Abstract

The emergence of software artifacts greatly emphasizes the need for protecting intellectual property rights (IPR) hampered by software piracy requiring effective measures for software piracy control. Software birthmarking targets to counter ownership theft of software by identifying similarity of their origins. A novice birthmarking approach has been proposed in this paper that is based on hybrid of text-mining and graph-mining techniques. The code elements of a program and their relations with other elements have been identified through their properties (i.e., code constructs) and transformed into Graph Manipulation Language (GML). The software birthmarks generated by exploiting the graph theoretic properties (through clustering coefficient) are used for the classifications of similarity or dissimilarity of two programs. The proposed technique has been evaluated over metrics of credibility, resilience, method theft, modified code detection and self-copy detection for programs asserting the effectiveness of proposed approach against software ownership theft. The comparative analysis of proposed approach with contemporary ones shows better results for having properties and relations of program nodes and for employing dynamic techniques of graph mining without adding any overhead (such as increased program size and processing cost).

Highlights

  • The revolutionary impact of software engineering has changed the course of technological advancements through innovative ideas. Implementation of these ideas has entailed in a paradigm shift with concepts like mobile apps, smart technologies, computational paradigms and Technology enhanced Learning (TeL) and Internet of Things (IoT) etc

  • Directions A novel graph-based birthmarking approach has been proposed for detecting ownership theft in IoT software programs

  • The proposed technique is compliant with software birthmarking principles of reliability as well as resilience

Read more

Summary

Introduction

Rest of the paper has been organized as given: Section II highlights the basic concepts of software birthmarking and overview of prevalent techniques.

Literature Survey
Software Birthmarks
Proposed Approach
Method Relation and Properties Assemblage
Findings
Conclusion and Future Directions
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.