Choi et al., 2013 - Google Patents
RAMC: runtime abstract memory context based plagiarism detection in binary codeChoi et al., 2013
- Document ID
- 7481131539929863918
- Author
- Choi Y
- Park Y
- Choi J
- Cho S
- Han H
- Publication year
- Publication venue
- Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication
External Links
Snippet
Analyzing software similarity has emerged as a key ingredient for various applications such as software maintenance, bug finding, malware clustering and copyright protection. In this paper, we propose a novel software similarity analysis tool for plagiarism detection. The tool …
- 238000001514 detection method 0 title abstract description 17
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30386—Retrieval requests
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30587—Details of specialised database models
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
- G06F21/12—Protecting executable software
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/3668—Software testing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/3604—Software analysis for verifying properties of programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/44—Arrangements for executing specific programmes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/70—Software maintenance or management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/40—Transformations of program code
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F19/00—Digital computing or data processing equipment or methods, specially adapted for specific applications
- G06F19/10—Bioinformatics, i.e. methods or systems for genetic or protein-related data processing in computational molecular biology
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Ragkhitwetsagul et al. | A comparison of code similarity analysers | |
| Li et al. | Rebooting research on detecting repackaged android apps: Literature review and benchmark | |
| Sun et al. | VDSimilar: Vulnerability detection based on code similarity of vulnerabilities and patches | |
| Bourquin et al. | Binslayer: accurate comparison of binary executables | |
| Li et al. | Vulpecker: an automated vulnerability detection system based on code similarity analysis | |
| Perl et al. | Vccfinder: Finding potential vulnerabilities in open-source projects to assist code audits | |
| Tian et al. | Software plagiarism detection with birthmarks based on dynamic key instruction sequences | |
| Crussell et al. | Andarwin: Scalable detection of android application clones based on semantics | |
| Cheng et al. | How about bug-triggering paths?-understanding and characterizing learning-based vulnerability detectors | |
| Ghiasi et al. | Dynamic VSA: a framework for malware detection based on register contents | |
| Palahan et al. | Extraction of statistically significant malware behaviors | |
| CN107615240B (en) | Biological sequence based scheme for analyzing binary files | |
| Tian et al. | DKISB: Dynamic key instruction sequence birthmark for software plagiarism detection | |
| Lim et al. | A method for detecting the theft of Java programs through analysis of the control flow information | |
| Yang et al. | Transplantfix: Graph differencing-based code transplantation for automated program repair | |
| CN114398069B (en) | A method and system for accurate version identification of public component library based on cross fingerprint analysis | |
| Pirch et al. | Tagvet: Vetting malware tags using explainable machine learning | |
| Higo et al. | How should we measure functional sameness from program source code? an exploratory study on java methods | |
| Ren et al. | SCStudio: A secure and efficient integrated development environment for smart contracts | |
| Tian et al. | Plagiarism detection for multithreaded software based on thread-aware software birthmarks | |
| Liu et al. | Making vulnerability prediction more practical: Prediction, categorization, and localization | |
| Sun et al. | ANTSdroid: Automatic malware family behaviour generation and analysis for Android apps | |
| Zhou et al. | Drive: Dockerfile rule mining and violation detection | |
| Gobbi et al. | Poster: Using codeql to detect malware in npm | |
| US12189788B2 (en) | Identifying and addressing potential vulnerabilities in third-party code |