Skip to main content

Introduction

  • Chapter
  • First Online:
Software Similarity and Classification

Part of the book series: SpringerBriefs in Computer Science ((BRIEFSCOMPUTER))

  • 1029 Accesses

Abstract

This chapter introduces the major applications related to software similarity and classification. The applications include malware classification, software theft detection, plagiarism detection and code clone detection. The motivations for these applications are examined and an underlying theory is formalized. This theory is based on extracting signatures from programs, known as birthmarks, that are amenable to approximate matching that tells us how similar those programs are.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 16.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Roy CK, Cordy JR (2007) A survey on software clone detection research. Queen’s School of Computing TR 541:115

    Google Scholar 

  2. Symantec (2008) Symantec internet security threat report: Volume XII. Symantec

    Google Scholar 

  3. F-Secure (2007) F-Secure reports amount of malware grew by 100% during 2007

    Google Scholar 

  4. Wang X, Jhi Y-C, Zhu S, Liu P (2009) Behavior based software theft detection. Paper presented at the proceedings of the 16th ACM conference on computer and communications security, Chicago

    Google Scholar 

  5. Baker BS (1995) On finding duplication and near-duplication in large software systems. In: Proceedings of the second working conference on reverse engineering (WCRE ‘95). Published by the IEEE Computer Society, p 86

    Google Scholar 

  6. Johnson JH (1993) Identifying redundancy in source code using fingerprints. In: Proceedings of the 1993 conference of the centre for advanced studies on collaborative research (CASCON ‘93). IBM Press, pp 171–183

    Google Scholar 

  7. Tamada H, Okamoto K, Nakamura M, Monden A, Matsumoto K (2004) Dynamic software birthmarks to detect the theft of windows applications. In: International symposium on future software technology (ISFST 2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2012 The Author(s)

About this chapter

Cite this chapter

Cesare, S., Xiang, Y. (2012). Introduction. In: Software Similarity and Classification. SpringerBriefs in Computer Science. Springer, London. https://doi.org/10.1007/978-1-4471-2909-7_1

Download citation

  • DOI: https://doi.org/10.1007/978-1-4471-2909-7_1

  • Published:

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-4471-2908-0

  • Online ISBN: 978-1-4471-2909-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics