基于数据依赖特征的软件识别
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:Software recognition based on features of data dependency
  • 作者:罗养霞 ; 郭晔
  • 英文作者:LUO Yang-xia;GUO Ye;School of Information,Xi′an University of Finance and Economics;China(Xi′an)Institute for Silk Road Research;
  • 关键词:计算机软件 ; 软件保护 ; 软件特征 ; 数据流 ; 数据依赖 ; 特征识别
  • 英文关键词:computer software;;software protection;;software feature;;data flow;;data dependency;;feature recognition
  • 中文刊名:JLGY
  • 英文刊名:Journal of Jilin University(Engineering and Technology Edition)
  • 机构:西安财经学院信息学院;中国(西安)丝绸之路研究院;
  • 出版日期:2017-01-12 15:39
  • 出版单位:吉林大学学报(工学版)
  • 年:2017
  • 期:v.47;No.194
  • 基金:陕西省科技厅自然科学基金项目(2014JM2-6100);; 陕西省教育厅科研计划项目(15JK1274);; 西安市2017年社会科学规划基金项目(17J08);; 西安财经学院科研计划项目(16FCJH02)
  • 语种:中文;
  • 页:JLGY201706030
  • 页数:9
  • CN:06
  • ISSN:22-1341/T
  • 分类号:231-239
摘要
研究了基于数据流切片的软件特征,为软件识别提供一种新的算法和评判系统。给出与算法相关的定义,如数据流、关系拓扑排序和相似度比较等。详述了算法的关键步骤,包括数据依赖关系、数据依赖图的构成与化简、关系拓扑排序等过程。最后,实现了算法和数据流软件特征评判系统。系统实现和实验分析证明该研究数据分析和理论推导相互验证,对推进基于特征的软件识别研究具有重要的理论和现实意义。
        The software features based on data stream slice are studied,and a new algorithm and evaluation system are proposed for software identification.The definitions about the algorithm,such as data flow,relationship between topological sort,similarity comparison,etc.,are given.The key steps of the algorithm are elaborated,including the data dependencies,the structure and reduction of the data dependency graph,the process of relationship topology sorting.Finally,the algorithm and data flow evaluation system of software feature are implemented.System implementation and experiment analysis demonstrate that the research data analysis and theoretical derivation mutually authenticate.The proposed algorithm and evaluation system has theoretical and practical significance for promotion research of software recognition based on software features.
引文
[1]伍之昂,庄毅,王有权,等.基于特征选择的推荐系统托攻击检测算法[J].电子学报,2012,40(8):1687-1694.Wu Zhi-ang,Zhuang Yi,Wang You-quan,et al.Shilling attack detection based on feature selection for recommendation systems[J].Acta Electronica Sinica,2012,40(8):1687-1694.
    [2]惠战伟,黄松嵇,孟雨.基于程序特征谱整数溢出错误定位技术研究[J].计算机学报,2012,35(10):2206-2217.Hui Zhan-wei,Huang Song-ji,Meng Yu.Research on spectra-based integer bug localization[J]Chinese Journal of Computers,2012,35(10):2206-2217.
    [3]Park H,Choi S,Lim H,et al.Detecting java theft based on static API trace birthmark[C]∥3rd International Workshop on Advances in Information and Computer Security,Kagawa,Japan,2008:121-135.
    [4]Xie X,Liu F,Lu B,et al.A software birthmark based on weighted n-gram[C]∥Proceedings of the Intelligent Computing and Intelligent Systems(ICIS),Zhengzhou,China,2010:400-405.
    [5]Chan P P F,Hui L C K,Yiu S M.Dynamic software birthmark for Java based on heap memory analysis[C]∥IFIP International Conference on Communications and Multimedia Security,Ghent,Belgium,2011:94-107.
    [6]Myles G,Collberg C.Detecting software theft via whole program path birthmarks[C]∥International Conference on Information Security,Palo Alto,USA,2004:27-29.
    [7]赵玉洁,房鼎益,顾元祥,等.代码混淆算法有效性评估[J].软件学报,2012,23(3):700-711.Zhao Yu-jie,Fang Ding-yi,Gu Yuan-xiang,et al.Evaluation of code obfuscating transformation[J].Chinese Journal of Software,2012,23(3):700-711.
    [8]Sartipi K,Safyallah H.Dynamic knowledge extraction from software systems using sequential pattern mining[J].International Journal of Software Engineering and Knowledge Engineering,2010,20(6):100-108.
    [9]Nagra J,Thomborsonm C.Threading software watermarks[C]∥International Workshop on Information Hiding,Toronto,Canada,2004:208-223.
    [10]罗养霞.基于多属性特征胎记的软件盗版检测[J].吉林大学学报:工学版,2013,43(5):1359-1366.Luo Yang-xia.Software piracy detection based on birthmarks of multi-attribute features[J].Journal of Jilin University(Engineering and Technology Edition),2013,43(5):1359-1366.
NGLC 2004-2010.National Geological Library of China All Rights Reserved.
Add:29 Xueyuan Rd,Haidian District,Beijing,PRC. Mail Add: 8324 mailbox 100083
For exchange or info please contact us via email.