“Software Theft Detection for JavaScript programs based ondynamic birthmark extracted from runtime heap graph”
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 3
Abstract
Abstract: Software’s, programs are valuable assets to developer companies. However, the source code ofprograms can be theft and JavaScript programs whose code is easily available which is a serious threat to theindustry. There are techniques like watermarking which prove the ownership of the program but it can bedefaced and encryption which changes source code but it may decrypted and also it cannot avoid the sourcecode being copied. In this paper, we use a new technique, software birthmark, to help detect code theft ofsoftware or program. A birthmark is a unique characteristic of a program which is used to identify the program.We extract the birthmark of software from the run-time heap by using frequent sub graph mining and search thesame in suspected program.
Authors and Affiliations
Mr. Somanath Janardan Salunkhe , Prof. Umesh Laxman Kulkarni
Improvising Data Locality and Availability in Hbase Ecosystem
Abstract: In this paper, we try to represent the importance of data locality with the HBase architecture. HBase has a dynamic master slave architecture but the emphasis on data locality, i.e. getting the logic or p...
Multimodal Medical Image Fusion Based On SVD
Image fusion is a promising process in the field of medical image processing, the idea behind is to improve the content of medical image by combining two or more multimodal medical images. In this paper a ...
Intelligent Fault Identification System for Transmission Lines Using Artificial Neural Network
Transmission and distribution lines are vital links between generating units and consumers. They are exposed to atmosphere, hence chances of occurrence of fault in transmission line is very high, which has to be...
Recapitulating the development initiatives of a robust information security safeguard: RITSB-the proposed solution
Most current information security systems performance vary with the nature of the filed its being operating. With an increased emphasizes on the adoption of security tools and technologies, the anomalies and &nb...
Importance of Selecting Test Cases for Regression Testing
Abstract: There is a well-known discussion stating that “Under Testing is a crime and over testing is a Sin”. Regression testing also faces the same challenge regarding the selection of test cases which needs to re...