--- /dev/null
+ ----\r
+ Implementation\r
+ ----\r
+ Haruaki Tamada\r
+ ----\r
+ 2008-09-11\r
+ ----\r
+\r
+Implemented Birthmarks\r
+\r
+*CVFV birthmark\r
+\r
+ [Proposers] H. Tamada, et al.\r
+\r
+ [Description] Constant values of field variables and its field type\r
+\r
+ [Paper] Haruaki Tamada, Masahide Nakamura, Akito Monden, and Ken-ichi\r
+ Matsumoto, "Java Birthmarks --Detecting the Software Theft--," IEICE\r
+ Transactions on Information and Systems, Vol. E88-D, No. 9, September\r
+ 2005.\r
+\r
+*SMC birthmark\r
+\r
+ [Proposers] H. Tamada, et al.\r
+\r
+ [Description] Sequence of method calls in definition order (not execution order).\r
+\r
+ [Paper] Haruaki Tamada, Masahide Nakamura, Akito Monden, and Ken-ichi\r
+ Matsumoto, "Java Birthmarks --Detecting the Software Theft--," IEICE\r
+ Transactions on Information and Systems, Vol. E88-D, No. 9, September\r
+ 2005.\r
+\r
+*IS birthmark\r
+\r
+ [Proposers] H. Tamada, et al.\r
+\r
+ [Description] Inheritance structure of target class. If a class in\r
+ this birthmark elements is not wellknown-class, replace it to <null>.\r
+\r
+ [Paper] Haruaki Tamada, Masahide Nakamura, Akito Monden, and Ken-ichi\r
+ Matsumoto, "Java Birthmarks --Detecting the Software Theft--," IEICE\r
+ Transactions on Information and Systems, Vol. E88-D, No. 9, September\r
+ 2005.\r
+\r
+*UC birthmark\r
+\r
+ [Proposers] H. Tamada, et al.\r
+\r
+ [Description] A set of used classes. Elements of this birthmark is\r
+ appeared in field type, method argument types, return type and used\r
+ in methods.\r
+\r
+ [Paper] Haruaki Tamada, Masahide Nakamura, Akito Monden, and Ken-ichi\r
+ Matsumoto, "Java Birthmarks --Detecting the Software Theft--," IEICE\r
+ Transactions on Information and Systems, Vol. E88-D, No. 9, September\r
+ 2005.\r
+\r
+*k-gram based birthmark\r
+\r
+ [Proposers] G. Myles and C. Collberg\r
+\r
+ [Description] Construct k-gram from instructions.\r
+\r
+ [Paper] Ginger Myles, Christian Collberg, ``K-gram based software\r
+ birthmarks,'' In Proc. of the 2005 ACM symposium on Applied\r
+ computing, 2005.\r
+\r
+*FMC birthmark\r
+\r
+ [Proposers] H. Tamada\r
+\r
+ [Description] Frequency of method calls.\r
+\r
+ [Papers] Not published\r
+\r
+ [Related Papers] Haruaki Tamada, Keiji Okamoto, Masahide Nakamura,\r
+ Akito Monden, and Ken-ichi Matsumoto, ``Dynamic Software Birthmarks\r
+ to Detect the Theft of Windows Applications,'' In\r
+ Proc. International Symposium on Future Software Technology 2004\r
+ (ISFST 2004), CD-ROM, Xi'an, China, 20-22 October 2004.\r
+\r
+*FUC birthmark\r
+\r
+ [Proposers] H. Tamada\r
+\r
+ [Description] Frequency of used classes.\r
+\r
+ [Papers] Not published\r
+\r
+ [Related Papers] Haruaki Tamada, Keiji Okamoto, Masahide Nakamura,\r
+ Akito Monden, and Ken-ichi Matsumoto, ``Dynamic Software Birthmarks\r
+ to Detect the Theft of Windows Applications,'' In\r
+ Proc. International Symposium on Future Software Technology 2004\r
+ (ISFST 2004), CD-ROM, Xi'an, China, 20-22 October 2004.\r
+\r
+Analysis method\r
+\r
+*MDS (Multi-dimensional scaling)\r
+\r
+ [Proposer?] T. Kakimoto, et al.\r
+\r
+ [Description] plotting classes into plane based on their similarities\r
+ between each pairs.\r
+\r
+ [Paper] Takeshi Kakimoto, Akito Monden, Yasutaka Kamei, Haruaki\r
+ Tamada, Masateru Tsunoda, and Ken-ichi Matsumoto, ``Using Software\r
+ Birthmarks to Identify Similar Classes and Major Functionalities,''\r
+ In Proc. the 3rd International Workshop on Mining Software\r
+ Repositories ({{{http://msr.uwaterloo.ca/msr2006/}MSR Mining\r
+ Challenge 2006}}), pp.171--172, Shanghai, China, May 2006.\r
+\r
----\r
Haruaki Tamada\r
----\r
- 2007-06-13\r
+ 2008-09-11\r
----\r
\r
-Implemented Birthmarks\r
-\r
-*CVFV birthmark\r
-\r
- [Proposers] H. Tamada, et al.\r
-\r
- [Description] Constant values of field variables and its field type\r
-\r
- [Paper] Haruaki Tamada, Masahide Nakamura, Akito Monden, and Ken-ichi\r
- Matsumoto, "Java Birthmarks --Detecting the Software Theft--," IEICE\r
- Transactions on Information and Systems, Vol. E88-D, No. 9, September\r
- 2005.\r
-\r
-*SMC birthmark\r
-\r
- [Proposers] H. Tamada, et al.\r
-\r
- [Description] Sequence of method calls in definition order (not execution order).\r
-\r
- [Paper] Haruaki Tamada, Masahide Nakamura, Akito Monden, and Ken-ichi\r
- Matsumoto, "Java Birthmarks --Detecting the Software Theft--," IEICE\r
- Transactions on Information and Systems, Vol. E88-D, No. 9, September\r
- 2005.\r
-\r
-*IS birthmark\r
-\r
- [Proposers] H. Tamada, et al.\r
-\r
- [Description] Inheritance structure of target class. If a class in\r
- this birthmark elements is not wellknown-class, replace it to <null>.\r
-\r
- [Paper] Haruaki Tamada, Masahide Nakamura, Akito Monden, and Ken-ichi\r
- Matsumoto, "Java Birthmarks --Detecting the Software Theft--," IEICE\r
- Transactions on Information and Systems, Vol. E88-D, No. 9, September\r
- 2005.\r
-\r
-*UC birthmark\r
-\r
- [Proposers] H. Tamada, et al.\r
-\r
- [Description] A set of used classes. Elements of this birthmark is\r
- appeared in field type, method argument types, return type and used\r
- in methods.\r
-\r
- [Paper] Haruaki Tamada, Masahide Nakamura, Akito Monden, and Ken-ichi\r
- Matsumoto, "Java Birthmarks --Detecting the Software Theft--," IEICE\r
- Transactions on Information and Systems, Vol. E88-D, No. 9, September\r
- 2005.\r
-\r
-*k-gram based birthmark\r
-\r
- [Proposers] G. Myles and C. Collberg\r
-\r
- [Description] Construct k-gram from instructions.\r
-\r
- [Paper] Ginger Myles, Christian Collberg, ``K-gram based software\r
- birthmarks,'' In Proc. of the 2005 ACM symposium on Applied\r
- computing, 2005.\r
-\r
-*FMC birthmark\r
-\r
- [Proposers] H. Tamada\r
-\r
- [Description] Frequency of method calls.\r
-\r
- [Papers] Not published\r
-\r
- [Related Papers] Haruaki Tamada, Keiji Okamoto, Masahide Nakamura,\r
- Akito Monden, and Ken-ichi Matsumoto, ``Dynamic Software Birthmarks\r
- to Detect the Theft of Windows Applications,'' In\r
- Proc. International Symposium on Future Software Technology 2004\r
- (ISFST 2004), CD-ROM, Xi'an, China, 20-22 October 2004.\r
-\r
-*FUC birthmark\r
-\r
- [Proposers] H. Tamada\r
-\r
- [Description] Frequency of used classes.\r
-\r
- [Papers] Not published\r
-\r
- [Related Papers] Haruaki Tamada, Keiji Okamoto, Masahide Nakamura,\r
- Akito Monden, and Ken-ichi Matsumoto, ``Dynamic Software Birthmarks\r
- to Detect the Theft of Windows Applications,'' In\r
- Proc. International Symposium on Future Software Technology 2004\r
- (ISFST 2004), CD-ROM, Xi'an, China, 20-22 October 2004.\r
-\r
-Analysis method\r
-\r
-*MDS (Multi-dimensional scaling)\r
-\r
- [Proposer?] T. Kakimoto, et al.\r
-\r
- [Description] plotting classes into plane based on their similarities\r
- between each pairs.\r
-\r
- [Paper] Takeshi Kakimoto, Akito Monden, Yasutaka Kamei, Haruaki\r
- Tamada, Masateru Tsunoda, and Ken-ichi Matsumoto, ``Using Software\r
- Birthmarks to Identify Similar Classes and Major Functionalities,''\r
- In Proc. the 3rd International Workshop on Mining Software\r
- Repositories ({{{http://msr.uwaterloo.ca/msr2006/}MSR Mining\r
- Challenge 2006}}), pp.171--172, Shanghai, China, May 2006.\r
-\r
Articles\r
\r
* Mari-Len De Guzman, ``'Birthmark' scans software for piracy\r
check,'' COMPUTERWORLD, 29 August 2008,\r
{{{http://www.computerworld.com.au/index.php?id=1493459712&rid=-219}http://www.computerworld.com.au/index.php?id=1493459712&rid=-219}}\r
\r
- * Mari-Len De Guzman, ``German researchers develop ‘Birthmark’ for\r
+ * Mari-Len De Guzman, ``German researchers develop ``Birthmark'' for\r
piracy check,'' IT World Canada, 29 August 2007,\r
{{{http://www.itworldcanada.com/a/News/7ed1b410-7517-4e8a-91c8-f0fae4ea07dc.html}http://www.itworldcanada.com/a/News/7ed1b410-7517-4e8a-91c8-f0fae4ea07dc.html}}.\r
\r
\r
*Static Birthmark\r
\r
- * Jianlong Yang, Jianmin Wang, Deyi Li, ``Detecting the Theft of\r
- Natural Language Text Using Birthmark,'' iih-msp, pp. 699-702, 2006\r
- International Conference on Intelligent Information Hiding and\r
- Multimedia, 2006.\r
+ * Heewan Park, Hyun-il Lim, Seokwoo Choi and Taisook Han, ``A Static\r
+ Java Birthmark Based on Operand Stack Behaviors,'' In Proc. of 2008\r
+ International Conference on Information Security and Assurance,\r
+ pp.133-136, 2008.\r
\r
* Takeshi Kakimoto, Akito Monden, Yasutaka Kamei, Haruaki Tamada,\r
Masateru Tsunoda, and Ken-ichi Matsumoto, ``Using Software\r
0919-9527, Graduate School of Information Science, Nara Institute\r
of Science and Technology, November 2003.\r
\r
- * 玉田 春昭, 神崎 雄一郎, 中村 匡秀, 門田 暁人, 松本 健一, ``Java クラスファイルからプログラム指紋を抽出する方法の提案'', 信学技報 情報セキュリティ研究会, Vol. ISEC2003-29, pp.127--133, July 2003.\r
+ * ¶ÌÅÄ ½Õ¾¼, ¿Àºê ͺ°ìϺ, Ãæ¼ ¶©½¨, ÌçÅÄ ¶Ç¿Í, ¾¾ËÜ ·ò°ì, ``Java ¥¯¥é¥¹¥Õ¥¡¥¤¥ë¤«¤é¥×¥í¥°¥é¥à»ØÌæ¤òÃê½Ð¤¹¤ëÊýË¡¤ÎÄó°Æ'', ¿®³Øµ»Êó ¾ðÊ󥻥¥å¥ê¥Æ¥£¸¦µæ²ñ, Vol. ISEC2003-29, pp.127--133, July 2003.\r
\r
*Dynamic Birthmark\r
\r
Information Science, Nara Institute of Science and Technology, May\r
2007.\r
\r
- * 林 晃一郎, 楓 基靖, 真野 芳久, ``特徴抽出と抽象化による動的バースマークの構成とその検証'', 情報処理学会論文誌 (Transactions of Information Processing Society of Japan), Vol.48, No.4 pp. 1799-1808, April 2007.\r
+ * ÎÓ ¹¸°ìϺ, Éö ´ðÌ÷, ¿¿Ìî ˧µ×, ``ÆÃħÃê½Ð¤ÈÃê¾Ý²½¤Ë¤è¤ëưŪ¥Ð¡¼¥¹¥Þ¡¼¥¯¤Î¹½À®¤È¤½¤Î¸¡¾Ú'', ¾ðÊó½èÍý³Ø²ñÏÀʸ»ï (Transactions of Information Processing Society of Japan), Vol.48, No.4 pp. 1799-1808, April 2007.\r
\r
- * 森山 修, 古江 岳大, 遠山 毅, 松本 勉, ``API関数呼出履歴によるソフトウェア動的バースマークの一方式'', 信学技報, vol. 106, no. 235, ISEC2006-82, pp. 77-84, September 2006.\r
+ * ¿¹»³ ½¤, ¸Å¹¾ ³ÙÂç, ±ó»³ µ£, ¾¾ËÜ ÊÙ, ``API´Ø¿ô¸Æ½ÐÍúÎò¤Ë¤è¤ë¥½¥Õ¥È¥¦¥§¥¢Æ°Åª¥Ð¡¼¥¹¥Þ¡¼¥¯¤Î°ìÊý¼°'', ¿®³Øµ»Êó, vol. 106, no. 235, ISEC2006-82, pp. 77-84, September 2006.\r
\r
- * 岡本 圭司, 玉田 春昭, 中村 匡秀, 門田 暁人, 松本 健一, ``API呼び出しを用いた動的バースマーク'', 電子情報通信学会論文誌, Vol.J89-D, No.8, pp.1751-1763, August 2006.\r
+ * ²¬ËÜ ·½»Ê, ¶ÌÅÄ ½Õ¾¼, Ãæ¼ ¶©½¨, ÌçÅÄ ¶Ç¿Í, ¾¾ËÜ ·ò°ì, ``API¸Æ¤Ó½Ð¤·¤òÍѤ¤¤¿Æ°Åª¥Ð¡¼¥¹¥Þ¡¼¥¯'', ÅŻҾðÊóÄÌ¿®³Ø²ñÏÀʸ»ï, Vol.J89-D, No.8, pp.1751-1763, August 2006.\r
\r
* David Schuler and Valentin Dallmeier, ``Detecting Software Theft\r
with API Call Sequence Sets,'' Workshops Software Reengineering\r
(WSR 2006), pp.56-57, May 2006.\r
\r
- * 古田 壮宏, 真野 芳久, ``実行系列の抽象表現を利用した動的バースマーク'', 電子情報通信学会論文誌 Vol.J88-D1, No.10, pp.1595--1599, October 2005.\r
-\r
- * 岡本 圭司, 玉田 春昭, 中村 匡秀, 門田 暁人, 松本 健一, ``ソフトウェア実行時のAPI呼び出し履歴に基づく動的バースマークの実験的評価'', 第46回プログラミング・シンポジウム報告集, pp. 41--50, January 2005\r
+ * ¸ÅÅÄ ÁÔ¹¨, ¿¿Ìî ˧µ×, ``¼Â¹Ô·ÏÎó¤ÎÃê¾Ýɽ¸½¤òÍøÍѤ·¤¿Æ°Åª¥Ð¡¼¥¹¥Þ¡¼¥¯'', ÅŻҾðÊóÄÌ¿®³Ø²ñÏÀʸ»ï Vol.J88-D1, No.10, pp.1595--1599, October 2005.\r
\r
- * 岡本 圭司, 玉田 春昭, 中村 匡秀, 門田 暁人, 松本 健一, ``ソフトウェア実行時のAPI呼び出し履歴に基づく動的バースマークの提案'', ソフトウェア工学の基礎XI, 日本ソフトウェア科学会 FOSE2004 (FOSE2004), pp.85--88, November 2004. \r
+ * ²¬ËÜ ·½»Ê, ¶ÌÅÄ ½Õ¾¼, Ãæ¼ ¶©½¨, ÌçÅÄ ¶Ç¿Í, ¾¾ËÜ ·ò°ì, ``¥½¥Õ¥È¥¦¥§¥¢¼Â¹Ô»þ¤ÎAPI¸Æ¤Ó½Ð¤·ÍúÎò¤Ë´ð¤Å¤¯Æ°Åª¥Ð¡¼¥¹¥Þ¡¼¥¯¤Î¼Â¸³ÅªÉ¾²Á'', Âè46²ó¥×¥í¥°¥é¥ß¥ó¥°¡¦¥·¥ó¥Ý¥¸¥¦¥àÊó¹ð½¸, pp. 41--50, January 2005\r
+ * ²¬ËÜ ·½»Ê, ¶ÌÅÄ ½Õ¾¼, Ãæ¼ ¶©½¨, ÌçÅÄ ¶Ç¿Í, ¾¾ËÜ ·ò°ì, ``¥½¥Õ¥È¥¦¥§¥¢¼Â¹Ô»þ¤ÎAPI¸Æ¤Ó½Ð¤·ÍúÎò¤Ë´ð¤Å¤¯Æ°Åª¥Ð¡¼¥¹¥Þ¡¼¥¯¤ÎÄó°Æ'', ¥½¥Õ¥È¥¦¥§¥¢¹©³Ø¤Î´ðÁÃXI, ÆüËÜ¥½¥Õ¥È¥¦¥§¥¢²Ê³Ø²ñ FOSE2004 (FOSE2004), pp.85--88, November 2004. \r
\r
* Haruaki Tamada, Keiji Okamoto, Masahide Nakamura, Akito Monden, and\r
Ken-ichi Matsumoto, ``Dynamic Software Birthmarks to Detect the\r
* Ginger Myles and Christian Collberg, ``Detecting Software Theft via\r
Whole Program Path Birthmarks,'' In Proc. Information Security\r
Conference, September 27-29, 2004.\r
+\r
+*Other Birthmark\r
+\r
+ * Xiaoming Zhou, Xingming Sun, Guang Sun and Ying Yang, ``A Combined\r
+ Static and Dynamic Software Birthmark Based on Component Dependence\r
+ Graph,'' Proc. 2008 International Conference on Intelligent\r
+ Information Hiding and Multimedia Signal Processing, iih-msp,\r
+ pp.1416--1421, August 2008.\r
+\r
+ * Jianlong Yang, Jianmin Wang, Deyi Li, ``Detecting the Theft of\r
+ Natural Language Text Using Birthmark,''\r
+ International Conference on Intelligent Information Hiding and\r
+ Multimedia, iih-msp, pp. 699-702, 2006\r
+\r