과제정보
연구 과제 주관 기관 : 한국저작권위원회, 정보통신기술진흥센터
참고문헌
- P. Marshall, "Webinar: Open source component governance and management using cobit 5," Information Systems Audit and Control Association (ISACA), Jun. 2012. Available: http://www.isaca.org/Education/Online-Learning/Pages/webinars.aspx (downloaded 2014, Oct.)
- Gartner, "Predicts 2011: Open-Source Software, the Power Behind the Throne," Nov. 2010.
- M. Lee, "Free Software Foundation Files Suit Against Cisco For GPL Violations," Free Software Foundation, Dec. 2008.
- J. Garrison, "BusyBox Developers Agree To End GPL Lawsuit Against Verizon," Software Freedom Law Center, Mar. 2008.
- Protex. http://www.blackducksoftware.com/products/black-duck-suite/protex, last viewed Oct. 2014.
- Fossology. http://www.fossology.org, last viewed Oct. 2014.
- Binary Analysis Tool (BAT) website - http://www.binaryanalysis.org/en/home, last viewed Oct. 2014.
- G. Myles and C. Collberg, "k-gram Based Software Birthmarks," Proc. of the 2005 ACM Symposium on Applied Computing (SAC), pp. 314-318, Mar. 2005.
- S. Choi, H. Park, H. Lim, and T. Han, "A Static Birthmark of Binary Executables Based on API Call Structure," Proc. of the 12th ASIAN 2007, pp. 2-16. Dec. 2007.
- H. Park, S. Choi, S. Seo, and T. Han, "Analyzing Differences of Binary Executable files using Program Structure and Constant Values," Journal of KIISE : Software and Applications, Vol. 35, No. 7, pp. 452-461, Jul. 2008. (in Korean)
- H. Tamada, K. Okamoto, M. Nakamura, A. Monden, and K. Matsumoto, "Dynamic Software Birthmarks to Detect the Theft of Windows Applications," Proc. of the International Symposium on Future Software Technology 2004 (ISFST 2004), Oct. 2004.
- D. Schuler, and V. Dallmeier, "Detecting Software Theft with API Call Sequence Sets," Proc. of the 8th Workshop Software Reengineering, May 2006.
- G. Myles, and C. Collberg, "Detecting Software Theft via Whole Program Path Birthmarks," Proc. of the Information Security Conference, Sep. 2004.
- X. Zhou, X. Sun, G. Sun, and Y. Yang, "A Combined Static and Dynamic Software Birthmark Based on Component Dependence Graph," Proc. of the 4th Int'l Conf. on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), pp. 1416-1421, Aug. 2008.
- J. Choi and S. Cho, "Open Source Software Detection based on Opcode k-gram at Binary Code Level," Journal of KIISE : Computer Systems and Theory, Vol. 41, No. 1, pp. 23-32, Feb. 2014. (in Korean)
- D. Kim, S. Cho, S. Han, M. Park, and I. You, "Open Source Software Detection using Function-level Static Software Birthmark," Journal of Internet Services and Information Security (JISIS), Vol. 4, No. 4, pp. 25-37, Nov. 2014. https://doi.org/10.22667/JISIS.2014.11.31.025
- J. Jang, "Scaling Software Security Analysis to Millions of Malicious Programs and Billions of Lines of Code," Ph.D. Thesis, Carnegie Mellon University Pittsburgh, PA, 2013.
- S. Choi, W. Cho, and T. Han, "A Functional Unit Dynamic API Birthmark for Windows Programs Code Theft Detection," Journal of KIISE : Software and Applications, Vol. 36, No. 9, pp. 767-776, Sep. 2009. (in Korean)
- M. Gheorghescu, "An Automated Virus Classification System," Virus Bulletin Conference, pp. 294-300, 2005.
- J. Kinable and O. Kostakis, "Malware Classification based on Call Graph Clustering," Journal in Computer Virology, Vol. 7, No. 4, pp. 233-245, 2011. https://doi.org/10.1007/s11416-011-0151-y
- C. Kruegel, E. Kirda, D. Mutz, W. Robertson, and G. Vigna, "Polymorphic Worm Detection using Structural Information of Executables," Proc. of the 8th international conference on Recent Advances in Intrusion Detection (RAID '05), pp. 207-226, 2006.
- D. Bruschi, L. Martignoni, and M. Monga, "Detecting Self-mutating Malware using Control-Flow Graph Matching," Proc. of the Third international conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA'06), pp. 129-143, 2006.
- B. Anderson, D. Quist, J. Neil, C. Storlie, and T. Lane, "Graph-based Malware Detection using Dynamic Analysis," Journal of Computer Virology, Vol. 7, No. 4, pp. 247-258, Nov. 2011. https://doi.org/10.1007/s11416-011-0152-x
- Z. Zhao, "A Virus Detection Scheme based on Features of Control Flow Graph," Proc. of 2011 2nd International Conference on Artificial Intelligence, Management Science and Electronic Commerce (AIMSEC), pp. 943-947, 2011.
- S. Cesare and Y. Xiang, "Malware Variant Detection using Similarity Search over Sets of Control Flow Graphs," Proc. of 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 181-189, 2011.
- X. Hu, T.-c. Chiueh, and K. G. Shin, "Large-scale Malware Indexing using Function-call Graphs," Proc. of the 16th ACM conference on Computer and communications security (CCS '09), pp. 611-620, 2009.
- P.P.F. Chan and C. Collberg, "A Method to Evaluate CFG Comparison Algorithms," Proc. of 2014 14th International Conference on Quality Software, pp. 95-104, Oct. 2014.
- H. W. Kuhn, "The Hungarian Method for the Assignment Problem," 50 Years of Integer Programming 1958-2008, pp. 29-47. 2010.