Masahide Nakamura

Learn More
¡¡¡¡¡¡¡ 200402.tex ABSTRACT To detect theft of Java class files efficiently, we have so far proposed a concept of Java birthmarks. Since the birthmarks are unique and native characteristics of every class file, a class file with the same birthmark of another can be easily suspected as a copy. However, performance and tolerance of the birthmarks against(More)
This paper proposes dynamic software birthmarks which can be extracted during execution of Windows applications. Birthmarks are unique and native characteristics of software. For a pair of software p and q, if q has the same birthmarks as p’s, q is suspected as a copy of p. Our security analysis showed that the proposed birthmark has good tolerance against(More)
In this paper, we present a new method to protect software against illegal acts of hacking. The key idea is to add a mechanism of self-modifying codes to the original program, so that the original program becomes hard to be analyzed. In the binary program obtained by the proposed method, the original code fragments we want to protect are camouflaged by(More)
Intelligent vehicle cooperation based on reliable communication systems contributes not only to reducing traffic accidents but also to improving traffic flow. Adaptive cruise control (ACC) systems can gain enhanced performance by adding vehicle-vehicle wireless communication to provide additional information to augment range sensor data, leading to(More)
<b>Background:</b> Software product metrics have been widely used as independent variables for constructing a fault prediction model. However, fault injection depends not only on characteristics of the products themselves, but also on characteristics of developers involved in the project. <b>Aims:</b> The goal of this paper is to study the effects of(More)
This paper presents a technique of dynamic software birthmarks to support efficient detection of software theft. A dynamic birthmark f(p, I) is a set of unique and native characteristics of a program p, obtained by executing p with a given input I . For a pair of software p and q, if f(p, I) = f(q, I) holds, q is suspected as a copy of p. In this paper, we(More)
This paper proposes to use eye movements to characterize the performance of individuals in reviewing source code of computer programs. We first present an integrated environment to measure and record the eye movements of the code reviewers. Based on the fixation data, the environment computes the line number of the source code that the reviewer is currently(More)
To detect the theft of Java class files efficiently, we propose a concept of Java birthmarks, which are unique and native characteristics of every class file. For a pair of class files p and q, if q has the same birthmark as p’s, q is suspected as a copy of p. Ideally, the birthmarks should satisfy the following properties: (a) preservation – the birthmarks(More)
This paper proposes a service-centric framework for the feature interaction problem in integrated services of the home network system (HNS). To formalize the HNS, we extensively use an object-oriented approach where each networked appliance (or the HNS environment) is modeled as an object consisting of properties and methods. Based on the model, we define(More)
This paper presents a framework to specify and verify integrated services of a home network system (HNS). We first develop a modeling language to describe the HNS and the integrated services. Complementing our previous work, the language captures each appliance as an object consisting of properties and methods, encapsulating the underlying protocols and(More)