“Software Theft Detection for JavaScript programs based ondynamic birthmark extracted from runtime heap graph”
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 3
Abstract
Abstract: Software’s, programs are valuable assets to developer companies. However, the source code ofprograms can be theft and JavaScript programs whose code is easily available which is a serious threat to theindustry. There are techniques like watermarking which prove the ownership of the program but it can bedefaced and encryption which changes source code but it may decrypted and also it cannot avoid the sourcecode being copied. In this paper, we use a new technique, software birthmark, to help detect code theft ofsoftware or program. A birthmark is a unique characteristic of a program which is used to identify the program.We extract the birthmark of software from the run-time heap by using frequent sub graph mining and search thesame in suspected program.
Authors and Affiliations
Mr. Somanath Janardan Salunkhe , Prof. Umesh Laxman Kulkarni
Using Aspect Ratio to Classify Red Blood Images
In automated medical diagnosis, shape plays a key role in image processing and pattern matching. In particular, microscopic visual examination, as used in this paper, extensively uses shape to diagnose anemia u...
Techniques for Reduction of HandoverInterruption in Mobile Networks
Handoff is the procedure providing the connection to the backbone network while a mobileterminal is moving across the boundaries of coverage of two wireless points of connection.The handover management procedure is...
Different Method Used in Pixel Value Differencing Algorithm
Steganography is the art of hiding information inside a multimedia. The basic idea is to hide data inside carrier medium such as text, image, audio, video and networks in such a way that attacker cannot detect it....
Speech Recognition System – A Review
Abstract:Language is the most important means of communication and speech is its main medium. In human to machine interface, speech signal is transformed into analog and digital wave form which can be understood by machi...
Security Evaluation of Google Chrome Operating System
Abstract: Due to the increase nature of computer threats and attacks, the security of the operating system isparamount in the computing world today. Every modern computer system, from network servers, workstationde...