计算机科学 ›› 2016, Vol. 43 ›› Issue (Z6): 467-470.doi: 10.11896/j.issn.1002-137X.2016.6A.110

• 软件工程与数据库技术 • 上一篇    下一篇

软件相似性分析算法的研究综述

黄寿孟,高华玲,潘玉霞   

  1. 三亚学院计算机教学部 三亚572022,三亚学院计算机教学部 三亚572022,三亚学院计算机教学部 三亚572022
  • 出版日期:2018-11-14 发布日期:2018-11-14
  • 基金资助:
    本文受海南省教育厅项目(Hnky2015-51),三亚市院地科技合作项目(2013YD43)资助

Summary of Research on Similarity Analysis of Software

HUANG Shou-meng, GAO Hua-ling and PAN Yu-xia   

  • Online:2018-11-14 Published:2018-11-14

摘要: 软件相似性分析算法是为了更好地保护软件的知识产权。此算法并不会加固程序以增加其抵御攻击的能力,而是对两个或两个以上的程序进行比较,判断是否相互包含。该算法有重复代码筛选、软件作者鉴别、软件“胎记”和剽窃检测,它们最本质的操作就是直接处理程序的源码或二进制可执行文件,将其转换成一种更易于处理的表示形式,从而确定两个程序(或者程序片段)之间的相似度,或是其中一个(部分或全部)是否包含了另一个。最后总结出此类算法的通用格式,并对每种算法作出相应的分析综述表。

关键词: 软件相似性,相似度算法,重复代码筛选,作者鉴别,软件“胎记”,剽窃检测

Abstract: The similarity analysis of the software is to protect the intellectual property rights of software.This algorithm will not strengthen the program to increase its ability to resist the attack.It compares two or more than two procedures,to determine whether each contains.This algorithm includes clone detection,software forensic,software birthmarking and plagiarism detection.The most essential operation is the source code or binary executable file of the program.Program is converted into a more easily processing representation,in order to determine the similarity between two (or program fragments) programs,or one of programs (in whole or in part) contains the other.Finally the general form of the algorithms was summarized and the corresponding analysis of each algorithm was made.

Key words: Software similarity,Similarity algorithm,Clone detection,Software forensic,Software birthmarking,Plagiarism detection

[1] Collberg C,Nagra J.软件加密与解密[M].崔孝晨,译.北京:人民邮电出版社,2012
[2] Broder A Z.On the resemblance and containment of documents[C]∥Compression and Complexity of Sequences(SEQUENCES’97).IEEE,1997:21-29
[3] Bunke H,Shearer K.A graph distance metric based on the maxi-mal common subgraph[J].Pattern Recognition Letters,1998,9:255-259
[4] Aiken A.Moss—a system for detecting software plagiarism[EB/OL].(2011-04-29)[2014-01-15].www.cs.berkeley.edu/~aiken/moss.html
[5] Aiken A,Schleimer S,Auslander J,et al.Method and apparatus for indexing document content and content comparison with world wide web search service[P].U.S.Assigned to the Regents of the University of California,2004,6:6757675
[6] Schleimer S,Wilkerson D,Aiken A.Winnowing:Local algo-rithms for document fingerprinting[C]∥Proceedings of the 2003 SIGMOD Conference.2003
[7] Tamada H,Nakamura M,Monden A,et al.Detecting the theft of Programs using birthmarks[J].Nara Institute of Science and Technology,2003
[8] Tamada H,Nakamura M,Monden A,et al.Design and evaluation of birthmarks for detecting theft of Java programs[C]∥IASTED International Conference on Software Engineering.2004:569-575
[9] Tamada H,Okamoto K,Nakamura M,et al.Dynamic software birthmarking to detect the theft of windows applications[C]∥Proceedings of the international Symposium on Future software Technology.2004
[10] Schuler D,Dallmeier V.Detecting software theft with API call sequence sets[C]∥Proceedings of the 8th Workshop Software Reengineering.2006
[11] Schuler D,Dallmeier V,Lindig C.A dynamic birthmark for Java[C]∥22nd IEEE/ACM International Conference on Automated Software Engineering.2007
[12] Ertl M A.Stack caching for interpreters[J].SIGPLAN Not.,1995,30(6):315-327
[13] Komondoor R,Horwitz S.Using slicing to identify duplication in source code[C]∥Proceedings of the 8th International Sympo-sium on Static Analysis.2001:40-56
[14] Liu Chao,Chen Chen,Han Jia-wei,et al.Gplag:detection of software plagiarism by program dependence graph analysis[C]∥KDD’06.ACM,2006:872-881
[15] Myles G.Software Theft Detection Through Program Identification[M].University of Arizona,2006
[16] Myles G,Collberg C.Detecting software theft via whole program path birthmarks[C]∥7th International Conference Information Security.2004
[17] Kontogiannis K.Evaluation experiments on the detection of programming patterns using software metrics[C]∥Working Confe-rence on reverse Engineering.1997:1-44
[18] Krsul I,Spafford E.Authorship analysis:Identifying the author of a program: CSD-TR-94-030[R].Computer Science Deparment,Purdue University,1994

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!