Hunting for Pirated Software Using Metamorphic Analysis

作者: Hardikkumar Rana , Mark Stamp

DOI: 10.1080/19393555.2014.975557

关键词: Source codeTheoretical computer scienceComputer scienceMalwareDetection rateContext (language use)Data miningFunction (engineering)Variety (cybernetics)SoftwareCode (cryptography)

摘要: ABSTRACTIn this article, we consider the problem of detecting software that has been pirated and modified. We analyze a variety detection techniques have previously studied in context malware detection. For each technique, empirically determine rate as function degree modification original code. show code must by substantially modified before fail to reliably distinguish it, our results offer significant improvement over previous related work. Our approach can be applied retroactively existing does not require access source code, hence it is both practical effective.

参考文章(37)
Akito Monden, Haruaki Tamada, Masahide Nakamura, Ken-ichi Matsumoto, Keiji Okamoto, Dynamic Software Birthmarks to Detect the Theft of Windows Applications International Symposium on Future Software Technology 2004 (ISFST 2004). ,(2004)
Mark Stamp, Mausami Mungale, Robust Watermarking using Hidden Markov Models ,(2011)
Ashwini Venkatesan, CODE OBFUSCATION AND VIRUS DETECTION ,(2009)
Babak Bashari Rad, Maslin Masrom, Metamorphic virus variants classification using opcode frequency histogram annual conference on computers. pp. 147- 155 ,(2010)
Jonathon Shlens, A Tutorial on Principal Component Analysis. arXiv: Learning. ,(2014)
Jared Lee, Thomas H. Austin, Mark Stamp, Compression-based analysis of metamorphic malware International Journal of Security and Networks. ,vol. 10, pp. 124- 136 ,(2015) , 10.1504/IJSN.2015.070426
Ginger Myles, Christian Collberg, Detecting Software Theft via Whole Program Path Birthmarks international conference on information security. pp. 404- 415 ,(2004) , 10.1007/978-3-540-30144-8_34
Antonio Si, Hong Va Leong, Rynson W. H. Lau, CHECK: a document plagiarism detection system acm symposium on applied computing. pp. 70- 77 ,(1997) , 10.1145/331697.335176
Robert A. Wagner, Michael J. Fischer, The String-to-String Correction Problem Journal of the ACM. ,vol. 21, pp. 168- 173 ,(1974) , 10.1145/321796.321811
Romans Lukashenko, Vita Graudina, Janis Grundspenkis, Computer-based plagiarism detection methods and tools: an overview computer systems and technologies. ,vol. 285, pp. 40- ,(2007) , 10.1145/1330598.1330642