Detecting pirated applications
A method includes receiving a plurality of trusted assets, generating a first signature set for a known software application, and generating a second signature set for a subject software application. Each trusted asset is associated with at least a threshold number of trusted authors. Each signature...
Gespeichert in:
Hauptverfasser: | , , , , , |
---|---|
Format: | Patent |
Sprache: | eng ; fre ; ger |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | Mavrommatis, Panayiotis Provos, Niels Bhatia, Ashish Sharif, Monirul Islam Kang, Min Gyung Bandhakavi, Sruthi |
description | A method includes receiving a plurality of trusted assets, generating a first signature set for a known software application, and generating a second signature set for a subject software application. Each trusted asset is associated with at least a threshold number of trusted authors. Each signature in the first signature set corresponds to a known asset that is associated with the known software application. Each signature in the second signature set corresponds to a subj ect asset that is associated with the subj ect software application. The method further includes generating first and second filtered signature set based on the first and second signature sets, respectively, by excluding signatures corresponding to the trusted assets. The method also includes generating a similarity rating for the subject application based on a comparison of the first filtered signature set and the second filtered signature set. |
format | Patent |
fullrecord | <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_EP2693356B1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>EP2693356B1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_EP2693356B13</originalsourceid><addsrcrecordid>eNrjZJBzSS1JTS7JzEtXKMgsSixJTVFILCjIyUxOLMnMzyvmYWBNS8wpTuWF0twMCm6uIc4euqkF-fGpxQWJyal5qSXxrgFGZpbGxqZmTobGRCgBANFLJHo</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Detecting pirated applications</title><source>esp@cenet</source><creator>Mavrommatis, Panayiotis ; Provos, Niels ; Bhatia, Ashish ; Sharif, Monirul Islam ; Kang, Min Gyung ; Bandhakavi, Sruthi</creator><creatorcontrib>Mavrommatis, Panayiotis ; Provos, Niels ; Bhatia, Ashish ; Sharif, Monirul Islam ; Kang, Min Gyung ; Bandhakavi, Sruthi</creatorcontrib><description>A method includes receiving a plurality of trusted assets, generating a first signature set for a known software application, and generating a second signature set for a subject software application. Each trusted asset is associated with at least a threshold number of trusted authors. Each signature in the first signature set corresponds to a known asset that is associated with the known software application. Each signature in the second signature set corresponds to a subj ect asset that is associated with the subj ect software application. The method further includes generating first and second filtered signature set based on the first and second signature sets, respectively, by excluding signatures corresponding to the trusted assets. The method also includes generating a similarity rating for the subject application based on a comparison of the first filtered signature set and the second filtered signature set.</description><language>eng ; fre ; ger</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC DIGITAL DATA PROCESSING ; PHYSICS</subject><creationdate>2019</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20191016&DB=EPODOC&CC=EP&NR=2693356B1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,778,883,25547,76298</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20191016&DB=EPODOC&CC=EP&NR=2693356B1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Mavrommatis, Panayiotis</creatorcontrib><creatorcontrib>Provos, Niels</creatorcontrib><creatorcontrib>Bhatia, Ashish</creatorcontrib><creatorcontrib>Sharif, Monirul Islam</creatorcontrib><creatorcontrib>Kang, Min Gyung</creatorcontrib><creatorcontrib>Bandhakavi, Sruthi</creatorcontrib><title>Detecting pirated applications</title><description>A method includes receiving a plurality of trusted assets, generating a first signature set for a known software application, and generating a second signature set for a subject software application. Each trusted asset is associated with at least a threshold number of trusted authors. Each signature in the first signature set corresponds to a known asset that is associated with the known software application. Each signature in the second signature set corresponds to a subj ect asset that is associated with the subj ect software application. The method further includes generating first and second filtered signature set based on the first and second signature sets, respectively, by excluding signatures corresponding to the trusted assets. The method also includes generating a similarity rating for the subject application based on a comparison of the first filtered signature set and the second filtered signature set.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>PHYSICS</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2019</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZJBzSS1JTS7JzEtXKMgsSixJTVFILCjIyUxOLMnMzyvmYWBNS8wpTuWF0twMCm6uIc4euqkF-fGpxQWJyal5qSXxrgFGZpbGxqZmTobGRCgBANFLJHo</recordid><startdate>20191016</startdate><enddate>20191016</enddate><creator>Mavrommatis, Panayiotis</creator><creator>Provos, Niels</creator><creator>Bhatia, Ashish</creator><creator>Sharif, Monirul Islam</creator><creator>Kang, Min Gyung</creator><creator>Bandhakavi, Sruthi</creator><scope>EVB</scope></search><sort><creationdate>20191016</creationdate><title>Detecting pirated applications</title><author>Mavrommatis, Panayiotis ; Provos, Niels ; Bhatia, Ashish ; Sharif, Monirul Islam ; Kang, Min Gyung ; Bandhakavi, Sruthi</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_EP2693356B13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng ; fre ; ger</language><creationdate>2019</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>PHYSICS</topic><toplevel>online_resources</toplevel><creatorcontrib>Mavrommatis, Panayiotis</creatorcontrib><creatorcontrib>Provos, Niels</creatorcontrib><creatorcontrib>Bhatia, Ashish</creatorcontrib><creatorcontrib>Sharif, Monirul Islam</creatorcontrib><creatorcontrib>Kang, Min Gyung</creatorcontrib><creatorcontrib>Bandhakavi, Sruthi</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Mavrommatis, Panayiotis</au><au>Provos, Niels</au><au>Bhatia, Ashish</au><au>Sharif, Monirul Islam</au><au>Kang, Min Gyung</au><au>Bandhakavi, Sruthi</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Detecting pirated applications</title><date>2019-10-16</date><risdate>2019</risdate><abstract>A method includes receiving a plurality of trusted assets, generating a first signature set for a known software application, and generating a second signature set for a subject software application. Each trusted asset is associated with at least a threshold number of trusted authors. Each signature in the first signature set corresponds to a known asset that is associated with the known software application. Each signature in the second signature set corresponds to a subj ect asset that is associated with the subj ect software application. The method further includes generating first and second filtered signature set based on the first and second signature sets, respectively, by excluding signatures corresponding to the trusted assets. The method also includes generating a similarity rating for the subject application based on a comparison of the first filtered signature set and the second filtered signature set.</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | eng ; fre ; ger |
recordid | cdi_epo_espacenet_EP2693356B1 |
source | esp@cenet |
subjects | CALCULATING COMPUTING COUNTING ELECTRIC DIGITAL DATA PROCESSING PHYSICS |
title | Detecting pirated applications |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-16T14%3A51%3A16IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=Mavrommatis,%20Panayiotis&rft.date=2019-10-16&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EEP2693356B1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |