CN106951743A - A kind of software code infringement detection method - Google Patents
A kind of software code infringement detection method Download PDFInfo
- Publication number
- CN106951743A CN106951743A CN201710171531.0A CN201710171531A CN106951743A CN 106951743 A CN106951743 A CN 106951743A CN 201710171531 A CN201710171531 A CN 201710171531A CN 106951743 A CN106951743 A CN 106951743A
- Authority
- CN
- China
- Prior art keywords
- code
- information
- infringement
- code block
- local
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000001514 detection method Methods 0.000 title claims abstract description 85
- 230000005540 biological transmission Effects 0.000 claims abstract description 3
- 238000013507 mapping Methods 0.000 claims description 11
- 239000000284 extract Substances 0.000 claims description 7
- 238000000605 extraction Methods 0.000 claims description 6
- 238000012545 processing Methods 0.000 claims description 4
- 238000000354 decomposition reaction Methods 0.000 claims description 3
- 238000007596 consolidation process Methods 0.000 claims description 2
- 238000000034 method Methods 0.000 abstract description 11
- 230000008520 organization Effects 0.000 abstract description 7
- 238000006243 chemical reaction Methods 0.000 abstract description 2
- 239000003795 chemical substances by application Substances 0.000 description 25
- 230000000694 effects Effects 0.000 description 5
- 238000005516 engineering process Methods 0.000 description 4
- 230000009286 beneficial effect Effects 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 239000012634 fragment Substances 0.000 description 2
- 238000007689 inspection Methods 0.000 description 2
- 238000010606 normalization Methods 0.000 description 2
- 230000007547 defect Effects 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 235000013399 edible fruits Nutrition 0.000 description 1
- 230000008030 elimination Effects 0.000 description 1
- 238000003379 elimination reaction Methods 0.000 description 1
- 238000005259 measurement Methods 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
- G06F21/125—Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
The present invention relates to a kind of infringement detection method of software code, specifically include detection service device and local detection positioned at high in the clouds and act on behalf of two parts.Therebetween transmission and server end storage be all transformed software code key feature information rather than software code primitive form.High in the clouds detection service device is responsible for the code characteristic Sample Storehouse for detection of encroaching right and detected according to rule of encroaching right, and local detection agency is responsible for extracting and generating the key feature of software code, reports information to be localized deciphering to cloud server and to the infringing information that cloud server is issued.What is transmitted beyond the clouds between detection service device and local agent due to this method is information by conversion, provides source code without software owner, can carry out infringement detection across organizational boundary.Cloud server positioned at center can cross over organizational boundary, safeguard a set of independent Sample Storehouse without each software development organization, reduce the cost of software development organization, the infringement detectability of whole internet rank can be reached using this method.
Description
Technical field
The present invention relates to a kind of microcomputer data processing, more particularly to a kind of infringement detection method of software code.
Background technology
The infringement detection of software code has important realistic meaning, can avoid knowledge with helper applications development organizations
The related legal risk of property right.
The developer of software development organization often gets used to from existing code for the purpose for improving development efficiency
It is multiplexed some codes.But, this behavior be sometimes it is feasible, sometimes again be infeasible, if it is feasible depend on be replicated
Code licensing situation.Particularly Open Source Code, licensing species is various, and the constraint of every kind of licensing is all different, blindly
Multiplexing software be likely to the risk that serious law is brought for enterprise.If for example, the developer of certain enterprise is accidentally
Using or extend and follow the codes of GPL copyrights, according to GPL licensing specification, the enterprise is all and this is code dependent
Other codes also all must comply with GPL specifications, towards the public entire disclosure, and this may cause irremediable damage to the enterprise
Lose.
Because software developer is numerous, software code substantial amounts, and the quantity of open source software is even more to count to be unequal to
Number, licensing situation has extremely complex, and various risk of infringement are carried out with inspection by hand and is nearly impossible.It therefore, it can inspection
Survey and report that the method and system of potential software piracy risk just seems very necessary.
Existing software code infringement detection method is required for the source code of party to be detected's offer program.Wherein use
Technology has two classes:Detection technique based on statistics of attributes and the detection technique based on structure measurement.Statistical technique based on attribute
The information such as operator, operand in statistical software code, then calculate their average value, median, standard deviation etc., then
Contrast the sample in sample to be detected and Sample Storehouse.Due to being global statistics data, this detection method defect is larger, only exists
Infringement could be found in the case of code in software code and Sample Storehouse is almost on all four, and it is impracticable.Based on degree of structuration
The technology of amount is a subset that code repeats detection method.Which includes text based method, based on abstract syntax tree
Method, method based on program dependency graph etc..The repetition for aiming at discovery software code of these methods, is not special
For infringement detection design, thus also consider the feature extraction problem relevant with infringement detection, Sample Storehouse set up problem with
And Commercial Secret Protection problem.
In practice, the primary limitation that above-mentioned local infringement detection method is brought comes from the conflict of following two aspects:
If software organization uses third party's service, source code to be detected must be just provided.This is likely to result in enterprise technology secret and let out
Dew.If software organization determines that oneself sets up a detecting system according to above-mentioned local infringement detection method, need to set up and advise
The huge global Sample Storehouse of mould, for example, collect the Open Source Code of whole internet rank, and cost is huge.
The content of the invention
Great amount of samples is needed the present invention be directed to code infringement detection, while need to protect the business secret of software organization again
A kind of detection method that problem is proposed.
The technical scheme is that:A kind of infringement detection method of software code, it is characterised in that:Including high in the clouds detection
Server and local agent system two parts, what transmission and server end were stored is all the transformed pass of code therebetween
Key characteristic information.Wherein, detection service device in high in the clouds is responsible for the code characteristic Sample Storehouse detected for encroaching right and according to infringement
Rule is detected that local agent system is responsible for extracting the key feature of software code, reports information to high in the clouds detection service device
And the infringing information issued to high in the clouds detection service device is localized deciphering;
Local agent system includes code parser, three parts of code characteristic maker and local mapping table.Wherein, code
Resolver is responsible for the detected code of parsing, produces code block message;Code characteristic maker is responsible for producing and code block is unique
Corresponding code characteristic information, in practice using code block identifier, positional information, structural information and code block hash letter
Breath defines this feature;Local mapping table safeguards the correspondence pass uploaded between the code of cloud server and local source code
System, is the code that can be read in local parsing when cloud server passes infringing information corresponding with code block identifier back
Infringing information;
Cloud server includes code parser, code characteristic maker, global characteristics information table and infringement detecting and alarm four
Individual part.The function phase of wherein code parser and code characteristic maker and local agent system is same.Global characteristics information table
Store the characteristic information in the code sample storehouse for detection.Detecting and alarm of encroaching right contrasts global characteristics information table and local agent
The code block message of upload judges code block infringement feature, if it find that characteristic matching, is just marked as infringement, then by this
Information is sent to local agent system, transfers to local agent system to be parsed and reported.
The described code infringement detection method, specific detecting step includes:
Step one, global characteristics information table is built:Code sample storehouse is obtained, high in the clouds detection service device is successively read the source of Sample Storehouse
Code file, then according to the form of syntax tree, each code file is parsed into the code block of one group of tree structure, and will generation
Code block information record is into global characteristics information table.The positional information of each code block record code block, structural information and
Code block hash information.In practice, code analysis can use abstract syntax tree resolver to complete.Positional information can be used such as
Lower information consolidation is described:Affiliated project, filename, original position, final position information.This code can be used in structural information
The incidence relation description of block and parent code block.Code block hash characteristic information, which can be used, code is normalized rear corresponding text
This hashed value description;
Step 2, extracts local code feature:Local agent system reads in source code to be detected, using with high in the clouds detection service
Device identical characteristics information extraction method, decomposition source code is code block, and extract the positional information of code block, structural information and
Code block hashes characteristic information, into step 3;
Step 3, sets up local mapping table:Local agent system is locally-unique for each code block distribution obtained in step 2
Identifier, the incidence relation of the identifier and the corresponding source code of code block is set up, for subsequent step seven.Subsequently into
Step 4;
Step 4, sends detection request:Local code characteristic information and code block that local agent system obtains step 2
Identifier upload to high in the clouds detection service device together, request high in the clouds detection service device carries out infringement detection;
Step 5, high in the clouds detection service device receives the code block message that transmits of local agent system, and by the code block message and
Global characteristics information table is compared according to infringement rule.In practice, infringement rule can be repeated or code knot based on hashed value
The statistical conditions that the corresponding hashed value of structure is repeated are defined.If the characteristic information and global characteristics of the code to be detected uploaded
Characteristic information in storehouse belongs to infringement according to infringement rule, then records the information.After the completion for the treatment of that all code blocks are detected, into step
Rapid six;
Identifier labeled as the code block of infringement is issued to local agent system by step 6, high in the clouds detection service device;
Step 7, local agent system receives the infringement code block message that high in the clouds detection service device is passed back, uses local mapping table
Local visible code is reduced into, shown, notify that required processing is acted.
Invention effect and effect:
The beneficial effects of the present invention are:Software code infringement detection method of the present invention, the generation to be detected without providing
The primitive form of code, protects business secret;Expand the scope of the Sample Storehouse of software code infringement detection, it might even be possible to reach whole
The detectability of individual internet rank.
Brief description of the drawings
Fig. 1 is the structure explanation of software code infringement detection method of the present invention;
The step of Fig. 2 is software code infringement detection method of the present invention illustrates;
Fig. 3 is an example fragment of the global characteristics information bank of embodiments of the invention;
Fig. 4 is the code block analysis result of the local agent of embodiments of the invention;
Fig. 5 is the code characteristic information of the local agent of embodiments of the invention;
Embodiment
In order that technological means, creation characteristic, reached purpose and effect that the present invention is realized are easy to understand, below
Embodiment combination accompanying drawing is specifically addressed to the principle steps of software code infringement detection method of the present invention, using effect.
The present embodiment includes high in the clouds detection service device and local agent system two parts.
High in the clouds detection service device is responsible for the code characteristic Sample Storehouse for detection of encroaching right and carried out according to infringement rule
Detection.Cloud server includes code parser, code characteristic maker, global characteristics information table and infringement detecting and alarm four
Individual part.
Local agent system is responsible for extracting the characteristic information of software code, reports information to high in the clouds detection service device and right
The deciphering that the infringing information that high in the clouds detection service device is issued is localized.Local agent system includes code parser, code
Three parts of feature generator and local mapping table.Wherein code parser, the function of code characteristic maker and realization side
Method and high in the clouds detection service device corresponding part are completely the same.
Step S1, builds global characteristics information table.Open source software code library of the present embodiment based on internet rank is to complete
Office's characteristic information table is built.The code file in Open Source Code storehouse is obtained first, then carries out the code file successively
Following processing:
Code structure is parsed:Program source code is resolved to by code block structure by abstract syntax tree, then using code block as
The elementary cell of subsequent analysis detection, then extracts its positional information and structural information respectively.Define the code block after parsing
Positional information is a five-tuple:(SegmentId, fileId, startLine, endLine, sequence).Wherein
SegmentId is a globally unique identifier, and each identifier identifies a code block.FileId defines the code block
The document location at place, is similarly represented using GUID.StartLine is the starting of code block hereof
OK.EndLine is the termination row of code block hereof.Sequence is the order for the code block for belonging to a father node.
The structural information of code block after definition parsing is two tuples:(segmentId, parentSegmentId).Wherein
SegmentId is identical with aforementioned definitions, and parentSegmentId is the identifier of code block father node, for finding out father node;
Code block hashes feature extraction:The code hash feature extraction of the present embodiment includes normalization and cryptographic Hash calculates two steps
Suddenly.Normalization includes removing space, variable name and digital two steps is replaced with consistent symbol, elimination due to code format,
The different influences to Detection results of the factors such as variable name.Then, MD5 hash algorithms are used on normalized code, are every
Individual node generates the cryptographic Hash of one 128.Fig. 3 is a fragment of the global characteristics information table obtained by above step,
Including project information, license information, positional information, structural information and hash characteristic information;
Step S2, extracts local code feature.Local agent system reads in source code to be detected, using with high in the clouds detection service
Device identical characteristics information extraction method, decomposition source code is code block, and extract the positional information of code block, structural information and
Fingerprint feature information.The method and steps S1 of this step is identical.Fig. 4 is a file by being obtained after source code resolver
Code block analysis result, represented using tree structure.Fig. 5 is the position of the code block of the code to be detected obtained by this step
Confidence breath, structural information and hash characteristic information;
Step S3, sets up local mapping table.Local agent system is set up using each code block identifier obtained in step S2
The identifier and the incidence relation of the corresponding source code of code block, include the filename and positional information of original place file;
Step S4, sends detection request:Local agent system is by the step S2 local code characteristic informations obtained and code block
Identifier together, constitute a code block characteristic information sequence, upload to high in the clouds detection service device together, the detection of request high in the clouds
Server carries out infringement detection.The code block message of upload does not include any source code information;
Step S5, high in the clouds detection service device receives the code block message that transmits of local agent system, and by the code block message and
Global characteristics information table is compared according to infringement rule.The present embodiment takes two kinds of infringement detected rules to carry out infringement detection:
Rule one:Contrast the hash feature of code block, and comprehensive code block line number and statistical information:If code block hashes feature
Repeat completely and code block line number more than 10 rows and the hash feature, the frequency of occurrences in Sample Storehouse project is less than 3 times, then judge
For infringement.In the characteristic that Fig. 3 and Fig. 5 are represented, the hash characteristic value of the row of overstriking is identical, therefore detecting and alarm can judge to treat
The numbering of detection code is that the N3-N5 of 122 files is infringement code.This testing result explanation, although detecting and alarm can be accurate
Ground judges infringement, but to be related to business secret for significant all not comprising source code of any data for being relied on of whole detection process
Close information;
Rule two:Contrast the hash feature of code block, and the regional statistical information of comprehensive father node code block.If same father's knot
The quantitative proportion in having under point and Sample Storehouse with the code block for repeating hashed value exceedes certain threshold value, in the present embodiment
50% is defined as, then is determined as infringement.Do not find to meet the code block of above-mentioned infringement feature in this example, then not report;
Actually implement in be not limited to above two infringement detected rule, and can comprehensively using code block positional information,
Structural information and hash feature expand detected rule;
Step S6, high in the clouds detection service device is in the present embodiment 122 files by labeled as the identifier of the code block of infringement
N3-N5 code blocks, are issued to local agent system;
Step S7, local agent system receives the infringement code block message that high in the clouds detection service device is passed back, uses local mapping table
Local visible code is reduced into, is shown.
The effect of embodiment and beneficial effect
The software code infringement detection method provided according to the present embodiment, can be achieved the infringement detection system based on cloud service
System, it is advantageous that:What is transmitted beyond the clouds between server and local agent system is the code hash feature by conversion, from
In can not recover the primitive form of code.The code hash feature can support various infringement detected rules completely, and detection is imitated
Fruit does not influence.Therefore, different software development organizations can share same detecting system, while need not provide this tissue again
The primitive form of code.Both the business secret of software organization had been protected, the Sample Storehouse of software code infringement detection is in turn ensure that
Scope.
Claims (2)
1. a kind of infringement detection method of software code, it is characterised in that:
Including high in the clouds detection service device and local agent system two parts, what transmission and server end were stored therebetween is all
Transformed code key feature information;Wherein, detection service device in high in the clouds is responsible for the code characteristic sample for detection of encroaching right
Simultaneously detected that local agent system is responsible for extracting the key feature of software code, reports information to arrive according to infringement rule in this storehouse
High in the clouds detection service device and the infringing information issued to high in the clouds detection service device are localized deciphering;
Local agent system includes code parser, three parts of code characteristic maker and local mapping table;Wherein, code
Resolver is responsible for the detected code of parsing, produces code block message;Code characteristic maker is responsible for producing and code block is unique
Corresponding code characteristic information, in practice using code block identifier, positional information, structural information, code block hash information
Define this feature;Local mapping table safeguards the correspondence uploaded between the code identifier of cloud server and local source code
Relation, is the generation that can be read in local parsing when cloud server passes infringing information corresponding with code block identifier back
Code infringing information;
Cloud server includes code parser, code characteristic maker, global characteristics information table and infringement detecting and alarm four
Individual part;The function phase of wherein code parser and code characteristic maker and local agent system is same;Global characteristics information table
Store the characteristic information in the code sample storehouse for detection;Detecting and alarm of encroaching right contrasts global characteristics information table and local agent
The code block message of upload judges code block infringement feature, if it find that characteristic matching, is just marked as infringement, then by this
Information is sent to local agent system, transfers to local agent system to be parsed and reported.
2. the infringement detection method of software code according to claim 1, it is characterised in that specific detecting step is as follows:
Step one, global characteristics information table is built:Code sample storehouse is obtained, high in the clouds detection service device is successively read the source of Sample Storehouse
Code file, then according to the form of syntax tree, each code file is parsed into the code block of one group of tree structure, and will generation
Code block information record is into global characteristics information table;The positional information of each code block record code block, structural information and
Code block hash information;In practice, code analysis can use abstract syntax tree resolver to complete;Positional information can be used such as
Lower information consolidation is described:Affiliated project, filename, original position, final position information;This code can be used in structural information
The incidence relation description of block and parent code block;Code block hash characteristic information, which can be used, code is normalized rear corresponding text
This hashed value description;
Step 2, extracts local code feature:Local agent system reads in source code to be detected, using with high in the clouds detection service
Device identical characteristics information extraction method, decomposition source code is code block, and extract the positional information of code block, structural information and
Code block hashes characteristic information, into step 3;
Step 3, sets up local mapping table:Local agent system is locally-unique for each code block distribution obtained in step 2
Identifier, the incidence relation of the identifier and the corresponding source code of code block is set up, for subsequent step seven;Subsequently into
Step 4;
Step 4, sends detection request:Local code characteristic information and code block that local agent system obtains step 2
Identifier upload to high in the clouds detection service device together, request high in the clouds detection service device carries out infringement detection;
Step 5, high in the clouds detection service device receives the code block message that transmits of local agent system, and by the code block message and
Global characteristics information table is compared according to infringement rule;In practice, infringement rule can be repeated or code knot based on hashed value
The statistical conditions that the corresponding hashed value of structure is repeated are defined;If the characteristic information and global characteristics of the code to be detected uploaded
Characteristic information in storehouse belongs to infringement according to infringement rule, then records the information;After the completion for the treatment of that all code blocks are detected, into step
Rapid six;Identifier labeled as the code block of infringement is issued to local agent system by step 6, high in the clouds detection service device;Step
Rapid seven, local agent system receives the infringement code block message that high in the clouds detection service device is passed back, is reduced into using local mapping table
Local visible code, is shown, notifies that required processing is acted.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710171531.0A CN106951743A (en) | 2017-03-22 | 2017-03-22 | A kind of software code infringement detection method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710171531.0A CN106951743A (en) | 2017-03-22 | 2017-03-22 | A kind of software code infringement detection method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106951743A true CN106951743A (en) | 2017-07-14 |
Family
ID=59473594
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710171531.0A Pending CN106951743A (en) | 2017-03-22 | 2017-03-22 | A kind of software code infringement detection method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106951743A (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108229170A (en) * | 2018-02-02 | 2018-06-29 | 中科软评科技(北京)有限公司 | Utilize big data and the software analysis method and device of neural network |
CN110955758A (en) * | 2019-12-18 | 2020-04-03 | 中国电子技术标准化研究院 | Code detection method, code detection server and index server |
CN110989991A (en) * | 2019-10-25 | 2020-04-10 | 深圳开源互联网安全技术有限公司 | Method and system for detecting source code clone open source software in application program |
CN111552504A (en) * | 2020-07-13 | 2020-08-18 | 深圳开源互联网安全技术有限公司 | Asset information maintenance method and device of open source assembly and storage medium |
CN114064116A (en) * | 2020-07-30 | 2022-02-18 | 华为技术有限公司 | Software detection method and device |
CN115080924A (en) * | 2022-07-25 | 2022-09-20 | 南开大学 | Software license clause extraction method based on natural language understanding |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101697121A (en) * | 2009-10-26 | 2010-04-21 | 哈尔滨工业大学 | Method for detecting code similarity based on semantic analysis of program source code |
CN101894236A (en) * | 2010-07-28 | 2010-11-24 | 北京华夏信安科技有限公司 | Software homology detection method and device based on abstract syntax tree and semantic matching |
CN103020494A (en) * | 2012-12-03 | 2013-04-03 | 哈尔滨工业大学 | Program code programming mode copyright ownership detecting model and copyright ownership detecting method |
CN103262047A (en) * | 2010-12-15 | 2013-08-21 | 微软公司 | Intelligent code differencing using code clone detection |
CN103577323A (en) * | 2013-09-27 | 2014-02-12 | 西安交通大学 | Dynamic key command sequence birthmark-based software plagiarism detecting method |
US20140053285A1 (en) * | 2012-08-16 | 2014-02-20 | Infosys Limited | Methods for detecting plagiarism in software code and devices thereof |
CN103729580A (en) * | 2014-01-27 | 2014-04-16 | 国家电网公司 | Method and device for detecting software plagiarism |
-
2017
- 2017-03-22 CN CN201710171531.0A patent/CN106951743A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101697121A (en) * | 2009-10-26 | 2010-04-21 | 哈尔滨工业大学 | Method for detecting code similarity based on semantic analysis of program source code |
CN101894236A (en) * | 2010-07-28 | 2010-11-24 | 北京华夏信安科技有限公司 | Software homology detection method and device based on abstract syntax tree and semantic matching |
CN103262047A (en) * | 2010-12-15 | 2013-08-21 | 微软公司 | Intelligent code differencing using code clone detection |
US20140053285A1 (en) * | 2012-08-16 | 2014-02-20 | Infosys Limited | Methods for detecting plagiarism in software code and devices thereof |
CN103020494A (en) * | 2012-12-03 | 2013-04-03 | 哈尔滨工业大学 | Program code programming mode copyright ownership detecting model and copyright ownership detecting method |
CN103577323A (en) * | 2013-09-27 | 2014-02-12 | 西安交通大学 | Dynamic key command sequence birthmark-based software plagiarism detecting method |
CN103729580A (en) * | 2014-01-27 | 2014-04-16 | 国家电网公司 | Method and device for detecting software plagiarism |
Non-Patent Citations (4)
Title |
---|
JINGLING ZHAO: "An AST-Based Code Plagiarism Detection Algorithm", 《2015 10TH INTERNATIONAL CONFERENCE ON BROADBAND AND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS》 * |
刘军娜: "程序相似度检测算法", 《计算机与数字工程》 * |
田振洲: "软件抄袭检测研究综述", 《信息安全学报》 * |
石野 等: "基于语法树的程序相似度判定方法", 《吉林大学学报(信息科学版)》 * |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108229170A (en) * | 2018-02-02 | 2018-06-29 | 中科软评科技(北京)有限公司 | Utilize big data and the software analysis method and device of neural network |
CN108229170B (en) * | 2018-02-02 | 2020-05-12 | 中科软评科技(北京)有限公司 | Software analysis method and apparatus using big data and neural network |
CN110989991A (en) * | 2019-10-25 | 2020-04-10 | 深圳开源互联网安全技术有限公司 | Method and system for detecting source code clone open source software in application program |
CN110989991B (en) * | 2019-10-25 | 2023-12-01 | 深圳开源互联网安全技术有限公司 | Method and system for detecting source code clone open source software in application program |
CN110955758A (en) * | 2019-12-18 | 2020-04-03 | 中国电子技术标准化研究院 | Code detection method, code detection server and index server |
CN111552504A (en) * | 2020-07-13 | 2020-08-18 | 深圳开源互联网安全技术有限公司 | Asset information maintenance method and device of open source assembly and storage medium |
CN111552504B (en) * | 2020-07-13 | 2020-10-27 | 深圳开源互联网安全技术有限公司 | Asset information maintenance method and device of open source assembly and storage medium |
CN114064116A (en) * | 2020-07-30 | 2022-02-18 | 华为技术有限公司 | Software detection method and device |
CN115080924A (en) * | 2022-07-25 | 2022-09-20 | 南开大学 | Software license clause extraction method based on natural language understanding |
CN115080924B (en) * | 2022-07-25 | 2022-11-15 | 南开大学 | Software license clause extraction method based on natural language understanding |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106951743A (en) | A kind of software code infringement detection method | |
CN109377244B (en) | Food fast traceability system and method based on multi-chain interconnection block chain network | |
CN107239891B (en) | Bidding auditing method based on big data | |
US9405905B2 (en) | Systems and methods for identifying associations between malware samples | |
CN110321675B (en) | Webpage watermark-based generation and tracing method and device | |
WO2019222006A1 (en) | Obfuscation and deletion of personal data in a loosely-coupled distributed system | |
JP6970686B2 (en) | Salting text in database tables, text files, and data feeds | |
CN107194666A (en) | Report Server Management method and terminal device based on block chain technology | |
CN111104579A (en) | Identification method and device for public network assets and storage medium | |
CN104135737A (en) | Method of obtaining network element configuration data of LTE (Long Term Evolution) network base station | |
CN109074371A (en) | Mark whether true method and computing device for determination | |
CN104778123A (en) | Method and device for detecting system performance | |
CN102446211A (en) | Method and system for filing and verifying image | |
CN117459327A (en) | Cloud data transparent encryption protection method, system and device | |
CN113177193A (en) | Watermark adding method, watermark verifying method and terminal equipment | |
CN116506230A (en) | Data acquisition method and system based on RSA asymmetric encryption | |
CN114298882A (en) | Watermark embedding method and tracing method for CAD data and electronic equipment | |
CN110647766A (en) | Method and system for ensuring file downloading safety of data warehouse | |
CN116843352B (en) | Block chain-based traditional Chinese medicine identification method, system, device and storage medium | |
CN113992334B (en) | Storage method and verification method and device of equipment side data and electronic equipment | |
Sigvardsson | Code Cloning Habits Of The Jupyter Notebook Community | |
CN114244823B (en) | Penetration test method and system based on Http request automatic deformation | |
CN112667661B (en) | Tracing information correlation query method and device | |
Nguyen et al. | A Novel Solution to Query Assurance Verification for Dynamic Outsourced XML Databases. | |
CN117335988B (en) | APP electronic identification generation, labeling and security verification method and equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20170714 |
|
WD01 | Invention patent application deemed withdrawn after publication |