Finding the same source programs based on the structural fingerprint distance of call graph
With the purpose of guaranteeing the copyright and security of software, we introduce the structural fingerprint and the distance of the fingerprint to find the same source programs from a great deal of programs in this paper. In order to gain the structural fingerprint, the in-degree, out-degree and adjacency relationship are exacted from call graph to construct a structural matrix. Then this matrix is mapped to RGB image and to compute the color moments of this image. Comparing with the traditional binary comparison way in which finding graph isomorphism is based on control flow graph or instruction similarity, this method offers many advantages in application. First of all, the image processing techniques are made full use of to gain the color moments that are considered as the structural fingerprint to identify different programs. And secondly, the distance of structural fingerprint can be used to find the same source programs from a large number of programs. Last but not least, the runtime of our method is significantly shorter than the traditional methods. It takes only seconds comparing to minutes and even hours taken by other methods.
Information Security and Trust
Neural Network World: International Journal on Non-standard Computing and Artificial Intelligence
YIN, Zhiyi; ZHU, Fuxi; FU, Jianming; and GAO, Debin.
Finding the same source programs based on the structural fingerprint distance of call graph. (2009). Neural Network World: International Journal on Non-standard Computing and Artificial Intelligence. 19, (6), 681-693. Research Collection School Of Information Systems.
Available at: http://ink.library.smu.edu.sg/sis_research/802
This document is currently not available here.