that the proposed birthmark had quite a good tolerance for program optimization (97.30%). Key Words: birthmark, software theft, Java, class files, watermarking.
NAIST-IS-TR2003014 ISSN 0919-9527
INFORMATION SCIENCE TECHNICAL REPORT
Detecting the Theft of Programs Using Birthmarks
Haruaki Tamada, Masahide Nakamura, Akito Monden, Ken-ichi Matsumoto November 2003
Ӣ 630-0101 ௭⏠ᶗᰲ⾇⿵නᱍ 8916-5 ௭⏠ܡỊᆭ⛋ⶓ ၬୈỊḁἦỊ
Graduate School of Information Science Nara Institute of Science and Technology 8916-5 Takayama, Ikoma, Nara 630-0101, Japan
!" ### "$
"" Æ !% & "" " ' % % !% &( " " ) & * + + % & % + * ( , + ' + & - ' + ".( ' )" ' % " " ( & )" ' " " + " & " !% "" -/(0.( )" ' ' " " + *
"
"1 -/(0.(
!
"
#
$ % & % & ' ( )*Æ +,- % . & /012 # ' ( 3,4
3,4 3,4 /52 , 3,4 % ( /62& ! Æ '
7 8 Æ # ( *
% /112& Æ !
Æ (
! 8
( ! ( .
7 ! 9 # 8 ( Æ # $ 8 : ( (
5; % & $ ?@A4 " ! ( . %& . B . 5; C=>
8 /D ; 1D 15 0= 002 E : /1D 15 0=2 @
/002 # * F % & : /D ;2 8 $ ! ( !
Æ
! $ #
8 Æ 8 /1 C G 162 7 8 8 8 /< 0C 0G2 8 8
! "
( ' ( $ %& ( %& %&
# 8 #
$% & "
( ( 9 %& "
%& H % &
7
'
%&
" %&
!
%& % ( & %& H % & @ 1 ( 8 ( 8 ( @ 0
%& % & 7
( ) ' %& H % & ( * ' %& H % & %& H % & @ 0 F 0 %& H % & ' , 1 : 8 * 8 /;2 * % & , 1
( , 1 * , 0 $ 7 ( ! ( ¼
¼
¼
9 7
' ( %& % & ( %& % & ' %& % & 7 ( $ %@I'I& ! "
%# @& %!#& %"@& ' 7 ! #
( ! #
! ' ' 1 (
# $ # #$#
B E ! . E .
% #$# ½ ¾ + %1 &
%1 &
,
-. "
%% ½ ½& % ¾ ¾& % && /0#0
%&
@I'I ' 1 $ % ) -& % &
&! " '
&'
" ' 0#F E # : 8 Æ 8
8
7 8 7
&'
' ½ ¾
1 '
"
%½ ¾ & &2/
%& # @ ' 1 $ !
" # # $% &" %# &" %# # &" %# ' ( ) # $% ) ) ) ) ) ) ) * % +, ) +, # # # $% " - &"
%,
&
( & (&
E A ( &" &" 8 8 8 8 # 8 8 ) (& ' ½ ¾
½ H %0 & ½ 3 43 ,
-. "
% ¾ ¿ & ,&
,& !# ' 1 $
* #% &"
* *
% & ( (
8 + *
' 1
½ ¾ % & "
%½ ¾ & 5/
5/ "@ ' 1 $ &" %# * % # +,
) % ) +,
% & " A 8 # %& H %½ & % & H % ½ & ? %& % & % %& H % && 7 H %1 & ! 7 %& H % & %& % &
8
, & %& H %½ & % & H % ½ &
% &1
H %1 & " %& % & 1== %& % & % 8 &
: " /1" ; : ( 23 "
$ ; " -2. 3 / 3( ,) ( ? 5( 8 9 + : ( 2 5;8 :