计算机科学 ›› 2016, Vol. 43 ›› Issue (Z6): 467-470.doi: 10.11896/j.issn.1002-137X.2016.6A.110
黄寿孟,高华玲,潘玉霞
HUANG Shou-meng, GAO Hua-ling and PAN Yu-xia
摘要: 软件相似性分析算法是为了更好地保护软件的知识产权。此算法并不会加固程序以增加其抵御攻击的能力,而是对两个或两个以上的程序进行比较,判断是否相互包含。该算法有重复代码筛选、软件作者鉴别、软件“胎记”和剽窃检测,它们最本质的操作就是直接处理程序的源码或二进制可执行文件,将其转换成一种更易于处理的表示形式,从而确定两个程序(或者程序片段)之间的相似度,或是其中一个(部分或全部)是否包含了另一个。最后总结出此类算法的通用格式,并对每种算法作出相应的分析综述表。
[1] Collberg C,Nagra J.软件加密与解密[M].崔孝晨,译.北京:人民邮电出版社,2012 [2] Broder A Z.On the resemblance and containment of documents[C]∥Compression and Complexity of Sequences(SEQUENCES’97).IEEE,1997:21-29 [3] Bunke H,Shearer K.A graph distance metric based on the maxi-mal common subgraph[J].Pattern Recognition Letters,1998,9:255-259 [4] Aiken A.Moss—a system for detecting software plagiarism[EB/OL].(2011-04-29)[2014-01-15].www.cs.berkeley.edu/~aiken/moss.html [5] Aiken A,Schleimer S,Auslander J,et al.Method and apparatus for indexing document content and content comparison with world wide web search service[P].U.S.Assigned to the Regents of the University of California,2004,6:6757675 [6] Schleimer S,Wilkerson D,Aiken A.Winnowing:Local algo-rithms for document fingerprinting[C]∥Proceedings of the 2003 SIGMOD Conference.2003 [7] Tamada H,Nakamura M,Monden A,et al.Detecting the theft of Programs using birthmarks[J].Nara Institute of Science and Technology,2003 [8] Tamada H,Nakamura M,Monden A,et al.Design and evaluation of birthmarks for detecting theft of Java programs[C]∥IASTED International Conference on Software Engineering.2004:569-575 [9] Tamada H,Okamoto K,Nakamura M,et al.Dynamic software birthmarking to detect the theft of windows applications[C]∥Proceedings of the international Symposium on Future software Technology.2004 [10] Schuler D,Dallmeier V.Detecting software theft with API call sequence sets[C]∥Proceedings of the 8th Workshop Software Reengineering.2006 [11] Schuler D,Dallmeier V,Lindig C.A dynamic birthmark for Java[C]∥22nd IEEE/ACM International Conference on Automated Software Engineering.2007 [12] Ertl M A.Stack caching for interpreters[J].SIGPLAN Not.,1995,30(6):315-327 [13] Komondoor R,Horwitz S.Using slicing to identify duplication in source code[C]∥Proceedings of the 8th International Sympo-sium on Static Analysis.2001:40-56 [14] Liu Chao,Chen Chen,Han Jia-wei,et al.Gplag:detection of software plagiarism by program dependence graph analysis[C]∥KDD’06.ACM,2006:872-881 [15] Myles G.Software Theft Detection Through Program Identification[M].University of Arizona,2006 [16] Myles G,Collberg C.Detecting software theft via whole program path birthmarks[C]∥7th International Conference Information Security.2004 [17] Kontogiannis K.Evaluation experiments on the detection of programming patterns using software metrics[C]∥Working Confe-rence on reverse Engineering.1997:1-44 [18] Krsul I,Spafford E.Authorship analysis:Identifying the author of a program: CSD-TR-94-030[R].Computer Science Deparment,Purdue University,1994 |
No related articles found! |
|