天地网远程教育关键技术、系列产品及其应用.ppt
《天地网远程教育关键技术、系列产品及其应用.ppt》由会员分享,可在线阅读,更多相关《天地网远程教育关键技术、系列产品及其应用.ppt(36页珍藏版)》请在淘文阁 - 分享文档赚钱的网站上搜索。
1、Plagiarism Detection for Multithreaded Software Based on Thread-Aware Software BirthmarksZhenzhou TMOE Key Lab for Intelligent Networks and Network SecurityXian Jiaotong University, China2022-5-312Outline1.Introduction2.Thread-Aware Birthmark Methods3.Evaluation4.Unsolved Problems & Future Work3Intr
2、oductionSoftware plagiarism has been a serious threat to the healthy development of software industryViolate licenses for commercial interests or unwittinglyWeak code protection awarenessPowerful automated code obfuscation toolsDistributed in binary form4IntroductionnA series of methods are proposed
3、 for plagiarism detectionSoftware WatermarkingInsert extra data“a sufficiently determined attacker will eventually be able to defeat any watermark”Static and Dynamic Software BirthmarksDynamic birthmarks are more resilient to semantic-preserving code obfusctions5IntroductionnA series of methods are
4、proposed for plagiarism detectionSoftware WatermarkingStatic and Dynamic Software BirthmarksnIncreasingly popular trend towards multithreaded programming brings new challenge to existing dynamic birthmark methodsExisting dynamic birthmark remain optimized for sequential programsNeglect the effect of
5、 thread schedulingTwo executions of a single program under same input can be very different, rendering the existing methods ineffective!knnknk6IntroductionDKISBSCSSBCosine0.8380.452Jaccard0.5510.369Dice0.6780.51Containment0.7350.477p DKISB: dynamic key instruction sequence birthmarkp SCSSB: system c
6、all short sequence birthmark7IntroductionContributions:Two thread-aware dynamic birthmarks TW-DKISB and TW-SCSSB are proposed to detect software plagiarismOperates directly on binary executablesNot limited to specific operating systems and languagesResilient to various automated obfuscation techniqu
7、es29 different obfuscation techniques in SandMarkArrayFolderArraySplitterBlockMarkerBludgeonSignaturesBooleanSplitterBranchInverterDuplicateRegistersDynamicInlinerFalseRefactorFieldAssignmentInlinerIntegerArraySplitterMergeLocalIntegersMethodMergerObjectifyOpaqueBranchInsertionOverloadNamesParamAlia
8、sPromotePrimitiveRegistersPromotePrimitiveTypesPublicizeFieldsRandomDeadCodeRenameRegistersReorderInstructionsReorderParametersSimpleOpqauePredicatesSplitClassesStaticMethodsBodiesVariableReassigner0.00.20.40.60.81.0 Similarity8IntroductionContributions:A prototype is implemented using the Pin instr
9、umentation framework, and extensive experiments are conducted.A suite of benchmarks is compiled for researchers to conduct experiments and present their findingshttp:/ 9Outline1.Introduction2.Thread-Aware Birthmark Methods3.Evaluation4.Unsolved Problems & Future Work10A set of characteristics extrac
10、ted from a program that reflects intrinsic properties of the program, and which can be used to identify the program uniquely.Two types: Static and Dynamic software birthmarksDynamic birthmark defined by MylesSoftware Birthmark11Thread-Aware Dynamic Software BirthmarkPredetermining a thread schedule
11、is very difficultTry to shield their influence on executions instead of enforcing thread schedule12Thread-Aware Dynamic Software BirthmarkspMain Idea: Split then AggregateExecution order in each thread is relatively stable. Projecting the trace on thread-ids to obtain sub-traces to extract Slice bir
12、thmarksAggregating all slice birthmarks.Different traces of a program under the same inputSame slices13Slice Birthmark & Program BirthmarkK-GramSlice BirthmarksSAMSSM14Thread-Aware Birthmark based Plagiarism Detection5 main modules:DAM: monitoring and recordingPP: constitute valid tracesBG: extract
13、thread-aware birthmarksBSC: calculate similarity scoresPD: determine detection result15Thread-Aware Birthmark based Plagiarism Detection5 main modules:DAM: monitoring and recordingPP: constitute valid tracesBG: extract thread-aware birthmarksBSC: calculate similarity scoresPD: determine detection re
14、sult16Dynamic Analysis ModuleMonitoring the execution of a program using PinDKISExtractor: performs dynamic taint analysis to identify and record key instructionsSysTracer: record each execution of system calls17Thread-Aware Birthmark based Plagiarism Detection5 main modules:DAM: monitoring and reco
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 天地 远程教育 关键技术 系列产品 及其 应用
限制150内