Detecting pirated applications

A method includes receiving a plurality of trusted assets, generating a first signature set for a known software application, and generating a second signature set for a subject software application. Each trusted asset is associated with at least a threshold number of trusted authors. Each signature...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Mavrommatis, Panayiotis, Provos, Niels, Bhatia, Ashish, Sharif, Monirul Islam, Kang, Min Gyung, Bandhakavi, Sruthi
Format: Patent
Sprache:eng ; fre ; ger
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Mavrommatis, Panayiotis
Provos, Niels
Bhatia, Ashish
Sharif, Monirul Islam
Kang, Min Gyung
Bandhakavi, Sruthi
description A method includes receiving a plurality of trusted assets, generating a first signature set for a known software application, and generating a second signature set for a subject software application. Each trusted asset is associated with at least a threshold number of trusted authors. Each signature in the first signature set corresponds to a known asset that is associated with the known software application. Each signature in the second signature set corresponds to a subj ect asset that is associated with the subj ect software application. The method further includes generating first and second filtered signature set based on the first and second signature sets, respectively, by excluding signatures corresponding to the trusted assets. The method also includes generating a similarity rating for the subject application based on a comparison of the first filtered signature set and the second filtered signature set.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_EP2693356B1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>EP2693356B1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_EP2693356B13</originalsourceid><addsrcrecordid>eNrjZJBzSS1JTS7JzEtXKMgsSixJTVFILCjIyUxOLMnMzyvmYWBNS8wpTuWF0twMCm6uIc4euqkF-fGpxQWJyal5qSXxrgFGZpbGxqZmTobGRCgBANFLJHo</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Detecting pirated applications</title><source>esp@cenet</source><creator>Mavrommatis, Panayiotis ; Provos, Niels ; Bhatia, Ashish ; Sharif, Monirul Islam ; Kang, Min Gyung ; Bandhakavi, Sruthi</creator><creatorcontrib>Mavrommatis, Panayiotis ; Provos, Niels ; Bhatia, Ashish ; Sharif, Monirul Islam ; Kang, Min Gyung ; Bandhakavi, Sruthi</creatorcontrib><description>A method includes receiving a plurality of trusted assets, generating a first signature set for a known software application, and generating a second signature set for a subject software application. Each trusted asset is associated with at least a threshold number of trusted authors. Each signature in the first signature set corresponds to a known asset that is associated with the known software application. Each signature in the second signature set corresponds to a subj ect asset that is associated with the subj ect software application. The method further includes generating first and second filtered signature set based on the first and second signature sets, respectively, by excluding signatures corresponding to the trusted assets. The method also includes generating a similarity rating for the subject application based on a comparison of the first filtered signature set and the second filtered signature set.</description><language>eng ; fre ; ger</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC DIGITAL DATA PROCESSING ; PHYSICS</subject><creationdate>2019</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20191016&amp;DB=EPODOC&amp;CC=EP&amp;NR=2693356B1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,778,883,25547,76298</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20191016&amp;DB=EPODOC&amp;CC=EP&amp;NR=2693356B1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Mavrommatis, Panayiotis</creatorcontrib><creatorcontrib>Provos, Niels</creatorcontrib><creatorcontrib>Bhatia, Ashish</creatorcontrib><creatorcontrib>Sharif, Monirul Islam</creatorcontrib><creatorcontrib>Kang, Min Gyung</creatorcontrib><creatorcontrib>Bandhakavi, Sruthi</creatorcontrib><title>Detecting pirated applications</title><description>A method includes receiving a plurality of trusted assets, generating a first signature set for a known software application, and generating a second signature set for a subject software application. Each trusted asset is associated with at least a threshold number of trusted authors. Each signature in the first signature set corresponds to a known asset that is associated with the known software application. Each signature in the second signature set corresponds to a subj ect asset that is associated with the subj ect software application. The method further includes generating first and second filtered signature set based on the first and second signature sets, respectively, by excluding signatures corresponding to the trusted assets. The method also includes generating a similarity rating for the subject application based on a comparison of the first filtered signature set and the second filtered signature set.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>PHYSICS</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2019</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZJBzSS1JTS7JzEtXKMgsSixJTVFILCjIyUxOLMnMzyvmYWBNS8wpTuWF0twMCm6uIc4euqkF-fGpxQWJyal5qSXxrgFGZpbGxqZmTobGRCgBANFLJHo</recordid><startdate>20191016</startdate><enddate>20191016</enddate><creator>Mavrommatis, Panayiotis</creator><creator>Provos, Niels</creator><creator>Bhatia, Ashish</creator><creator>Sharif, Monirul Islam</creator><creator>Kang, Min Gyung</creator><creator>Bandhakavi, Sruthi</creator><scope>EVB</scope></search><sort><creationdate>20191016</creationdate><title>Detecting pirated applications</title><author>Mavrommatis, Panayiotis ; Provos, Niels ; Bhatia, Ashish ; Sharif, Monirul Islam ; Kang, Min Gyung ; Bandhakavi, Sruthi</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_EP2693356B13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng ; fre ; ger</language><creationdate>2019</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>PHYSICS</topic><toplevel>online_resources</toplevel><creatorcontrib>Mavrommatis, Panayiotis</creatorcontrib><creatorcontrib>Provos, Niels</creatorcontrib><creatorcontrib>Bhatia, Ashish</creatorcontrib><creatorcontrib>Sharif, Monirul Islam</creatorcontrib><creatorcontrib>Kang, Min Gyung</creatorcontrib><creatorcontrib>Bandhakavi, Sruthi</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Mavrommatis, Panayiotis</au><au>Provos, Niels</au><au>Bhatia, Ashish</au><au>Sharif, Monirul Islam</au><au>Kang, Min Gyung</au><au>Bandhakavi, Sruthi</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Detecting pirated applications</title><date>2019-10-16</date><risdate>2019</risdate><abstract>A method includes receiving a plurality of trusted assets, generating a first signature set for a known software application, and generating a second signature set for a subject software application. Each trusted asset is associated with at least a threshold number of trusted authors. Each signature in the first signature set corresponds to a known asset that is associated with the known software application. Each signature in the second signature set corresponds to a subj ect asset that is associated with the subj ect software application. The method further includes generating first and second filtered signature set based on the first and second signature sets, respectively, by excluding signatures corresponding to the trusted assets. The method also includes generating a similarity rating for the subject application based on a comparison of the first filtered signature set and the second filtered signature set.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng ; fre ; ger
recordid cdi_epo_espacenet_EP2693356B1
source esp@cenet
subjects CALCULATING
COMPUTING
COUNTING
ELECTRIC DIGITAL DATA PROCESSING
PHYSICS
title Detecting pirated applications
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-16T14%3A51%3A16IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=Mavrommatis,%20Panayiotis&rft.date=2019-10-16&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EEP2693356B1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true