{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,3]],"date-time":"2022-04-03T07:45:51Z","timestamp":1648971951005},"reference-count":38,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"7","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Inf. &amp; Syst."],"published-print":{"date-parts":[[2016]]},"DOI":"10.1587\/transinf.2015edp7379","type":"journal-article","created":{"date-parts":[[2016,6,30]],"date-time":"2016-06-30T23:09:09Z","timestamp":1467328149000},"page":"1836-1851","source":"Crossref","is-referenced-by-count":1,"title":["API-Based Software Birthmarking Method Using Fuzzy Hashing"],"prefix":"10.1587","volume":"E99.D","author":[{"given":"Donghoon","family":"LEE","sequence":"first","affiliation":[{"name":"College of Information and Communication Engineering, Sungkyunkwan University"}]},{"given":"Dongwoo","family":"KANG","sequence":"additional","affiliation":[{"name":"College of Information and Communication Engineering, Sungkyunkwan University"}]},{"given":"Younsung","family":"CHOI","sequence":"additional","affiliation":[{"name":"Department of Cyber Security, Howon University"}]},{"given":"Jiye","family":"KIM","sequence":"additional","affiliation":[{"name":"College of Information and Communication Engineering, Sungkyunkwan University"}]},{"given":"Dongho","family":"WON","sequence":"additional","affiliation":[{"name":"College of Information and Communication Engineering, Sungkyunkwan University"}]}],"member":"532","reference":[{"key":"1","unstructured":"[1] ARXAN, \u201cA look inside the universe of pirated software and digital assets,\u201d tech. rep., 2015 4th Annual State of Application Security Report, 2015."},{"key":"2","unstructured":"[2] J.F. Gantz, et al., \u201cThe dangerous world of counterfeit and pirated software,\u201d tech. rep., IDC White Paper, March 2013."},{"key":"3","doi-asserted-by":"crossref","unstructured":"[3] C. Collberg and C. Thomborson, \u201cSoftware watermarking: Models and dynamic embeddings,\u201d Proc. 26th ACM SIGPLAN-SIGACT symposium on Principles of programming languages, pp.311-324, ACM, 1999.","DOI":"10.1145\/292540.292569"},{"key":"4","doi-asserted-by":"crossref","unstructured":"[4] W. Zhu, C. Thomborson, and F.Y. Wang, \u201cA survey of software watermarking,\u201d in Intelligence and Security Informatics, pp.454-458, Springer, 2005.","DOI":"10.1007\/11427995_42"},{"key":"5","doi-asserted-by":"crossref","unstructured":"[5] D. Aucsmith, \u201cTamper resistant software: An implementation,\u201d Information Hiding, pp.317-333, Springer, 1996.","DOI":"10.1007\/3-540-61996-8_49"},{"key":"6","unstructured":"[6] C. Collberg, C. Thomborson, and D. Low, \u201cA taxonomy of obfuscating transformations,\u201d tech. rep., Department of Computer Science, The University of Auckland, New Zealand, 1997."},{"key":"7","doi-asserted-by":"crossref","unstructured":"[7] C.S. Collberg and C. Thomborson, \u201cWatermarking, tamper-proofing, and obfuscation-tools for software protection,\u201d Software Engineering, IEEE Transactions on, vol.28, no.8, pp.735-746, 2002.","DOI":"10.1109\/TSE.2002.1027797"},{"key":"8","doi-asserted-by":"crossref","unstructured":"[8] G. Myles and C. Collberg, \u201cDetecting software theft via whole program path birthmarks,\u201d in Information security, pp.404-415, Springer, 2004.","DOI":"10.1007\/978-3-540-30144-8_34"},{"key":"9","doi-asserted-by":"crossref","unstructured":"[9] G. Myles and C. Collberg, \u201cK-gram based software birthmarks,\u201d Proc. 2005 ACM symposium on Applied computing, pp.314-318, ACM, 2005.","DOI":"10.1145\/1066677.1066753"},{"key":"10","doi-asserted-by":"crossref","unstructured":"[10] D. Schuler, V. Dallmeier, and C. Lindig, \u201cA dynamic birthmark for java,\u201d Proc. twenty-second IEEE\/ACM international conference on Automated software engineering, pp.274-283, ACM, 2007.","DOI":"10.1145\/1321631.1321672"},{"key":"11","unstructured":"[11] H. Tamada, K. Okamoto, M. Nakamura, A. Monden, and K.i. Matsumoto, \u201cDynamic software birthmarks to detect the theft of windows applications,\u201d International Symposium on Future Software Technology, 2004."},{"key":"12","doi-asserted-by":"crossref","unstructured":"[12] C. Collberg, E. Carter, S. Debray, A. Huntwork, J. Kececioglu, C. Linn, and M. Stepp, \u201cDynamic path-based software watermarking,\u201d ACM Sigplan Notices, pp.107-118, ACM, 2004.","DOI":"10.1145\/996893.996856"},{"key":"13","doi-asserted-by":"crossref","unstructured":"[13] C. Collberg, G. Myles, and A. Huntwork, \u201cSandmark-a tool for software protection research,\u201d IEEE security &amp; privacy, no.4, pp.40-49, 2003.","DOI":"10.1109\/MSECP.2003.1219058"},{"key":"14","doi-asserted-by":"crossref","unstructured":"[14] S.L. Garfinkel, \u201cDigital forensics research: The next 10 years,\u201d digital investigation, vol.7, pp.S64-S73, 2010.","DOI":"10.1016\/j.diin.2010.05.009"},{"key":"15","unstructured":"[15] G. Palmer et al., \u201cA road map for digital forensic research,\u201d First Digital Forensic Research Workshop, Utica, New York, pp.27-30, 2001."},{"key":"16","unstructured":"[16] K. Gregory, \u201cManaged, unmanaged, native: What kind of code is this?,\u201d 4 2003."},{"key":"17","unstructured":"[17] B. Abrams, \u201cWhat is managed code?,\u201d blog, Microsoft Windows Dev Center, Jan. 2004."},{"key":"18","doi-asserted-by":"crossref","unstructured":"[18] S. Cesare and Y. Xiang, Software similarity and classification, Springer Science &amp; Business Media, 2012.","DOI":"10.1007\/978-1-4471-2909-7"},{"key":"19","doi-asserted-by":"crossref","unstructured":"[19] H.i. Lim, H. Park, S. Choi, and T. Han, \u201cA method for detecting the theft of java programs through analysis of the control flow information,\u201d Information and Software Technology, vol.51, no.9, pp.1338-1350, 2009.","DOI":"10.1016\/j.infsof.2009.04.011"},{"key":"20","doi-asserted-by":"crossref","unstructured":"[20] B. Lu, F. Liu, X. Ge, B. Liu, and X. Luo, \u201cA software birthmark based on dynamic opcode n-gram,\u201d Semantic Computing, 2007. ICSC 2007. International Conference on, pp.37-44, IEEE, 2007.","DOI":"10.1109\/ICSC.2007.15"},{"key":"21","doi-asserted-by":"crossref","unstructured":"[21] D. Lee, Y. Choi, J. Jung, J. Kim, and D. Won, \u201cAn efficient categorization of the instructions based on binary excutables for dynamic software birthmark,\u201d Int. J. Information and Education Technology, vol.5, no.8, pp.571-576, 2015.","DOI":"10.7763\/IJIET.2015.V5.570"},{"key":"22","doi-asserted-by":"crossref","unstructured":"[22] H.-I. Lim, H. Park, S. Choi, and T. Han, \u201cDetecting theft of java applications via a static birthmark based on weighted stack patterns,\u201d IEICE Trans. Inf. &amp; Syst., vol.E91-D, no.9, pp.2323-2332, 2008.","DOI":"10.1093\/ietisy\/e91-d.9.2323"},{"key":"23","unstructured":"[23] J. Nagra and C. Collberg, Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection, Pearson Education, 2009."},{"key":"24","unstructured":"[24] H. Tamada, M. Nakamura, A. Monden, and K. Matsumoto, \u201cDetecting the theft of programs using birthmarks,\u201d Information Sci-ence Technical Report NAIST-IS-TR2003014 ISSN, 0919-9527, 2003."},{"key":"25","unstructured":"[25] H. Tamada, K. Okamoto, M. Nakamura, A. Monden, and K.i. Matsumoto, \u201cDesign and evaluation of dynamic software birthmarks based on api calls,\u201d Info. Science Technical Report NAIST-IS-TR2007011, ISSN, pp.0919-9527, 2007."},{"key":"26","doi-asserted-by":"crossref","unstructured":"[26] H. Park, S. Choi, H.i. Lim, and T. Han, \u201cDetecting java theft based on static api trace birthmark,\u201d in Advances in Information and Computer Security, pp.121-135, Springer, 2008.","DOI":"10.1007\/978-3-540-89598-5_8"},{"key":"27","doi-asserted-by":"crossref","unstructured":"[27] S. Choi, H. Park, H.i. Lim, and T. Han, \u201cA static api birthmark for windows binary executables,\u201d Journal of Systems and Software, vol.82, no.5, pp.862-873, 2009.","DOI":"10.1016\/j.jss.2008.11.848"},{"key":"28","unstructured":"[28] Y. Han, J. Choi, S.j. Cho, H. Yoo, J. Woo, Y. Nah, and M. Park, \u201cA New Detection Scheme of Software Copyright Infringement using Software Birthmark on Windows Systems,\u201d COMPUTER SCIENCE AND INFORMATION SYSTEMS, vol.11, no.3, SI, pp.1055-1069, Aug. 2014."},{"key":"29","unstructured":"[29] G. Myles, \u201cSoftware theft detection through program identification,\u201d 2006."},{"key":"30","unstructured":"[30] N. Harbour, Dcfldd, 2002."},{"key":"31","doi-asserted-by":"crossref","unstructured":"[31] J. Kornblum, \u201cIdentifying almost identical files using context triggered piecewise hashing,\u201d Digital investigation, vol.3, pp.91-97, 2006.","DOI":"10.1016\/j.diin.2006.06.015"},{"key":"32","unstructured":"[32] J. Kornblum, \u201cFuzzy hashing and ssdeep,\u201d 2006."},{"key":"33","doi-asserted-by":"crossref","unstructured":"[33] V. Roussev, G.G. Richard, and L. Marziale, \u201cMulti-resolution similarity hashing,\u201d digital investigation, vol.4, pp.105-113, 2007.","DOI":"10.1016\/j.diin.2007.06.011"},{"key":"34","unstructured":"[34] jcanto, \u201cExtra metadata field: ssdeep,\u201d 2008."},{"key":"35","unstructured":"[35] D. Hurlbut, \u201cFuzzy hashing for digital forensic investigators,\u201d AccessData, 2009."},{"key":"36","unstructured":"[36] D. French, \u201cFuzzy hashing against different types of malware,\u201d tech. rep., 2010 CERT Research Report, Software Engineering Institute, Sept. 2010."},{"key":"37","doi-asserted-by":"crossref","unstructured":"[37] R. Rivest, \u201cThe md5 message-digest algorithm,\u201d 1992.","DOI":"10.17487\/rfc1321"},{"key":"38","unstructured":"[38] T. Andrew, \u201cSpamsum readme,\u201d 2011."}],"container-title":["IEICE Transactions on Information and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E99.D\/7\/E99.D_2015EDP7379\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,10]],"date-time":"2019-09-10T13:33:05Z","timestamp":1568122385000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E99.D\/7\/E99.D_2015EDP7379\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"references-count":38,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2016]]}},"URL":"https:\/\/doi.org\/10.1587\/transinf.2015edp7379","relation":{},"ISSN":["0916-8532","1745-1361"],"issn-type":[{"value":"0916-8532","type":"print"},{"value":"1745-1361","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016]]}}}