본문 바로가기 주메뉴 바로가기
국회도서관 홈으로 정보검색 소장정보 검색

초록보기

소프트웨어 버스마크란 프로그램의 소스 코드가 없는 상태에서도 바이너리 파일로부터 추출 가능한 소프트웨어에 내재된 고유한 특징을 의미한다. 사람의 유전자처럼 유사도를 수치로 계산할 수 있기 때문에 소프트웨어 도용과 복제 여부를 판단하는데 사용할 수 있다. 본 논문에서는 유니티를 이용하여 개발된 안드로이드 애플리케이션에 대한 새로운 버스마크 기법을 제안한다. 유니티 기반 안드로이드 애플리케이션은 C# 언어를 이용하여 코드를 작성하며 프로그램의 핵심 로직은 DLL 모듈에 포함되기 때문에 일반적인 안드로이드 애플리케이션과는 다른 방법으로 접근해야한다. 본 논문에서 제안한 유니티 버스마크 추출 및 비교 시스템을 구현하여 신뢰도와 강인도를 평가하였다. 평가 결과에 의해서 유니티 버스마크 기법은 유니티 기반으로 제작된 안드로이드 애플리케이션의 코드 도용이나 불법 복제를 예방하는데 효과가 있을 것으로 기대한다.

Software birthmark refers to a unique feature inherent in software that can be extracted from program binaries even in the absence of the original source code of the program. Like human genetic information, the similarity between programs can be calculated numerically, so it can be used to determine whether software is stolen or copied. In this paper, we propose a new birthmark technique for Android applications developed using Unity. The source codes of Unity-based Android applications use C# language, and since the core logic of the program is included in the DLL module, it must be approached in a different way from normal Android applications. In this paper, a Unity birthmark extraction and comparison system was implemented, and reliability and resilience were evaluated. The use of the Unity birthmark technique proposed in this paper is expected to be effective in preventing illegal copy or code theft of the Unity-based Android applications.

권호기사

권호기사 목록 테이블로 기사명, 저자명, 페이지, 원문, 기사목차 순으로 되어있습니다.
기사명 저자명 페이지 원문 목차
(A) study on the implementation of door control unit for railway trains operable at low and high platforms Young-Seok Cho p. 1-9

Application of informer for time-series NO2 prediction Hye Yeon Sin, Minchul Kang, Joonsung Kang p. 11-18

Improving accuracy of noise review filtering for places with insufficient training data Hyeon Gyu Kim p. 19-27

Development and verification of an AI model for melon import prediction Khoeurn Saksonita, Jungsung Ha, Wan-Sup Cho, Phyoungjung Kim p. 29-37

(The) study on test standard for measuring AI literacy Mi-Young Ryu, Seon-Kwan Han p. 39-46

Research on the application of machine learning to threat assessment of combat systems Seung-Joon Lee p. 47-55

Research on selecting influential climatic factors and optimal timing exploration for a rice production forecast model using weather data Jin-Kyeong Seo, Da-Jeong Choi, Juryon Paik p. 57-65

Analysis and improvement of andola et al.'s dynamic ID based user authentication scheme Mi-Og Park p. 67-75

Efficient and secure signature scheme applicable to secure multi-party computation Myoungin Jeong p. 77-84

Design and implementation of birthmark technique for unity application Heewan Park p. 85-93

Effect of core training on dynamic posture control, lower extremity injury, and joint position sense in ski athletes Jong-Yual Kim, Woo-Young Park p. 95-102

(The) effects of major satisfaction, clinical practice satisfaction and career consciousness maturity of nursing students on job-seeking stress Jeong Hwa Han p. 103-111

Effect of mask wearing and type on cardiopulmonary resuscitation accuracy, fatigue and physiological changes Sung-Hwan Bang, Hyo-Suk Song, Gyu-Sik Shim, Hee-Jeong Ahn p. 113-120

(The) effects of the senior staff's transformational and transactional leadership on life satisfaction for the 119 ambulance workers Byung-Jun Cho, Il-Soon Choi, Tae-Hyun Lee p. 121-129

Novel database classification and life estimation model for accurate database asset valuation Youn-Soo Park, Ho-Hyun Park, Dong-Woon Jeon p. 131-143

Structural relationship of factors influencing database class satisfaction Jong Man Lee p. 145-153

Investigating the influence of ESG information on funding success in online crowdfunding platform by using text mining technique and logistic regression Kyu Sung Kim, Min Gyeong Kim, Francis Joseph Costello, Kun Chang Lee p. 155-164

(A) study on the impact of innovativeness on firm performance : focused on the mediating effect of data literacy and the moderating effect of leadership style Soo-ho Han, Ju-choel Choi p. 165-177

(A) study on China's intention to switching to shared bike platforms : mechanisms of trust and distrus Wenlong Lu, Yung Ho Suh, Sae Bom Lee p. 179-187

Cluster analysis of city-level carbon mitigation in South Korea Zhuo Li p. 189-198

참고문헌 (18건) : 자료제공( 네이버학술정보 )

참고문헌 목록에 대한 테이블로 번호, 참고문헌, 국회도서관 소장유무로 구성되어 있습니다.
번호 참고문헌 국회도서관 소장유무
1 “Unity,” https://www.unity.com 미소장
2 “Microsoft .NET Document,” https://docs.microsoft.com/dotnet/ 미소장
3 “ILdasm: IL Disassembler,” https://docs.microsoft.com/dotnet/framework/tools/ildasm-exe-il-disassembler 미소장
4 “ILSpy: .NET Decompiler with support for PDB generation, ReadyToRun, Metadata,” https://github.com/icsharpcode/ILSpy 미소장
5 “dnSpy: .NET debugger and assembly editor,” https://github.com/dnSpy/dnSpy 미소장
6 Nazir, S., Khan, H.U., “An Overview on the Identification of Software Birthmarks for Software Protection,” Lecture Notes in Networks and Systems, Vol 614, pp. 323-330, Springer, Singapore, May, 2023. DOI: 10.1007/978-981-19-9331-2_27 미소장
7 Keqing G., Shah N., Xianli K., Sadaqat ur R., “Software Birthmark Usability for Source Code Transformation Using Machine Learning Algorithms,” Scientific Programming, Vol. 2021, Article ID 5547766, 7 pages, 2021. DOI: 10.1155/2021/5547766 미소장
8 C. K. Chung and P. C. Wang, “Version-Wide Software Birthmark via Machine Learning,” IEEE Access, Vol. 9, pp. 110811-110825, 2021. DOI: 10.1109/ACCESS.2021.3103186 미소장
9 H. Tamada, M. Nakamura, A. Monden, K. Matsumoto, “Java birthmark - Detecting the software theft,” IEICE Transactions on Information and Systems, Vol.E88-D, No.9, pp.2148-2158, Sep.,2005. DOI: 10.1093/ietisy/e88-d.9.2148 미소장
10 Ginger Myles and Christian Collberg. “k-gram Based Software Birthmarks,” In Pro. of the 2005 ACM Symposium on Applied Computing, pp. 314-318, 2005. DOI: 10.1145/1066677.1066753 미소장
11 H. Park. “An Android Birthmark based on API k-gram,” KIPS Trans. on Computer and Communication Systems, Vol. 2, No. 4, pp. 177-180. Apr. 2013. DOI: 10.3745/KTCCS.2013.2.4.177 미소장
12 D. Kim, S. Cho, Y. Chung, J. Woo, J. Ko and S. Yang. “Android App Birthmarking Technique Resilient to Code Obfuscation,” The Journal of Korean Institute of Communications and Information Sciences, Vol. 40 No. 04, pp. 700-708. Apr. 2015. DOI: 10.7840/kics.2015.40.4.700 미소장
13 “Moss - A System for Detecting Software Similarity,” https://theory.stanford.edu/~aiken/moss/ 미소장
14 “JPlag - Detecting Software Plagiarism,” https://github.com/jpl ag/JPlag 미소장
15 “Unity textbook 5th edition sample files,” https://github.com/gil butITbook/080302 미소장
16 “Dotfuscator - .Net obfuscator,” https://www.preemptive.com/p roducts/dotfuscator/ 미소장
17 H. Park, H. Lim, S. Choi and T. Han, “Detecting Common Modules in Java Packages Based on Static Object Trace Birthmark,” The Computer Journal, Vol. 54, No. 1, pp. 108-124, Jan. 2011. DOI: 10.1093/comjnl/bxp095 미소장
18 “IL2CPP Overview,” https://docs.unity3d.com/2021.3/Documen tation/Manual/IL2CPP.html 미소장