* If you want to update the article please login/register
Since there are a substantial number of programs in the world, it's very difficult to detect the rogue applications. Based on the applications' runtime behavior, the dynamic software birthmarks were created to identify plagiarism perpetrators based on the programs' runtime behavior. The detection procedure for the dynamic birthmarks is based on extraction, analysis, and comparison phases. Hence, this paper seeks to minimize the extraction time without having understanding of the applications by using unit tests. We investigated the reliability and stability of the proposed method's dynamic birthmarks.
Source link: https://doi.org/10.2991/ijndc.2018.6.4.5
Abstract: The aim of this paper is to investigate the effects of turning-Q laser in combination with topical Chuangfukang collagen mask to improve facial appearance, the greenish brown birthmark region, and the color depth of patients with facial greenish brown birthmarks. The reduction of the area of facial brownish brown birthmark in the experimental group's first week after treatment was more significant than that in the control group. The use of turning-Q laser in conjunction with topical Chuangfukang collagen mask in the treatment of facial whiteish brown birthmark can dramatically enhance the clinical performance and appearance.
Source link: https://doi.org/10.1590/fst.39720
Software birthmark Software is a special feature of malware detection that can detect software hijacking. We can determine whether a program or application is a copy of another if we compare birthmarks of software, which can tell us whether a program or app is a copy of another. In this paper, a new approach is introduced to analyze and estimate software birthmark based on the two most sought-after characteristics of birthmarks, namely, credibility and durability. For this purpose, the notion of soft computation such as probabilistic and fuzzy computing has been factored in, and fuzzy logic is used to determine birthmark properties.
Source link: https://doi.org/10.1155/2015/579390
By using bogus code-signing certificates, a malware could bypass software verification of operating systems and security applications. In this paper, we explore the credibility of applications with multiple-version executable files without relying on public key infrastructure, where a new-version executable file is usually built incrementally based on previous versions. Our project makes a cross-version software birthmark for executable files of the same application. The proposed software birthmark is a binary-classification scheme for a machine learning algorithm based on imported and exported function names extracted from different-version executable files, according to the underlying machine learning algorithm. The results show that a new software birthmark would effectively identify the executable files' derivations. Proposed software birthmarks can be used by operating systems or security applications to determine the validity of executable files with suspicious certificates.
Source link: https://doi.org/10.1109/ACCESS.2021.3103186
A source code of a program can be improved by seeing any operation for creating another or close to the same product. Source code conversion is a way in which source code of a program is changed. Several methods are being used for source code conversion and code obfuscation. Researchers attempted to solve the issue of modifying the source code and preventing it from being changed by the people who want to change the source code. Software birthmark was one of the first attempts to detect software piracy that exists in the applications among the current methods, according to one of the others. U201d is a registered trademark of the software. u201d These extracted functionality can be detected in the application, allowing for the detection of piracy. u201d Any modification or update will be made to software by the usability of a software birthmark, which will permanently protect software and maintain ownership of applications.
Source link: https://doi.org/10.1155/2021/5547766
* Please keep in mind that all text is summarized by machine, we do not bear any responsibility, and you should always check original source before taking any actions