [Proposers] H. Tamada, et al.
\r
49 [Description] A set of used classes. Elements of this birthmark is
\r
50 appeared in field type, method argument types, return type and used
\r
53 [Paper] Haruaki Tamada, Masahide Nakamura, Akito Monden, and Ken-ichi
\r
54 Matsumoto, "Java Birthmarks --Detecting the Software Theft--," IEICE
\r
55 Transactions on Information and Systems, Vol. E88-D, No. 9, September
\r
58 *k-gram based birthmark
\r
60 [Proposers] G. Myles and C. Collberg
\r
62 [Description] Construct k-gram from instructions.
\r
64 [Paper] Ginger Myles, Christian Collberg, ``K-gram based software
\r
65 birthmarks,'' In Proc. of the 2005 ACM symposium on Applied
\r
70 [Proposers] H. Tamada
\r
72 [Description] Frequency of method calls.
\r
74 [Papers] Not published
\r
76 [Related Papers] Haruaki Tamada, Keiji Okamoto, Masahide Nakamura,
\r
77 Akito Monden, and Ken-ichi Matsumoto, ``Dynamic Software Birthmarks
\r
78 to Detect the Theft of Windows Applications,'' In
\r
79 Proc. International Symposium on Future Software Technology 2004
\r
80 (ISFST 2004), CD-ROM, Xi'an, China, 20-22 October 2004.
\r
84 [Proposers] H. Tamada
\r
86 [Description] Frequency of used classes.
\r
88 [Papers] Not published
\r
90 [Related Papers] Haruaki Tamada, Keiji Okamoto, Masahide Nakamura,
\r
91 Akito Monden, and Ken-ichi Matsumoto, ``Dynamic Software Birthmarks
\r
92 to Detect the Theft of Windows Applications,'' In
\r
93 Proc. International Symposium on Future Software Technology 2004
\r
94 (ISFST 2004), CD-ROM, Xi'an, China, 20-22 October 2004.
\r
98 *MDS (Multi-dimensional scaling)
\r
100 [Proposer?] T. Kakimoto, et al.
\r
102 [Description] plotting classes into plane based on their similarities
\r
103 between each pairs.
\r
105 [Paper] Takeshi Kakimoto, Akito Monden, Yasutaka Kamei, Haruaki
\r
106 Tamada, Masateru Tsunoda, and Ken-ichi Matsumoto, ``Using Software
\r
107 Birthmarks to Identify Similar Classes and Major Functionalities,''
\r
108 In Proc. the 3rd International Workshop on Mining Software
\r
109 Repositories ({{{http://msr.uwaterloo.ca/msr2006/}MSR Mining
\r
110 Challenge 2006}}), pp.171--172, Shanghai, China, May 2006.
\r
114 * Mari-Len De Guzman, ``'Birthmark' scans software for piracy
\r
115 check,'' COMPUTERWORLD, 29 August 2008,
\r
116 {{{http://www.computerworld.com.au/index.php?id=1493459712&rid=-219}http://www.computerworld.com.au/index.php?id=1493459712&rid=-219}}
\r
118 * Mari-Len De Guzman, ``German researchers develop ‘Birthmark’ for
\r
119 piracy check,'' IT World Canada, 29 August 2007,
\r
120 {{{http://www.itworldcanada.com/a/News/7ed1b410-7517-4e8a-91c8-f0fae4ea07dc.html}http://www.itworldcanada.com/a/News/7ed1b410-7517-4e8a-91c8-f0fae4ea07dc.html}}.
\r
122 * Andreas Zeller, ``A new method to detect software theft,''
\r
123 idw-online, 23 August
\r
124 2007. {{{http://idw-online.de/pages/de/news222661}http://idw-online.de/pages/de/news222661}}.
\r
126 Related Publications
\r
130 * Jianlong Yang, Jianmin Wang, Deyi Li, ``Detecting the Theft of
\r
131 Natural Language Text Using Birthmark,'' iih-msp, pp. 699-702, 2006
\r
132 International Conference on Intelligent Information Hiding and
\r
135 * Takeshi Kakimoto, Akito Monden, Yasutaka Kamei, Haruaki Tamada,
\r
136 Masateru Tsunoda, and Ken-ichi Matsumoto, ``Using Software
\r
137 Birthmarks to Identify Similar Classes and Major Functionalities,''
\r
138 In Proc. the 3rd International Workshop on Mining Software
\r
139 Repositories ({{{http://msr.uwaterloo.ca/msr2006/}MSR Mining
\r
140 Challenge 2006}}), pp.171--172, Shanghai, China, May
\r
143 * Ginger Myles and Christian Collberg, ``K-gram based software
\r
144 birthmarks,'' In Proc. of the 2005 ACM symposium on Applied
\r
147 * Haruaki Tamada, Masahide Nakamura, Akito Monden, Ken-ichi
\r
148 Matsumoto, ``Java Birthmarks --Detecting the Software Theft--,''
\r
149 IEICE Transactions on Information and Systems, Vol. E88-D, No. 9,
\r
150 pp. 2148--2158, September 2005.
\r
152 * Masateru Tsunoda, Takeshi Kakimoto, Naoki Ohsugi, Akito Monden, and
\r
153 Ken-ichi Matsumoto, ``Javawock: A Java Class Recommender System
\r
154 Based on Collaborative Filtering,'' In Proc. of 17th International
\r
155 Conference on Software Engineering and Knowledge Engineering
\r
156 ({{{http://www.ksi.edu/seke/seke05.html}SEKE2005}}), pp.491-497,
\r
157 July 2005. (Taipei, Taiwan)
\r
159 * Haruaki Tamada, Masahide Nakamura, Akito Monden, and Ken-ichi
\r
160 Matsumoto, ``Design and evaluation of birthmarks for detecting theft
\r
161 of Java programs,'' Proc. IASTED International Conference on
\r
162 Software Engineering
\r
163 ({{{http://www.iasted.org/conferences/2004/Innsbruck/se.htm}IASTED
\r
164 SE 2004}}), pp.569-575, Innsbruck,
\r
165 Austria, 17-19 February 2004.
\r
167 * Haruaki Tamada, Masahide Nakamura, Akito Monden, and Ken-ichi
\r
168 Matsumoto, ``Detecting the theft of programs using birthmarks,''
\r
169 Information Science Technical Report, NAIST-IS-TR2003014, ISSN
\r
170 0919-9527, Graduate School of Information Science, Nara Institute
\r
171 of Science and Technology, November 2003.
\r
173 * 玉田 春昭, 神崎 雄一郎, 中村 匡秀, 門田 暁人, 松本 健一, ``Java クラスファイルからプログラム指紋を抽出する方法の提案'', 信学技報 情報セキュリティ研究会, Vol. ISEC2003-29, pp.127--133, July 2003.
\r
177 * David Schuler, Valentin Dallmeier, and Christian Lindig, ``A
\r
178 Dynamic Birthmark for Java,'' In Proc. the 22nd IEEE/ACM
\r
179 International Conference on Automated Software Engineering,
\r
180 (ASE2007), Atlanta, Georgia, USA, November 2007.
\r
182 * Bin Lu, Fenlin Liu, Xin Ge, Bin Liu, Xiangyang Luo, ``A Software
\r
183 Birthmark Based on Dynamic Opcode n-gram,'' Proc. International
\r
184 Conference on Semantic Computing (ICSC 2007), pp.37-44, September
\r
187 * Haruaki Tamada, Keiji Okamoto, Masahide Nakamura, Akito Monden and
\r
188 Ken-ichi Matsumoto, ``Design and Evaluation of Dynamic Software
\r
189 Birthmarks Based on API Calls'', Information Science Technical
\r
190 Report, NAIST-IS-TR2007011, ISSN 0919-9527, Graduate School of
\r
191 Information Science, Nara Institute of Science and Technology, May
\r
194 * 林 晃一郎, 楓 基靖, 真野 芳久, ``特徴抽出と抽象化による動的バースマークの構成とその検証'', 情報処理学会論文誌 (Transactions of Information Processing Society of Japan), Vol.48, No.4 pp. 1799-1808, April 2007.
\r
196 * 森山 修, 古江 岳大, 遠山 毅, 松本 勉, ``API関数呼出履歴によるソフトウェア動的バースマークの一方式'', 信学技報, vol. 106, no. 235, ISEC2006-82, pp. 77-84, September 2006.
\r
198 * 岡本 圭司, 玉田 春昭, 中村 匡秀, 門田 暁人, 松本 健一, ``API呼び出しを用いた動的バースマーク'', 電子情報通信学会論文誌, Vol.J89-D, No.8, pp.1751-1763, August 2006.
\r
200 * David Schuler and Valentin Dallmeier, ``Detecting Software Theft
\r
201 with API Call Sequence Sets,'' Workshops Software Reengineering
\r
202 (WSR 2006), pp.56-57, May 2006.
\r
204 * 古田 壮宏, 真野 芳久, ``実行系列の抽象表現を利用した動的バースマーク'', 電子情報通信学会論文誌 Vol.J88-D1, No.10, pp.1595--1599, October 2005.
\r
206 * 岡本 圭司, 玉田 春昭, 中村 匡秀, 門田 暁人, 松本 健一, ``ソフトウェア実行時のAPI呼び出し履歴に基づく動的バースマークの実験的評価'', 第46回プログラミング・シンポジウム報告集, pp. 41--50, January 2005
\r
208 * 岡本 圭司, 玉田 春昭, 中村 匡秀, 門田 暁人, 松本 健一, ``ソフトウェア実行時のAPI呼び出し履歴に基づく動的バースマークの提案'', ソフトウェア工学の基礎XI, 日本ソフトウェア科学会 FOSE2004 (FOSE2004), pp.85--88, November 2004.
\r
210 * Haruaki Tamada, Keiji Okamoto, Masahide Nakamura, Akito Monden, and
\r
211 Ken-ichi Matsumoto, ``Dynamic Software Birthmarks to Detect the
\r
212 Theft of Windows Applications,'' In Proc. International Symposium
\r
213 on Future Software Technology 2004 (ISFST 2004), CD-ROM, Xi'an,
\r
214 China, 20-22 October 2004.
\r
216 * Ginger Myles and Christian Collberg, ``Detecting Software Theft via
\r
217 Whole Program Path Birthmarks,'' In Proc. Information Security
\r
218 Conference, September 27-29, 2004.
\r