Skip to main content
Article
Hunting for Pirated Software Using Metamorphic Analysis
Information Security Journal: A Global Perspective (2014)
  • Hardikkumar Rana, San Jose State University
  • Mark Stamp, San Jose State University
Abstract

In this article, we consider the problem of detecting software that has been pirated and modified. We analyze a variety of detection techniques that have been previously studied in the context of malware detection. For each technique, we empirically determine the detection rate as a function of the degree of modification of the original code. We show that the code must by substantially modified before we fail to reliably distinguish it, and we show that our results offer a significant improvement over previous related work. Our approach can be applied retroactively to existing software and does not require access to the source code, and hence it is both practical and effective.

Keywords
  • hidden Markov model,
  • HMM,
  • Metamorphic Software,
  • Singular value decomposition,
  • SVD,
  • Software piracy
Disciplines
Publication Date
2014
Publisher Statement
SJSU users: use the following link to login and access the article via SJSU databases
Citation Information
Hardikkumar Rana and Mark Stamp. "Hunting for Pirated Software Using Metamorphic Analysis" Information Security Journal: A Global Perspective Vol. 23 Iss. 3 (2014)
Available at: http://works.bepress.com/mark_stamp/4/