Skip to main content
Log in

Software Birthmark Design and Estimation: A Systematic Literature Review

  • Research Article - Computer Engineering and Computer Science
  • Published:
Arabian Journal for Science and Engineering Aims and scope Submit manuscript

Abstract

The concept of software birthmark is developed for the detection of theft and piracy in software applications. The originality of software can be evaluated by comparing software programs on the basis of their birthmarks. A number of birthmark designs have been proposed which are used to specify birthmark for source code and executable code related to particular programming languages. This study presents a systematic literature review on available software birthmark designs and related techniques for comparing birthmarks in order to identify pirated software. This research is focused on identifying different applications of software birthmark, especially the estimation of software birthmark to identify the extent of piracy performed in a software. The objective is to gain insight into complex details of software birthmark by accumulating and analyzing the knowledge provided in the literature in order to facilitate further research in software birthmark and its applications. The study is conducted by following the systematic literature review protocol. The data are collected from primary studies published from 1992 to April 2018 in specified journals and conference/workshop proceedings. A total of 143 primary studies are selected, based on predefined exclusion, inclusion, and quality criteria. The research identifies 22 software birthmark techniques frequently used and discussed by researchers and industry. The study also identifies a number of important applications of software birthmarks. These applications define the use of software birthmark in software theft and plagiarism detection, intellectual software asset management, detecting binary theft, malware detection, detecting the theft of natural language, and semantics-based repackaging detection for mobile apps. The results show that despite the large-scale research and development of different birthmark techniques, there is a lack of organized knowledge which is needed to facilitate the usage of software birthmark for critical applications like clone detection and malware detection. Furthermore, it is seen that the area of software birthmark estimation is not well researched which needs to be explored further. The study recommends that the area of software birthmark needs to be explored for developing a reliable and authentic mechanism which can accurately and easily detect software theft and ultimately prevent the piracy of software.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Moores, T.T.; Dhaliwal, J.: A reversed context analysis of software piracy issues in Singapore. Inf. Manag. 41(8), 1037–1042 (2004)

    Article  Google Scholar 

  2. Gan, L.L.; Koh, H.C.: An empirical study of software piracy among tertiary institutions in Singapore. Inf. Manag. 43(5), 640–649 (2006). https://doi.org/10.1016/j.im.2006.03.005

    Article  Google Scholar 

  3. Mishraa, A.; Akmana, I.; Yazicib, A.: Software piracy among IT professionals in organizations. Int. J. Inf. Manag. 26(5), 401–413 (2006). https://doi.org/10.1016/j.ijinfomgt.2006.01.004

    Article  Google Scholar 

  4. Curtis, D.: Software piracy and copyright protection. In: Paper Presented at the Wescon/94: Idea/Microelectronics, New York, NY, USA

  5. Rife, R.C.: Software piracy. In: Northcon/94 Conference Record, pp. 364–366 (1994)

  6. Thabit, R.; Khoo, B.E.: Robust reversible watermarking scheme using Slantlet transform matrix. J. Syst. Softw. 88, 74–86 (2014). https://doi.org/10.1016/j.jss.2013.09.033

    Article  Google Scholar 

  7. Zeng, Y.; Liu, F.; Luo, X.; Yang, C.: Software watermarking through obfuscated interpretation: implementation and analysis. J. Multimed. 6(4), 329–340 (2011)

    Article  Google Scholar 

  8. Collberg, C.; Sahoo, T.R.: Software watermarking in the frequency domain: implementation, analysis, and attacks. J. Comput. Secur. 13, 721–755 (2005)

    Article  Google Scholar 

  9. Myles, G.; Collberg, C.: Software watermarking through register allocation: implementation, analysis, and attacks. In: Information Security and Cryptology—ICISC 2003, Lecture Notes in Computer Science, vol. 2971, pp. 274–293. Springer, Berlin (2004)

  10. Arboit, G.E.: A method for watermarking java programs via opaque predicates. In: The Fifth International Conference on Electronic Commerce Research (ICECR-5) 2002, pp. 1–8

  11. Venkatesan, R.; Vazirani, V.; Sinha, S.: A graph theoretic approach to software watermarking. In: 4th International Information Hiding Workshop, Pittsburgh, PA 2001, pp. 157–168

  12. Stern, J.P.; Hachez, G.E.; Koeune, F.C.; Quisquater, J.-J.: Robust object watermarking: application to code. In: Information Hiding, Lecture Notes in Computer Science, vol. 1768, pp. 368–378. Springer, Berlin (2000)

  13. Monden, A.; Iida, H.; Matsumoto, K.-I.; Inoue, K.; Torii, K.: A practical method for watermarking java programs. In: 24th Computer Software and Applications Conference Compsac2000, pp. 191–197 (2000)

  14. Cousot, P.; Cousot, R.: An abstract interpretation-based framework for software watermarking. In: Proceedings of the 31st ACM SIGPLAN-SIGACT Symposium on Principles of Programming languages, vol. 1, pp. 173–185 (2004)

  15. Gottschlich, C.: Curved-region-based ridge frequency estimation and curved Gabor filters for fingerprint image enhancement. IEEE Trans. Image Process. 21(4), 220–227 (2012)

    Article  MathSciNet  MATH  Google Scholar 

  16. Collberg, C.S.; Thomborson, C.; Townsend, G.M.: Dynamic graph-based software fingerprinting. ACM Trans. Program. Lang. Syst. 29(6), 35 (2007). https://doi.org/10.1145/1286821.1286826

    Article  Google Scholar 

  17. Schleimer, S.; Wilkerson, D.; Aiken, A.: Winnowing: local algorithms for document fingerprinting. In: Proceedings of 2003 SIGMOD Conference 2003

  18. Pieprzyk, J.: Fingerprints for copyright software protection. In: Information Security, Lecture Notes in Computer Science, vol. 1729, pp. 178–190 (1999)

  19. Tamada, H.; Okamoto, K.; Nakamura, M.; Monden, A.; Matsumoto, K.-I.: Dynamic software birthmarks to detect the theft of windows applications. In: Paper Presented at the International Symposium on Future Software Technology

  20. Nazir, S.; Shahzad, S.; Nizamani, Q.U.A.; Amin, R.; Shah, M.A.; Keerio, A.: Identifying software features as birthmark. Sindh Univ. Res. J. (Sci. Ser.) 47(3), 535–540 (2015)

    Google Scholar 

  21. Zeng, Y.; Liu, F.; Luo, X.; Lian, S.: Abstract interpretation-based semantic framework for software birthmark. Comput. Secur. 31(4), 377–390 (2012). https://doi.org/10.1016/j.cose.2012.03.004

    Article  Google Scholar 

  22. Myles, G.; Collberg, C.: Detecting software theft via whole program path birthmarks. In: Information Security, Lecture Notes in Computer Science, vol. 3225, pp. 404–415 (2004)

  23. Tamada, H.; Nakamura, M.; Monden, A.: Design and evaluation of birthmarks for Detecting theft of java programs. In: IASTED International Conference on Software Engineering 2004, pp. 17–19 (2004)

  24. Kitchenham, B.; Brereton, O.P.; Budgen, D.; Turner, M.; Bailey, J.; Linkman, S.: Systematic literature reviews in software engineering: a systematic literature review. Inf. Softw. Technol. 51, 7–15 (2009)

    Article  Google Scholar 

  25. Kitchenham, B.: Guidelines for performing systematic literature reviews in software engineering, Version 2.3. In: EBSE Technical Report. Keele University and University of Durham (2007)

  26. Park, H.; Choi, S.; Lim, H.-I.; Han, T.: Detecting java theft based on static API trace birthmark. In: Advances in Information and Computer Security. Springer, Kagawa (2008)

  27. Park, H.; Choi, S.; Lim, H.-I.; Han, T.: Detecting code theft via a static instruction trace birthmark for Java methods. In: 2008 6th IEEE International Conference on Industrial Informatics, pp. 551–556 (2008)

  28. Park, H.; Choi, S.; Lim, H.-I.; Han, T.: Detecting java class theft using static API trace birthmark. J. KIISE Comput. Pract. Lett. 14(9), 911–915 (2008)

    Google Scholar 

  29. Mahmood, Y.; Sarwar, S.; Pervez, Z.; Ahmed, H.F.: Method based static software birthmarks: A new approach to derogate software piracy. In: 2nd International Conference on Computer, Control and Communication, 2009. IC4 2009, pp. 1–6 (2009)

  30. Tian, Z.; Zheng, Q.; Liu, T.; Fan, M.: DKISB: dynamic key instruction sequence birthmark for software plagiarism detection. In: 2013 IEEE 10th International Conference on High Performance Computing and Communications and 2013 IEEE International Conference on Embedded and Ubiquitous Computing (HPCC_EUC), pp. 619–627 (2013)

  31. Daeshin, P.; Hyunho, J.; Youngsu, P.; JiMan, H.: Efficient similarity measurement technique of windows software using dynamic birthmark based on API. Smart Media J. 4(2), 34–45 (2014)

    Google Scholar 

  32. Kang, S.; Shim, H.; Cho, S.-J.; Park, M.; Han, S.: A robust and efficient birthmark-based android application filtering system. In: Paper Presented at the Proceedings of the 2014 Conference on Research in Adaptive and Convergent Systems, Towson, Maryland

  33. Thomson Scientific Releases EndNote X1 for Windows, http://endnote.com/. Accessed 24 Apr 2018

  34. Dyba, T.; Dingsøyr, T.: Empirical studies of agile software development: a systematic review. In: Information and Software Technology (2008)

  35. Kim, Y.; Cho, S.-J.; Han, S.; You, I.: A software classification scheme using binary-level characteristics for efficient software filtering. Soft Comput. 22, 595–606 (2018)

    Article  Google Scholar 

  36. Nakamura, J.; Tamada, H.: Mituba: scaling up software theft detection with the search engine. In: Proceedings of the 2018 International Conference on Software Engineering and Information Management 2018, pp. 6–10 (2018)

  37. Beck, M.; Walden, J.: Using software birthmarks and clustering to identify similar classes and major functionalities. In: Proceedings of the ACMSE 2018 Conference 2018, pp. 1–7 (2018)

  38. Tian, Z.; Liu, T.; Zheng, Q.; Zhuang, E.; Fan, M.; Yang, Z.: Reviving sequential program birthmarking for multithreaded software plagiarism detection. In: IEEE Transactions on Software Engineering. vol. 99, pp. 1–23 (2017)

  39. Nazir, S.; Shahzad, S.; Atan, R.B.; Farman, H.: Estimation of software features based birthmark. Clust. Comput. 1–14 (2017). https://doi.org/10.1007/s10586-017-0842-3

  40. Kim, H.; Kim, J.; Kim, Y.; Kim, I.; Kim, K.J.; Kim, H.: Improvement of malware detection and classification using API call sequence alignment and visualization. Clust. Comput. 1–9 (2017). https://doi.org/10.1007/s10586-017-1110-2

  41. Yue, S.; Feng, W.; Ma, J.; Jiang, Y.; Tao, X.; Xu, C.; Lu, J.: RepDroid: an automated tool for android application repackaging detection. In: IEEE 25th International Conference on Program Comprehension (ICPC) 2017, pp. 132–142 (2017)

  42. Yuan, C.; Wei, S.; Zhou, C.; Guo, J.: Scalable and obfuscation-resilient android app repackaging detection based on behavior birthmark. In: 24th Asia–Pacific Software Engineering Conference 2017, pp. 476–485 (2017)

  43. Kim, G.: On computing similarity of android executables using text mining: student research abstract. In: Proceedings of the Symposium on Applied Computing 2017, pp. 1761–1762 (2017)

  44. Chen, J.; Li, K.; Wen, W.; Chen, W.; Yan, C.: Software watermarking for java program based on method name encoding. In: Proceedings of the International Conference on Advanced Intelligent Systems and Informatics 2017, pp. 865–874 (2017)

  45. Chae, D.-K.; Ha, J.; Kim, S.-W.; Kang, B.; Im, E.G.; Park, S.: Credible, resilient, and scalable detection of software plagiarism using authority histograms. Knowl. Based Syst. 95, 114–124 (2016). https://doi.org/10.1016/j.knosys.2015.12.009

    Article  Google Scholar 

  46. Huda, S.; Abawajy, J.; Alazab, M.; Abdollalihian, M.; Islam, R.; Yearwood, J.: Hybrids of support vector machine wrapper and filter based framework for malware detection. Future Gener. Comput. Syst. 55(C), 376–390 (2016). https://doi.org/10.1016/j.future.2014.06.001

    Article  Google Scholar 

  47. Kim, D.; Gokhale, A.; Ganapathy, V.; Srivastava, A.: Detecting plagiarized mobile apps using API birthmarks. Autom. Softw. Eng. 23, 591–618 (2016)

    Article  Google Scholar 

  48. Tian, Z.; Liu, T.; Zheng, Q.; Fan, M.; Zhuang, E.; Yang, Z.: Exploiting thread-related system calls for plagiarism detection of multithreaded programs. J. Syst. Softw. 119, 136–148 (2016)

    Article  Google Scholar 

  49. Ming, J.; Zhang, F.; Wu, D.; Liu, P.; Zhu, S.: Deviation-based obfuscation-resilient program equivalence checking with application to software plagiarism detection. IEEE Trans. Reliab. 65(4), 1647–1664 (2016)

    Article  Google Scholar 

  50. Lim, H.-I.: Comparative analysis of technical methods for detecting software thefts. J. Comput. 11(1), 26–32 (2016)

    Article  Google Scholar 

  51. Lee, D.; Kang, D.; Choi, Y.; Kim, J.; Won, D.: API-based software birthmarking method using fuzzy hashing. IEICE Trans. Inf. Syst. E99.D(7), 1836–1851 (2016)

    Article  Google Scholar 

  52. Tsuzaki, T.; Yamamoto, T.; Tamada, H.; Monden, A.: A fuzzy hashing technique for large scale software birthmarks. In: IEEE/ACIS 15th International Conference on Computer and Information Science (ICIS) 2016, pp. 1–6 (2016)

  53. Tian, Z.; Liu, T.; Zheng, Q.; Tong, F.; Fan, M.; Yang, Z.: A new thread-aware birthmark for plagiarism detection of multithreaded programs. In: 2016 IEEE/ACM 38th IEEE International Conference on Software Engineering Companion 2016, pp. 734–736 (2016)

  54. Schmidt, K.; Bansle, J.: Computational artifacts: interactive and collaborative computing as an integral feature of work practice. In: Proceedings of the 12th International Conference on the Design of Cooperative Systems, Trento, Italy 2016, pp. 21–38 (2016)

  55. Nakamura, J.; Tamada, H.: Fast comparison of software birthmarks for detecting the theft with the search engine. In: 2016 4th International Conference on Applied Computing and Information Technology/3rd International Conference on Computational Science/Intelligence and Applied Informatics/1st International Conference on Big Data, Cloud Computing, Data Science and Engineering 2016, pp. 152–157 (2016)

  56. Li, J.; Liu, X.; Zhang, H.; Mu, D.: A scalable cloud-based android app repackaging detection framework. In: Green, Pervasive, and Cloud Computing 2016, pp. 113–125 (2016)

  57. Vemparala, S.; Troia, F.D.; Corrado, V.A.; Austin, T.H.; Stamo, M.: Malware detection using dynamic birthmarks. In: Paper Presented at the Proceedings of the 2016 ACM on International Workshop on Security And Privacy Analytics, New Orleans, Louisiana, USA

  58. Guan, Q.; Huang, H.; Luo, W.; Zhu, S.: Semantics-based repackaging detection for Mobile Apps. In: Caballero, J., Bodden, E., Athanasopoulos, E. (eds.) Engineering Secure Software and Systems: 8th International Symposium, ESSoS 2016, Proceedings, London, UK, pp. 89–105. Springer, Cham (2016)

    Chapter  Google Scholar 

  59. Zhai, X.; Appiah, K.; Ehsan, S.; Howells, G.; Hu, H.; Gu, D.; McDonald-Maier, K.: Exploring ICMetrics to detect abnormal program behaviour on embedded devices. J. Syst. Archit. 61(10), 567–575 (2015). https://doi.org/10.1016/j.sysarc.2015.07.007

    Article  Google Scholar 

  60. Nazir, S.; Shahzad, S.; Khan, S.A.; Ilya, N.B.; Anwar, S.: A novel rules based approach for estimating software birthmark. Sci. World J.(2015). https://doi.org/10.1155/2015/579390

  61. Tian, Z.; Zheng, Q.; Liu, T.; Fan, M.; Zhuang, E.; Yang, Z.: Software plagiarism detection with birthmarks based on dynamic key instruction sequences. IEEE Trans. Softw. Eng. 41(12), 1217–1235 (2015). https://doi.org/10.1109/tse.2015.2454508

    Article  Google Scholar 

  62. Qiu, D.; Sun, J.; Li, H.: Improving similarity measure for java programs based on optimal matching of control flow graphs. Int. J. Softw. Eng. Knowl. Eng. 25(7), 1171–1197 (2015). https://doi.org/10.1142/s0218194015500229

    Article  Google Scholar 

  63. Kim, D.; Gokhale, A.; Ganapathy, V.; Srivastava, A.: Detecting plagiarized mobile apps using API birthmarks. Autom. Softw. Eng. 23(4), 1–28 (2015). https://doi.org/10.1007/s10515-015-0182-6

    Article  Google Scholar 

  64. Ji, Y.; Li, Q.; He, Y.; Guo, D.: Overhead analysis and evaluation of approaches to host-based bot detection. Int. J. Distrib. Sensor Netw. 11(5), 1–17 (2015). https://doi.org/10.1155/2015/524627

    Article  Google Scholar 

  65. Heron, M.J.; Belford, P.: Musings on misconduct: a practitioner reflection on the ethical investigation of plagiarism within programming modules. SIGCAS Comput. Soc. 45(3), 438–444 (2015). https://doi.org/10.1145/2874239.2874304

    Article  Google Scholar 

  66. Chae, Dong-Kyu; Kim, Sang-Wook; Cho, Seong-Je; Kim, Yesol: Effective and efficient detection of software theft via dynamic API authority vectors. J. Syst. Softw. 110, 1–9 (2015). https://doi.org/10.1016/j.jss.2015.08.018

    Article  Google Scholar 

  67. Alazab, M.: Profiling and classifying the behavior of malicious codes. J. Syst. Softw. 100, 91–102 (2015). https://doi.org/10.1016/j.jss.2014.10.031

    Article  Google Scholar 

  68. Lim, H.-I.: Comparative Analysis of Technical Methods for Detecting Software Thefts. J. Comput. 11(1), 26–32 (2015)

    Article  Google Scholar 

  69. Kim, D.; Kim, Y.; Cho, Sj; Park, M.; Han, S.; Lee, Gs; Hwang, Ys: An effective and intelligent Windows application filtering system using software similarity. Soft Comput. 20(5), 1821–1827 (2015). https://doi.org/10.1007/s00500-015-1678-5

    Article  Google Scholar 

  70. Zeng, K.; Athanas, P.: Discovering reusable hardware using birthmarking techniques. In: 2015 IEEE International Conference on Information Reuse and Integration 2015, IEEE Computer Society, pp. 106–113

  71. Wang, H.; Guo, Y.; Ma, Z.; Chen, X.: WuKong: a scalable and accurate two-phase approach to Android app clone detection. In: Paper Presented at the Proceedings of the 2015 International Symposium on Software Testing and Analysis, Baltimore, MD, USA (2015)

  72. Anjali, V.; Swapna, T.R.; Jayaramanb, B.: Plagiarism Detection for Java Programs without Source Codes. Proc. Comput. Sci. 46, 749–758 (2015). https://doi.org/10.1016/j.procs.2015.02.143

    Article  Google Scholar 

  73. Soh, C.; Tan, H.B.K.; Arnatovich, Y.L.; Wang, L.: Detecting clones in Android applications through analyzing user interfaces. In: Paper Presented at the IEEE 23rd International Conference on Program Comprehension, Florence, Italy (2015)

  74. Ming, J.; Xin, Z.; Lan, P.; Wu, D.; Liu, P.; Mao, B.: Replacement attacks: automatically impeding behavior-based malware specifications. In: Malkin, T., Kolesnikov, V., Lewko, B.A., Polychronakis, M. (eds.) Applied Cryptography and Network Security: 13th International Conference, ACNS 2015, New York, NY, USA, Revised Selected Papers, pp. 497–517. Springer, Cham (2015)

  75. Park, J.; Son, D.; Kang, D.; Choi, J.; Jeon, G.: Software similarity analysis based on dynamic stack usage patterns. In: Paper Presented at the Proceedings of the 2015 Conference on research in adaptive and convergent systems, Prague, Czech Republic (2015)

  76. Kim, Y.; Park, J.; Cho, S.-J.; Nah, Y.; Han, S.; Park, M.: Machine learning-based software classification scheme for efficient program similarity analysis. In: Paper Presented at the Proceedings of the 2015 Conference on Research in Adaptive and Convergent Systems, Prague, Czech Republic (2015)

  77. Chae, D.-K.; Kim, S.-W.; Cho, S.-J.; Kim, Y.: DAAV: dynamic API authority vectors for detecting software theft. In: Paper Presented at the Proceedings of the 24th ACM International on Conference on Information and Knowledge Management, Melbourne, Australia (2015)

  78. Canfora, G.; Medvet, E.; Mercaldo, F.; Visaggio, C.A.: Detecting Android malware using sequences of system calls. In: Paper Presented at the Proceedings of the 3rd International Workshop on Software Development Lifecycle for Mobile, Bergamo, Italy (2015)

  79. Rana, H.; Stamp, M.: Hunting for pirated software using metamorphic analysis. Inf. Secur. J. Glob. Perspect. 23(3), 68–85 (2014). https://doi.org/10.1080/19393555.2014.975557

    Article  Google Scholar 

  80. Park, S.; Han, H.: Detecting software similarity using API sequences on static major paths. J. KIISE 41(12), 1007–1012 (2014)

    Article  Google Scholar 

  81. Linares-Vásquez, M.; McMillan, C.; Poshyvanyk, D.; Grechanik, M.: On using machine learning to automatically classify software applications into domain categories. Empir. Softw. Eng. 19(3), 582–618 (2014). https://doi.org/10.1007/s10664-012-9230-z

    Article  Google Scholar 

  82. Han, Y.; Choi, J.; Cho, S.-J.; Yoo, H.: A new detection scheme of software copyright infringement using software birthmark on windows systems. Comput. Sci. Inf. Syst. 11(3), 1055–1069 (2014). https://doi.org/10.2298/csis130918064h

    Article  Google Scholar 

  83. Patel, S.; Pattewar, T.M.: Software birthmark based theft detection of JavaScript programs using agglomerative clustering and improved frequent subgraph mining. In: 2014 International Conference on Advances in Electronics, Computers and Communications (ICAECC), pp. 1–6 (2014)

  84. Park, S.; Kim, H.; Kim, J.; Han, H.: Detecting binary theft via static major-path birthmarks. In: Paper Presented at the Proceedings of the 2014 Conference on Research in Adaptive and Convergent Systems, Towson, Maryland (2014)

  85. Park, D.; Park, Y.; Kim, J.; Hong, J.: The optimized grouping value for precise similarity comparison of dynamic birthmark. In: Paper Presented at the Proceedings of the 2014 Conference on Research in Adaptive and Convergent Systems, Towson, Maryland (2014)

  86. Zhang, Y.; Huang, K.; Liu, Y.; Chen, K.; Huang, L.; Lian, Y.: Timing-based clone detection on android markets. In: Tian, J., Jing, J., Srivatsa, M. (eds.) International Conference on Security and Privacy in Communication Networks: 10th International ICST Conference, SecureComm 2014, Beijing, China, 2014, Revised Selected Papers, Part II, pp. 375–381. Springer, Cham (2014)

  87. Zhang, F.; Huang, H.; Zhu, S.; Wu, D.; Liu, P.: ViewDroid: towards obfuscation-resilient mobile application repackaging detection. In: Paper Presented at the Proceedings of the 2014 ACM conference on Security and Privacy in Wireless and Mobile Networks, Oxford, United Kingdom (2014)

  88. Tian, Z.; Zheng, Q.; Liu, T.; Fan, M.; Zhang, X.; Yang, Z.: Plagiarism detection for multithreaded software based on thread-aware software birthmarks. In: Paper Presented at the Proceedings of the 22nd International Conference on Program Comprehension, Hyderabad, India (2014)

  89. Liu, K.; Zheng, T.; Wei, L.: A Software birthmark based on system call and program data dependence. In: Paper Presented at the Proceedings of the 2014 11th Web Information System and Application Conference

  90. Kywe, S.M.; Li, Y.; Deng, R.H.; Hong, J.: Detecting camouflaged applications on mobile application markets. In: Lee, J., Kim, J. (eds.) Information Security and Cryptology—ICISC 2014: 17th International Conference, 2014 Seoul, South Korea, Revised Selected Papers, pp. 241–254. Springer, Cham (2014)

  91. Kim, T.; Park, J.B.; Cho, I.G.; Kang, B.; Im, E.G.; Kang, S.: Similarity calculation method for user-define functions to detect malware variants. In: Paper Presented at the Proceedings of the 2014 Conference on Research in Adaptive and Convergent Systems, Towson, Maryland (2014)

  92. Kim, D.; Moon, J.; Cho, S.-j.; Choi, J.; Park, M.; Han, S.; Chung, L.: A birthmark-based method for intellectual software asset management. In: Paper Presented at the 8th International Conference on Ubiquitous Information Management and Communication, Siem Reap, Cambodia (2014)

  93. Ganguly, D.; Jones, G.J.F.: DCU@FIRE-2014: an information retrieval approach for source code plagiarism detection. In: Paper Presented at the Proceedings of the Forum for Information Retrieval Evaluation, Bangalore, India (2014)

  94. Chen, K.; Liu, P.; Zhang, Y.: Achieving accuracy and scalability simultaneously in detecting application clones on Android markets. In: Paper Presented at the 36th International Conference on Software Engineering, Hyderabad, India (2014)

  95. Amamra, A.; Robert, J.-M.; Talhi, C.: Enhancing malware detection for Android systems using a system call filtering and abstraction process. Secur. Commun. Netw. 8(7), 1179–1192 (2014). https://doi.org/10.1002/sec.1073

    Article  Google Scholar 

  96. Alazab, M.; Venkatraman, S.: Detecting malicious behaviour using supervised learning algorithms of the function calls. Int. J. Electron. Secur. Digit. Forensics 5(2), 90–109 (2013). https://doi.org/10.1504/ijesdf.2013.055047

    Article  Google Scholar 

  97. Chae, D.G.; Jiwoon, H.; Chull, L.S.; Wook, K.S.: A software birthmarking system using static API-call frequency. J. KIISE Comput. Pract. Lett. 19(5), 298–302 (2013)

    Google Scholar 

  98. Rattan, D.; Bhatia, R.; Singh, M.: Software clone detection: a systematic review. Inf. Softw. Technol. 55(7), 1165–1199 (2013). https://doi.org/10.1016/j.infsof.2013.01.008

    Article  Google Scholar 

  99. Park, H.: An android birthmark based on API k-gram. KIPS Trans. Comput. Commun. Syst. 2(4), 177–180 (2013). https://doi.org/10.3745/ktccs.2013.2.4.177

    Article  Google Scholar 

  100. Chan, P.P.F.; Hui, L.C.K.; Yiu, S.M.: Heap graph based software theft detection. IEEE Trans. Inf. Forensics Secur. 8(1), 101–110 (2013). https://doi.org/10.1109/tifs.2012.2223685

    Article  Google Scholar 

  101. Zhao, Z.; Liu, F.; Luo, X.; Xie, X.; Yu, L.: LSB replacement steganography software detection based on model checking. In: Paper Presented at the Proceedings of the 11th International Conference on Digital Forensics and Watermaking, Shanghai, China (2012)

  102. Wang, Y.; Liu, F.; Zhao, Z.; Lu, B.; Xie, X.: Operand stack dependence based Java static software birthmark. In: 2013 10th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD), pp. 1090–1095 (2013)

  103. Qiu, D.H.; Li, H.; Sun, J.L.: Measuring software similarity based on structure and property of class diagram. In: 2013 Sixth International Conference on Advanced Computational Intelligence (ICACI), pp. 75–80 (2013)

  104. Park, Y.; Hong, J.: An effective API extraction scheme for dynamic binary similarity comparison. In: Paper Presented at the Proceedings of the 2013 Research in Adaptive and Convergent Systems, Montreal, Quebec, Canada (2013)

  105. Lim, H.-I.: Customizing k-gram based birthmark through partial matching in detecting software thefts. In: Paper Presented at the IEEE 37th Annual Computer Software and Applications Conference Workshops (2013)

  106. Ko, J.; Shim, H.; Kim, D.; Jeong, Y.-S.; Cho, S.-J.; Park, M.; Han, S.; Kim, S.B.: Measuring similarity of android applications via reversing and K-gram birthmarking. In: Paper Presented at the Proceedings of the 2013 Research in Adaptive and Convergent Systems, Montreal, Quebec, Canada (2013)

  107. Kim, Y.; Moon, J.; Kim, D.; Jeong, Y.; Cho, S.-J.; Park, M.; Han, S.: A static birthmark of windows binary executables based on strings. In: Paper Presented at the Proceedings of the 2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (2013)

  108. Jang, M.; Kook, J.; Ryu, S.; Lee, K.; Shin, S.; Kim, A.; Park, Y.; Cho, E.H.: An efficient similarity comparison based on core API calls. In: Paper Presented at the Proceedings of the 28th Annual ACM Symposium on Applied Computing, Coimbra, Portugal

  109. Jang, M.; Kim, D.: Filtering illegal Android application based on feature information. In: Paper Presented at the Proceedings of the 2013 Research in Adaptive and Convergent Systems, Montreal, Quebec, Canada (2013)

  110. Jang, J.; Jung, J.; Kim, B.; Cho, Y.; Hong, J.: Resilient structural comparison scheme for executable objects. In: Fifth International Conference on Advances in Recent Technologies Communication and Computing (ARTCom 2013), pp. 1–5 (2013)

  111. Fukuda, K.; Tamada, H.: A dynamic birthmark from analyzing operand stack runtime behavior to detect copied software. Paper Presented at the Proceedings of the 2013 14th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (2013)

  112. Choi, J.; Han, Y.; Cho, S.-j.; Yoo, H.; Woo, J.; Park, M.; Song, Y.; Chung, L.: A static birthmark for MS windows applications using import address table. In: Paper Presented at the Proceedings of the 2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (2013)

  113. Choi, J.; Han, Y.; Cho, S.-J.; Yoo, H.; Park, M.; Han, S.; You, I.; Song, I.: A survey of feature extraction techniques to detect the theft of windows applications. In: IEEE Computer Society 2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing 2013, pp. 723–728 (2013)

  114. Chae, D.-K.; Ha, J.; Kim, S.-W.; Kang, B.; Im, E.G.: Software plagiarism detection: a graph-based approach. In: Paper Presented at the Proceedings of the 22nd ACM International Conference on Information and Knowledge Management, San Francisco, California, USA (2013)

  115. Chae, D.-K.; Kim, S.-W.; Ha, J.; Lee, S.-C.; Woo, G.: Software plagiarism detection via the static API call frequency birthmark. In: Paper Presented at the Proceedings of the 28th Annual ACM Symposium on Applied Computing, Coimbra, Portugal

  116. Cesare, S.; Xiang, Y.: Simseer and bugwise: web services for binary-level software similarity and defect detection. In: Paper Presented at the Proceedings of the Eleventh Australasian Symposium on Parallel and Distributed Computing, vol. 140, Adelaide, Australia

  117. Kim, D.; Han, Y.; Cho, S.-J.; Yoo, H.; Woo, J.; Nah, Y.; Park, M.; Chung, L.: Measuring similarity of windows applications using static and dynamic birthmarks. In: Paper Presented at the Proceedings of the 28th Annual ACM Symposium on Applied Computing, Coimbra, Portugal

  118. Zeng, Y.; Liu, F.; Chen, J.; Yan, B.: Specifying API trace birthmark by abstract interpretation. In: Du, Z. (ed.) Intelligence Computation and Evolutionary Computation: Results of 2012 International Conference of Intelligence Computation and Evolutionary Computation ICEC 2012 Held, 2012 in Wuhan, China, pp. 535–545. Springer, Berlin (2013)

  119. Jang, J.; Cho, Y.; Hong, J.: Java birthmark based on structural characteristics of programs. J. KIISE Comput. Pract. Lett. 18(11), 794–798 (2012)

    Google Scholar 

  120. Lim, H.-I.; Han, T.: Analyzing stack flows to compare java programs. IEICE Trans. Inf. Syst. E95D(2), 565–576 (2012). https://doi.org/10.1587/transinf.E95.D.565

    Article  MathSciNet  Google Scholar 

  121. Xin, Z.; Chen, H.; Wang, X.; Liu, P.; Zhu, S.; Mao, B.; Xie, L.: Replacement attacks: automatically evading behavior-based software birthmark. Int. J. Inf. Secur. 11(5), 293–304 (2012). https://doi.org/10.1007/s10207-012-0170-9

    Article  Google Scholar 

  122. Zhou, W.; Zhou, Y.; Jiang, X.; Ning, P.: Detecting repackaged smartphone applications in third-party android marketplaces. In: Paper Presented at the Proceedings of the Second ACM Conference on Data and Application Security and Privacy, San Antonio, Texas, USA (2012)

  123. Wang, Y.; Liu, F.; Gong, D.; Lu, B.; Ma, S.: CHI Based Instruction-Words Based Software Birthmark Selection. Paper presented at the Fourth International Conference on Multimedia Information Networking and Security

  124. Xu, Z.; Chen, L.; Gu, G.; Kruegel, C.: PeerPress: utilizing enemies’ P2P strength against them. In: Paper Presented at the Proceedings of the 2012 ACM Conference on Computer and Communications Security, Raleigh, North Carolina, USA (2012)

  125. Giacobazzi, R.: Software security by obscurity. In: Dua, S., Gangopadhyay, A., Thulasiraman, P., Straccia, U., Shepherd, M., Stein, B. (eds.) Information Systems, Technology and Management: 6th International Conference, ICISTM 2012, Grenoble, France, 2012. Proceedings. pp. 427–432. Springer, Berlin (2012)

  126. McMillan, C.; Grechanik, M.; Poshyvanyk, D.: Detecting similar software applications. In: Paper Presented at the Proceedings of the 34th International Conference on Software Engineering, Zurich, Switzerland (2012)

  127. Ma, L.; Wang, Y.; Liu, F.; Chen, L.: Instruction-words based software birthmark. In: Paper Presented at the Proceedings of the 2012 Fourth International Conference on Multimedia Information Networking and Security (2012)

  128. Zhang, F.; Jhi, Y.-C.; Wu, D.; Liu, P.; Zhu, S.: A first step towards algorithm plagiarism detection. In: Paper Presented at the Proceedings of the 2012 International Symposium on Software Testing and Analysis, Minneapolis, MN, USA (2012)

  129. Jang, J.; Choi, S.; Hong, J.: A method for resilient graph-based comparison of executable objects. In: Paper Presented at the Proceedings of the 2012 ACM Research in Applied Computation Symposium, San Antonio, Texas (2012)

  130. Silvio, C.; Yang, X.: Dynamic analysis. In: Software Similarity and Classification. pp. 51–56. Springer, London (2012)

  131. Cesare, S.; Xiang, Y.: Software similarity and classification. In: Springer Briefs in Computer Science. Springer, London (2012)

  132. Xin, Z.; Chen, H.; Wang, X.; Liu, P.; Zhu, S.; Mao, B.; Xie, L.: Replacement attacks on behavior based software birthmark. In: Paper Presented at the Proceedings of the 14th International Conference on Information Security, Xi’an, China

  133. Xie, X.; Lu, F.L.B.; Zhao, T.; Li, H.: A static software birthmark based on use-define chains for detecting the theft of Java programs. In: 2011 Proceedings of the International Conference on Security and Cryptography (SECRYPT), pp. 231–237 (2011)

  134. Patrick, P.F.C.; Lucas, C.K.H.; Yiu, S.M.: Dynamic software birthmark for java based on heap memory analysis. In: Paper Presented at the Proceedings of the 12th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, Ghent, Belgium (2011)

  135. Jhi, Y.-C.; Wang, X.; Jia, X.; Zhu, S.; Liu, P.; Wu, D.: Value-based program characterization and its application to software plagiarism detection. In: Paper Presented at the Proceedings of the 33rd International Conference on Software Engineering, Waikiki, Honolulu, HI, USA

  136. Chan, P.P.F.; Hui, L.C.K.; Yiu, S.M.: JSBiRTH: Dynamic JavaScript Birthmark Based on the Run-Time Heap. In: Paper Presented at the Proceedings of the 2011 IEEE 35th Annual Computer Software and Applications Conference (2011)

  137. Chaki, S.; Cohen, C.; Gurfinkel, A.: Supervised learning for provenance-similarity of binaries. In: Paper Presented at the Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, San Diego, California, USA

  138. Xie, X.; Liu, F.; Lu, B.; Chen, L.: A software birthmark based on weighted k-gram. In: 2010 IEEE International Conference on Intelligent Computing and Intelligent Systems (ICIS), pp. 400–405 (2010)

  139. Sun, G.: Software birthmark based on component dependence graph cluster. In: 2010 International Conference on Computer Application and System Modeling (ICCASM), pp. V8-288–V288-291 (2010)

  140. Sumner, W.N.; Zhang, X.: Memory indexing: canonicalizing addresses across executions. In: Paper Presented at the Proceedings of the Eighteenth ACM SIGSOFT International Symposium on Foundations of Software Engineering, Santa Fe, New Mexico, USA

  141. Alazab, M.; Venkataraman, S.; Watters, P.: Towards understanding malware behaviour by the extraction of API calls. In: Paper Presented at the Proceedings of the 2010 Second Cybercrime and Trustworthy Computing Workshop (2010)

  142. Park, H.; Lim, H-i; Choi, S.; Han, T.: Detecting common modules in java packages based on static object trace birthmark. Comput. J. 54(1), 108–124 (2009). https://doi.org/10.1093/comjnl/bxp095

    Article  Google Scholar 

  143. Park, H.; Choi, S.; Choi, S.; Han, T.: A Java birthmark based on control flow graph matching. J/ KIISE Comput. Pract. Lett. 15(11), 871–875 (2009)

    Google Scholar 

  144. Choi, S.; Park, H.; Lim, H-i; Han, T.: A static API birthmark for Windows binary executables. J. Syst. Softw. 82(5), 862–873 (2009). https://doi.org/10.1016/j.jss.2008.11.848

    Article  Google Scholar 

  145. Choi, S.; Cho, W.; Han, T.: A functional unit dynamic API birthmark for windows programs code theft detection. J. KIISE Softw. Appl. 36(9), 767–776 (2009)

    Google Scholar 

  146. Lim, H-i; Park, H.; Choi, S.; Han, T.: A method for detecting the theft of Java programs through analysis of the control flow information. Inf. Softw. Technol. 51(9), 1338–1350 (2009). https://doi.org/10.1016/j.infsof.2009.04.011

    Article  Google Scholar 

  147. Zhu, S.; Wang, X.: Protecting software from attack and theft via program analysis. Pennsylvania State University, Pennsylvania (2009)

    Google Scholar 

  148. Xinran, W.; Jhi, Y.-C.; Sencun, Z.; Peng, L.: Behavior based software theft detection. In: Paper Presented at the 16th ACM Conference on Computer and Communications Security, Chicago, Illinois, USA

  149. Wang, X.; Jhi, Y.-C.; Zhu, S.; Liu, P.: Detecting software theft via system call based birthmarks. In: Computer Security Applications Conference, 2009. ACSAC ’09. Annual, pp. 149–158 (2009)

  150. Lim, H.-I.; Park, H.; Choi, S.; Han, T.: A static Java birthmark based on control flow edges. In: Paper Presented at the Proceedings of the 2009 33rd Annual IEEE International Computer Software and Applications Conference, vol. 01 (2009)

  151. Bai, Y.; Sun, X.; Sun, G.; Deng, X.; Zhou, X.: Dynamic K-Gram Based Software Birthmark. In: Paper Presented at the Proceedings of the 19th Australian Conference on Software Engineering

  152. Sæbjørnsen, A.; Willcock, J.; Panas, T.; Quinlan, D.; Su, Z.: Detecting code clones in binary executables. In: Paper Presented at the Proceedings of the Eighteenth International Symposium on Software Testing and Analysis, Chicago, IL, USA

  153. Lim, H-i; Park, H.; Choi, S.; Han, T.: Detecting theft of Java applications via a static birthmark based on weighted stack patterns. IEICE Trans. Inf. Syst. E91D(9), 2323–2332 (2008). https://doi.org/10.1093/ietisy/e91-d.9.2323

    Article  Google Scholar 

  154. Zhou, X.; Sun, X.; Sun, G.; Yang, Y.: A combined static and dynamic software birthmark based on component dependence graph. In: Paper Presented at the International Conference on Intelligent Information Hiding and Multimedia Signal Processing

  155. Park, H.; Lim, H.-I.; Choi, S.; Han, T.: A static Java birthmark based on operand stack behaviors. In: Paper Presented at the Proceedings of the 2008 International Conference on Information Security and Assurance (isa 2008) (2008)

  156. Pesenhofer, A.; Edler, S.; Berger, H.; Dittenbach, M.: Towards a patent taxonomy integration and interaction framework. In: Paper Presented at the Proceedings of the 1st ACM Workshop on Patent Information Retrieval, Napa Valley, California, USA

  157. Mahmood, Y.; Pervez, Z.; Sarwar, S.; Ahmed, H.F.: Similarity level method based static software birthmarks. In: International Symposium on High Capacity Optical Networks and Enabling Technologies, 2008. HONET 2008. pp. 205–210 (2008)

  158. Lu, B.; Liu, F.; Ge, X.; Wang, P.: Feature n-gram set based software zero-watermarking. In: Paper Presented at the Proceedings of the 2008 International Symposiums on Information Processing (2008)

  159. Schuler, D.; Dallmeier, V.; Lindig, C.: A dynamic birthmark for java. In: Paper Presented at the Proceedings of the Twenty-Second IEEE/ACM International Conference on Automated Software Engineering, Atlanta, Georgia, USA

  160. Lu, B.; Liu, F.; Ge, X.; Liu, B.; Luo, X.: A software birthmark based on dynamic Opcode n-gram. In: Paper Presented at the Proceedings of the International Conference on Semantic Computing

  161. Choi, S.; Park, H.; Lim, H.-I.; Han, T.: A static birthmark of binary executables based on API call structure. In: Paper Presented at the Proceedings of the 12th Asian Computing Science Conference on Advances in Computer Science: Computer and Network Security, Doha, Qatar

  162. Yang, J.; Wang, J.; Li, D.: Detecting the theft of natural language text using birthmark. In: Paper Presented at the Proceedings of the 2006 International Conference on Intelligent Information Hiding and Multimedia (2006)

  163. Sager, T.; Bernstein, A.; Pinzger, M.; Kiefer, C.: Detecting similar Java classes using tree algorithms. In: Paper Presented at the Proceedings of the 2006 International Workshop on Mining Software Repositories, Shanghai, China

  164. Kakimoto, T.; Monden, A.; Kamei, Y.; Tamada, H.; Tsunoda, M.; Matsumoto, K.-I.: Using software birthmarks to identify similar classes and major functionalities. In: Paper Presented at the Proceedings of the 2006 International Workshop on Mining Software Repositories, Shanghai, China (2006)

  165. Tamada, H.; Nakamura, M.; Monden, A.; Matsumoto, Ki: Java birthmarks—detecting the software theft. IEICE Trans. Inf. Syst. E88D(9), 2148–2158 (2005). https://doi.org/10.1093/ietisy/e88-d.9.2148

    Article  Google Scholar 

  166. Yuan, L.; Qu, G.; Srivastava, A.: VLSI CAD tool protection by birthmarking design solutions. In: Paper Presented at the Proceedings of the 15th ACM Great Lakes symposium on VLSI, Chicago, Illinois, USA

  167. Myles, G.; Collberg, C.: K-gram based software birthmarks. In: Paper Presented at the Proceedings of the 2005 ACM Symposium on Applied Computing, Santa Fe, New Mexico

  168. Myles, G.; Collberg, C.: Detecting software theft via whole program path birthmarks. In: Zhang, K., Zheng, Y. (eds.) Information Security: 7th International Conference, ISC 2004, Palo Alto, CA, USA, Proceedings. pp. 404–415. Springer, Berlin (2004)

  169. Neufeld, G.: Descriptive name resolution. Comput. Netw. ISDN Syst. 23(4), 211–227 (1992). https://doi.org/10.1016/0169-7552(92)90074-Z

    Article  Google Scholar 

  170. Zhao, H.; Duan, X.: Development and experiments of a robot assisting photodynamic therapy for port wine stains. In: Paper Presented at the Proceedings of the 2011 Third International Conference on Intelligent Human-Machine Systems and Cybernetics, vol. 01 (2011)

  171. Karanam, S.; Oostendorp, Hv; Fu, W.T.: Performance of computational cognitive models of web-navigation on real websites. J. Inf. Sci. 42(1), 94–113 (2016). https://doi.org/10.1177/0165551515615842

    Article  Google Scholar 

  172. Sharafi, Z.; Soh, Z.; Guéhéneuc, Y.-G.: A systematic literature review on the usage of eye-tracking in software engineering. Inf. Softw. Technol. 67, 79–107 (2015)

    Article  Google Scholar 

  173. Spafford, E.H.; Weeber, S.A.: Software forensics: Can we track code to its authors? Comput. Secur. 12(6), 585–595 (1993). https://doi.org/10.1016/0167-4048(93)90055-A

    Article  Google Scholar 

  174. Tamada, H.; Nakamura, M.; Monden, A.; Matsumoto, K.-I.: Detecting the theft of programs using birthmarks. In: NAIST-IS-TR2003014 (2003)

  175. Derrick, G.: Protection of Computer Software: Its Technology and Application. Cambridge University Press, Cambridge (1992)

    Google Scholar 

  176. Nazir, S.: Design and Estimation of Features Based Software Birthmark. University of Peshawar, Peshawar (2015)

    Google Scholar 

  177. Aleti, A.; Buhnova, B.; Grunske, L.; Koziolek, A.; Meedeniya, I.: Software architecture optimization methods: a systematic literature review. IEEE Trans. Softw. Eng. 39, 658–683 (2013)

    Article  Google Scholar 

  178. Park, H.; Choi, S.; Lim, H.-i.; Han, T.: Detecting code theft via a static instruction trace birthmark for Java methods. In: 6th IEEE International Conference on Industrial Informatics, pp. 551–556 (2008)

  179. Park, H.; Choi, S.; Lim, H.-I.; Han, T.: Detecting Java theft based on static API trace birthmark. In: Advances in Information and Computer Security, Lecture Notes in Computer Science vol. 5312. pp. 121–135. Springer, Berlin (2008)

  180. Bai, Y.; Sun, X.; Sun, G.; Deng, X.; Zhou, X.: Dynamic K-gram based software birthmark. In: Paper Presented at the 19th Australian Conference on Software Engineering

  181. Kalaoja, J.; Niemela, E.; Perunka, H.: Feature modelling of component-based embedded software. In: Eighth IEEE International Workshop on Incorporating Computer Aided Software Engineering 1997, pp. 444–451. IEEE (1997)

  182. Wang, P.; Jin, C.; Jin, S.-W.: Software defect prediction scheme based on feature selection. In: Fourth International Symposium on Information Science and Engineering 2012, pp. 477–480 (2012)

  183. Zheng, Y.; Liu, F.; Luo, X.; Yang, C.: A method based on feature matching to identify steganography software. In: Fourth International Conference on Multimedia Information Networking and Security 2012, pp. 989–994 (2012)

  184. Guo, Y.; Wang, M.; Luo, Y.: Identifying software theft based on classification of multi-attribute features. J. Softw. 9(6), 1401–1411 (2014)

    Article  Google Scholar 

  185. Chan, P.P.F.; Hui, L.C.K.; Yiu, S.M.: Dynamic software birthmark for java based on heap memory analysis. In: Lecture Notes in Computer Science Communications and Multimedia Security, vol. 7025, pp. 94–107. Springer, Berlin (2011)

  186. Wang, Y.; Liu, F.; Gong, D.; Lu, B.; Ma, S.: CHI based instruction-words based software birthmark selection. In: Fourth International Conference on Multimedia Information Networking and Security 2012, pp. 892–895. IEEE (2012)

  187. Lim, H.-I.: Customizing k-gram based birthmark through partial matching in detecting software thefts. In: IEEE 37th Annual Computer Software and Applications Conference Workshops (COMPSACW), pp. 1–4. IEEE (2013)

  188. Nazir, S.; Shahzad, S.; Zada, I.; Khan, H.: Evaluation of software birthmarks using fuzzy analytic hierarchy process. In: Proceedings of the Fourth International Multi-topic Conference 2015, pp. 171–175 (2015)

  189. Nazir, S.; Shahzad, S.; Riza, L.S.: Birthmark-based software classification using rough sets. Arab. J. Sci. Eng. 42(2), 859–871 (2016). https://doi.org/10.1007/s13369-016-2371-4

    Article  Google Scholar 

  190. Nazir, S.; Shahzad, S.; Abid, S.B.S.: Selecting software design based on birthmark. Life Sci. J. 11(12s), 89–93 (2014)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shah Nazir.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Nazir, S., Shahzad, S. & Mukhtar, N. Software Birthmark Design and Estimation: A Systematic Literature Review. Arab J Sci Eng 44, 3905–3927 (2019). https://doi.org/10.1007/s13369-019-03718-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s13369-019-03718-9

Keywords

Navigation