Finding the same source programs based on the structural fingerprint distance of call graph
With the purpose of guaranteeing the copyright and security of software, we introduce the structural fingerprint and the distance of the fingerprint to find the same source programs from a great deal of programs in this paper. In order to gain the structural fingerprint, the in-degree, out-degree an...
Saved in:
Main Authors: | YIN, Zhiyi, ZHU, Fuxi, FU, Jianming, GAO, Debin |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2009
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/802 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Similar Items
-
Binhunt: Automatically Finding Semantic Differences in Binary Programs
by: GAO, Debin, et al.
Published: (2008) -
Behavioral Distance for Intrusion Detection
by: GAO, Debin, et al.
Published: (2005) -
Gray-Box Extraction of Execution Graphs for Anomaly Detection
by: GAO, Debin, et al.
Published: (2004) -
Integrated software fingerprinting via neural-network-based control flow obfuscation
by: MA, Haoyu, et al.
Published: (2016) -
Fingerprint recognition by euclidean distance
by: Chomtip Pornpanomchai, et al.
Published: (2018)