Abstract
This chapter introduces the major applications related to software similarity and classification. The applications include malware classification, software theft detection, plagiarism detection and code clone detection. The motivations for these applications are examined and an underlying theory is formalized. This theory is based on extracting signatures from programs, known as birthmarks, that are amenable to approximate matching that tells us how similar those programs are.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Roy CK, Cordy JR (2007) A survey on software clone detection research. Queen’s School of Computing TR 541:115
Symantec (2008) Symantec internet security threat report: Volume XII. Symantec
F-Secure (2007) F-Secure reports amount of malware grew by 100% during 2007
Wang X, Jhi Y-C, Zhu S, Liu P (2009) Behavior based software theft detection. Paper presented at the proceedings of the 16th ACM conference on computer and communications security, Chicago
Baker BS (1995) On finding duplication and near-duplication in large software systems. In: Proceedings of the second working conference on reverse engineering (WCRE ‘95). Published by the IEEE Computer Society, p 86
Johnson JH (1993) Identifying redundancy in source code using fingerprints. In: Proceedings of the 1993 conference of the centre for advanced studies on collaborative research (CASCON ‘93). IBM Press, pp 171–183
Tamada H, Okamoto K, Nakamura M, Monden A, Matsumoto K (2004) Dynamic software birthmarks to detect the theft of windows applications. In: International symposium on future software technology (ISFST 2004)
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2012 The Author(s)
About this chapter
Cite this chapter
Cesare, S., Xiang, Y. (2012). Introduction. In: Software Similarity and Classification. SpringerBriefs in Computer Science. Springer, London. https://doi.org/10.1007/978-1-4471-2909-7_1
Download citation
DOI: https://doi.org/10.1007/978-1-4471-2909-7_1
Published:
Publisher Name: Springer, London
Print ISBN: 978-1-4471-2908-0
Online ISBN: 978-1-4471-2909-7
eBook Packages: Computer ScienceComputer Science (R0)