Computer Science ›› 2016, Vol. 43 ›› Issue (Z6): 467-470.doi: 10.11896/j.issn.1002-137X.2016.6A.110

Previous Articles     Next Articles

Summary of Research on Similarity Analysis of Software

HUANG Shou-meng, GAO Hua-ling and PAN Yu-xia   

  • Online:2018-11-14 Published:2018-11-14

Abstract: The similarity analysis of the software is to protect the intellectual property rights of software.This algorithm will not strengthen the program to increase its ability to resist the attack.It compares two or more than two procedures,to determine whether each contains.This algorithm includes clone detection,software forensic,software birthmarking and plagiarism detection.The most essential operation is the source code or binary executable file of the program.Program is converted into a more easily processing representation,in order to determine the similarity between two (or program fragments) programs,or one of programs (in whole or in part) contains the other.Finally the general form of the algorithms was summarized and the corresponding analysis of each algorithm was made.

Key words: Software similarity,Similarity algorithm,Clone detection,Software forensic,Software birthmarking,Plagiarism detection

[1] Collberg C,Nagra J.软件加密与解密[M].崔孝晨,译.北京:人民邮电出版社,2012
[2] Broder A Z.On the resemblance and containment of documents[C]∥Compression and Complexity of Sequences(SEQUENCES’97).IEEE,1997:21-29
[3] Bunke H,Shearer K.A graph distance metric based on the maxi-mal common subgraph[J].Pattern Recognition Letters,1998,9:255-259
[4] Aiken A.Moss—a system for detecting software plagiarism[EB/OL].(2011-04-29)[2014-01-15]
[5] Aiken A,Schleimer S,Auslander J,et al.Method and apparatus for indexing document content and content comparison with world wide web search service[P].U.S.Assigned to the Regents of the University of California,2004,6:6757675
[6] Schleimer S,Wilkerson D,Aiken A.Winnowing:Local algo-rithms for document fingerprinting[C]∥Proceedings of the 2003 SIGMOD Conference.2003
[7] Tamada H,Nakamura M,Monden A,et al.Detecting the theft of Programs using birthmarks[J].Nara Institute of Science and Technology,2003
[8] Tamada H,Nakamura M,Monden A,et al.Design and evaluation of birthmarks for detecting theft of Java programs[C]∥IASTED International Conference on Software Engineering.2004:569-575
[9] Tamada H,Okamoto K,Nakamura M,et al.Dynamic software birthmarking to detect the theft of windows applications[C]∥Proceedings of the international Symposium on Future software Technology.2004
[10] Schuler D,Dallmeier V.Detecting software theft with API call sequence sets[C]∥Proceedings of the 8th Workshop Software Reengineering.2006
[11] Schuler D,Dallmeier V,Lindig C.A dynamic birthmark for Java[C]∥22nd IEEE/ACM International Conference on Automated Software Engineering.2007
[12] Ertl M A.Stack caching for interpreters[J].SIGPLAN Not.,1995,30(6):315-327
[13] Komondoor R,Horwitz S.Using slicing to identify duplication in source code[C]∥Proceedings of the 8th International Sympo-sium on Static Analysis.2001:40-56
[14] Liu Chao,Chen Chen,Han Jia-wei,et al.Gplag:detection of software plagiarism by program dependence graph analysis[C]∥KDD’06.ACM,2006:872-881
[15] Myles G.Software Theft Detection Through Program Identification[M].University of Arizona,2006
[16] Myles G,Collberg C.Detecting software theft via whole program path birthmarks[C]∥7th International Conference Information Security.2004
[17] Kontogiannis K.Evaluation experiments on the detection of programming patterns using software metrics[C]∥Working Confe-rence on reverse Engineering.1997:1-44
[18] Krsul I,Spafford E.Authorship analysis:Identifying the author of a program: CSD-TR-94-030[R].Computer Science Deparment,Purdue University,1994

No related articles found!
Full text



No Suggested Reading articles found!