Skip to main content

Software Piracy Forensics: The Need for Further Developing AFC

  • Conference paper
Book cover Digital Forensics and Cyber Crime (ICDF2C 2010)

Abstract

Among all the available approaches for software piracy forensics, one existing and exceptional approach is the theoretical frame work called AFC (Abstraction-Filtering-Comparison), an accepted approach in US courts for evaluating copyright infringement claims involving computer software. Through this paper, the authors would like to approach AFC in a threefold manner: One, to discuss the nature and efficacy of AFC; two, to recount some existing observations on it, and three, to identify areas, if any, where there is scope and need for appropriate modifications to further increase the efficacy and validate the legitimacy of the AFC approach, and in particular from the view point of a researcher who believes that software intelligence offered by the automated tools for software piracy investigation needs to be supplemented with manual intelligence for making the expert report more judiciary-friendly.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Santhosh Baboo, S., Vinod Bhattathiripad, P. (under editorial review): Software Piracy Forensics: Impact and Implications of post-piracy modifications. Digital Investigation - The International Journal of Digital Forensics & Incident Response (2010)

    Google Scholar 

  2. van der Ejik, P.: Comparative Discourse Analysis of Parallel texts, eprint arXiv:cmp-lg/9407022. Digital Equipment Corporation, Ratelaar 38, 3434 EW, Nieuwegein, The Netherlands, CMP-lg/ 9407022 (1994)

    Google Scholar 

  3. Yamamoto, T., Matsushita, M., Kamiya, T., Inoue, K.: Measuring Similarity of Large Software Systems Based on Source Code Correspondence. IEEE Transactions on Software Engineering, XX, Y (2004)

    Google Scholar 

  4. Lancaster, T., Culwin, F.: A Comparison of Source Code Plagiarism Detection Engines. Computer Science Education (2004), http://www.informaworld.com/

  5. Li, C.-T.: Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions. In: Information Science Reference, ch. XX (2010), http://www.info-sci-ref.com

  6. Frantzeskou, G., Stamatatos, E., Gritzalis, S., Chaski, C. E., Howald, B. S.: Identifying Authorship by Byte-Level N-Grams: The Source Code Author Profile (SCAP) Method. International Journal of Digital Evidence 6(1) (2007)

    Google Scholar 

  7. United States Court of Appeals Judge John Walker, Protectable Nuggests: Drawing the Line Between Idea and Expression in computer Program Copyright Protection, 44. Journal of the Copyright Society of USA 44(79) (1996)

    Google Scholar 

  8. Spafford, E.H., Weeber, S.A.: Software forensics: Can we track the code back to its authors? Purdue Technical Report CSD–TR 92–010, SERC Technical Report SERC–TR 110–P, Department of Computer Sciences, Purdue University (1992)

    Google Scholar 

  9. European Software Analysis Laboratory, The SIMILE Workshop: Automating the detection of counterfeit software (2007), www.esalab.com

  10. Raysman, R., Brown, P.: Copyright Infringement of computer software and the Altai test. New York Law Journal 235(89) (2006)

    Google Scholar 

  11. United States District Court of Massachusetts, Memorandum and Order, Civil Action number 07-12157 PBS, Real View LLC. Vs. 20-20 Technologies, p. 2 (2010)

    Google Scholar 

  12. United States Court of Appeals, Second Circuit, Computer Associates International, Inc. v. Altai, Inc., 982 F.2d 693; 1992 U.S. App. LEXIS 33369; 119 A.L.R. Fed. 741; 92 Cal. Daily, Op. Service 10213, January 9, 1992, Argued, December 17, 1992, Filed (1992)

    Google Scholar 

  13. United States Court of Appeals, Second Circuit, Corrected Amicus Brief filed by Mark M. Arkin, Counsel of 5 computer scientists regarding software copyright and trade secret cases – Observation of Abstraction, Filtration and Comparison test, on appeal from the United States district court for the southern district of New York, on the suit Harbour Software Inc. Vs Applied Systems Inc., 97-7197L (1997)

    Google Scholar 

  14. Hollar, L.A.: Legal Protection Of Digital Information. BNA Books (2002)

    Google Scholar 

  15. Santhosh Baboo, S., Vinod Bhattathiripad, P.: Software Piracy Forensics: Exploiting Nonautomated and Judiciary-Friendly Technique’. Journal of Digital Forensic Practice 2(4), 175–182 (2009)

    Article  Google Scholar 

  16. United States Court of Appeals, Second Circuit, Brief of Amici Curiae of 17 technical experts, in the case Universal City Studios, Inc., et al. Vs. Eric Corley, A/K/A Emmanuel Goldstein and 2600 enterprises (2001)

    Google Scholar 

  17. Vinod Bhattathiripad, P.: Judiciary-friendly computer forensics, Kerala Law Times, Part 13 & Index, June 29, p. 54 (2009)

    Google Scholar 

  18. Davis, R.: The nature of software and its consequences for establishing and evaluating piracy. Software Law Journal 5(2), 317–325 (1992)

    Google Scholar 

  19. Kremen, S.H.: Presentation of Technical Evidence by Experts in Computer Related Intellectual Property Litigation. Computer Forensics Online 2(1) (1998)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Baboo, S.S., Bhattathiripad, P.V. (2011). Software Piracy Forensics: The Need for Further Developing AFC. In: Baggili, I. (eds) Digital Forensics and Cyber Crime. ICDF2C 2010. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 53. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-19513-6_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-19513-6_2

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-19512-9

  • Online ISBN: 978-3-642-19513-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics