π About
π License
Apache License, version 2.0.
Copyright 2017, Haruaki Tamada.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
π¨βπΌ Developers π©βπΌ
- Haruaki Tamada
β Icon of pochi
This dog logo is the craft by folding the paper (ORIGAMI). Folding procedure is shown in Genuine Origami.
In Japan, pochi is a familiar name for dogs. πΆ The project name is based on the famous phrase in the tale of “The Man who made flowers bloom.” πΈ The phrase is “dig here, bow-wow” by the pet dog of the man to detect the treasure. π The birthmark toolkit will find objects from a lot of programs. Hence, I associate the project and the dog name; then, the project name becomes pochi.
However, the correct name of the dog in the tale was SHIRO. π
πββοΈ References
π Books
- Silvio Cesare and Yang Xiang, “Software Similarity and Classification (SpringerBriefs in Computer Science),” Springer, 2012. Kindle Paperback
- Jasvir Nagra and Christian Collberg, “Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection,” Addison-Wesley Professional, 2009. Kindle Paperback
β½ Surveys
- Shah Nazir, Sara Shahzad and Neelam Mukhtar, “Software Birthmark Design and Estimation: A Systematic Literature Review,” Journal of Arabian Journal for Science and Engineering, pp 1β23, Jan 2019.
- Christian Collberg and Jasvir Nagra, “Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection,” Addison-Wesley Professional, July 2009.
πΎ Articles of supported birthmark types
- k-gram based birthmarks
- WSP (Weighted Stack Patterns)
βΎ Articles by H. Tamada
- Takanori Yokoi, and Haruaki Tamada, “A Beforehand Extraction Method for Dynamic Software Birthmarks using Unit Test Codes,” In Proc. 19th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD 2018), July 2018 (Busan, Korea). DOI10.1109/SNPD.2018.8441058
- Jun Nakamura, Haruaki Tamada, “mituba: Scaling up Software Theft Detection with the Search Engine,” Proc. International Conference on Software Engineering and Information Management (ICSIM 2018), pp.6β10, January 2018 (Casablanca, Morocco). DOI10.1145/3178461.3178475
- Takehiro Tsuzaki, Teruaki Yamamoto, Haruaki Tamada, and Akito Monden, “Scaling Up Software Birthmarks Using Fuzzy Hashing,” International Journal of Software Innovation (IJSI), Volume 5, Issue 3, pp.89β102, June 2017. DOI10.4018/IJSI.2017070107
- Jun Nakamura, and Haruaki Tamada, “Fast Comparison of Software Birthmarks for Detecting the Theft with the Search Engine,” In Proc. of the 4th International Conference on Applied Computing & Information Technology (ACIT 2016), pp.152β157, December 2016 (UNLV, Las Vegas, NV, USA). DOI10.1109/ACIT-CSII-BCD.2016.039
- Takehiro Tsuzaki, Teruaki Yamamoto, Haruaki Tamada, and Akito Monden, “A Fuzzy Hashing Technique for Large Scale Software Birthmarks,” In Proc. 15th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2016), pp.867β872, July 2016 (Oakayama, Japan). DOI10.1109/ICIS.2016.7550868
- Takesi Kakimoto, Akito Monden, Yasutaka Kamei, Haruaki Tamada, Masateru Tsunoda, and Kenichi Matsumoto, “Using Software Birthmarks to Identify Similar Classes and Major Functionalities,” In Proc. the 3rd International Workshop on Mining Software Repositories (MSR 2006), pp.171-172, May 2006. (Shanghai, China) DOI10.1145/1137983.1138026
- Haruaki Tamada, Masahide Nakamura, Akito Monden, and Ken-ichi Matsumoto, “Java Birthmarks βDetecting the Software Theftβ,” IEICE Transactions on Information and Systems, Vol.E88-D, No.9, pp.2148β2158, September 2005. DOI10.1093/ietisy/e88-d.9.2148
- Haruaki Tamada, Keiji Okamoto, Masahide Nakamura, Akito Monden, and Kenichi Matsumoto, “Dynamic Software Birthmarks to Detect the Theft of Windows Applications,” In Proc. International Symposium on Future Software Technology 2004 (ISFST 2004), CD-ROM, 20-22 October 2004. (Xiβan, China)
- Haruaki Tamada, Masahide Nakamura, Akito Monden, and Kenichi Matsumoto, “Design and Evaluation of Birthmarks for Detecting Theft of Java Programs,” In Proc. IASTED International Conference on Software Engineering (IASTED SE 2004), pp. 569-575, 17-19 February 2004. (Innsbruck, Austria)
- Haruaki Tamada, Masahide Nakamura, Akito Monden, and Kenichi Matsumoto, “Detecting the Theft of Programs Using Birthmarks,” Information Science Technical Report, number NAIST-IS-TR2003014, Graduate School of Information Science, November 2003.