Learn More
¡¡¡¡¡¡¡ 200402.tex ABSTRACT To detect theft of Java class files efficiently, we have so far proposed a concept of Java birthmarks. Since the birthmarks are unique and native characteristics of every class file, a class file with the same birthmark of another can be easily suspected as a copy. However, performance and tolerance of the birthmarks against(More)
This paper proposes dynamic software birthmarks which can be extracted during execution of Windows applications. Birth-marks are unique and native characteristics of software. For a pair of software p and q, if q has the same birthmarks as p's, q is suspected as a copy of p. Our security analysis showed that the proposed birthmark has good tolerance against(More)
This paper presents a framework to specify and verify integrated services of a home network system (HNS). We first develop a modeling language to describe the HNS and the integrated services. Complementing our previous work, the language captures each appliance as an object consisting of properties and methods, encapsulating the underlying protocols and(More)
This paper proposes to use eye movements to characterize the performance of individuals in reviewing source code of computer programs. We first present an integrated environment to measure and record the eye movements of the code reviewers. Based on the fixation data, the environment computes the line number of the source code that the reviewer is currently(More)
This paper presents a method to implement integrated services of networked home electric appliances, which provide more convenient and comfortable living for home users. The conventional methods generally employ a home server to achieve the integrated services. The server controls all the networked appliances in a centralized manner. However, as the number(More)
This paper presents a technique of dynamic software birthmarks to support efficient detection of software theft. A dynamic birthmark f (p, I) is a set of unique and native characteristics of a program p, obtained by executing p with a given input I. For a pair of software p and q, if f (p, I) = f (q, I) holds, q is suspected as a copy of p. In this paper,(More)
In this paper, we present a new method to protect software against illegal acts of hacking. The key idea is to add a mechanism of self-modifying codes to the original program, so that the original program becomes hard to be analyzed. In the binary program obtained by the proposed method, the original code fragments we want to protect are camouflaged by(More)