Detecting pirated applications

A method includes receiving a plurality of trusted assets, generating a first signature set for a known software application, and generating a second signature set for a subject software application. Each trusted asset is associated with at least a threshold number of trusted authors. Each signature...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: BANDHAKAVI SRUTHI, KANG MIN GYUNG, PROVOS NIELS, SHARIF MONIRUL ISLAM, BHATIA ASHISH, MAVROMMATIS PANAYIOTIS
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator BANDHAKAVI SRUTHI
KANG MIN GYUNG
PROVOS NIELS
SHARIF MONIRUL ISLAM
BHATIA ASHISH
MAVROMMATIS PANAYIOTIS
description A method includes receiving a plurality of trusted assets, generating a first signature set for a known software application, and generating a second signature set for a subject software application. Each trusted asset is associated with at least a threshold number of trusted authors. Each signature in the first signature set corresponds to a known asset that is associated with the known software application. Each signature in the second signature set corresponds to a subject asset that is associated with the subject software application. The method further includes generating first and second filtered signature set based on the first and second signature sets, respectively, by excluding signatures corresponding to the trusted assets. The method also includes generating a similarity rating for the subject application based on a comparison of the first filtered signature set and the second filtered signature set.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US8875303B2</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US8875303B2</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US8875303B23</originalsourceid><addsrcrecordid>eNrjZJBzSS1JTS7JzEtXKMgsSixJTVFILCjIyUxOLMnMzyvmYWBNS8wpTuWF0twMCm6uIc4euqkF-fGpxQWJyal5qSXxocEWFuamxgbGTkbGRCgBANYbJKI</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Detecting pirated applications</title><source>esp@cenet</source><creator>BANDHAKAVI SRUTHI ; KANG MIN GYUNG ; PROVOS NIELS ; SHARIF MONIRUL ISLAM ; BHATIA ASHISH ; MAVROMMATIS PANAYIOTIS</creator><creatorcontrib>BANDHAKAVI SRUTHI ; KANG MIN GYUNG ; PROVOS NIELS ; SHARIF MONIRUL ISLAM ; BHATIA ASHISH ; MAVROMMATIS PANAYIOTIS</creatorcontrib><description>A method includes receiving a plurality of trusted assets, generating a first signature set for a known software application, and generating a second signature set for a subject software application. Each trusted asset is associated with at least a threshold number of trusted authors. Each signature in the first signature set corresponds to a known asset that is associated with the known software application. Each signature in the second signature set corresponds to a subject asset that is associated with the subject software application. The method further includes generating first and second filtered signature set based on the first and second signature sets, respectively, by excluding signatures corresponding to the trusted assets. The method also includes generating a similarity rating for the subject application based on a comparison of the first filtered signature set and the second filtered signature set.</description><language>eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FORADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORYOR FORECASTING PURPOSES ; ELECTRIC DIGITAL DATA PROCESSING ; PHYSICS ; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE,COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTINGPURPOSES, NOT OTHERWISE PROVIDED FOR</subject><creationdate>2014</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20141028&amp;DB=EPODOC&amp;CC=US&amp;NR=8875303B2$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25564,76547</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20141028&amp;DB=EPODOC&amp;CC=US&amp;NR=8875303B2$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>BANDHAKAVI SRUTHI</creatorcontrib><creatorcontrib>KANG MIN GYUNG</creatorcontrib><creatorcontrib>PROVOS NIELS</creatorcontrib><creatorcontrib>SHARIF MONIRUL ISLAM</creatorcontrib><creatorcontrib>BHATIA ASHISH</creatorcontrib><creatorcontrib>MAVROMMATIS PANAYIOTIS</creatorcontrib><title>Detecting pirated applications</title><description>A method includes receiving a plurality of trusted assets, generating a first signature set for a known software application, and generating a second signature set for a subject software application. Each trusted asset is associated with at least a threshold number of trusted authors. Each signature in the first signature set corresponds to a known asset that is associated with the known software application. Each signature in the second signature set corresponds to a subject asset that is associated with the subject software application. The method further includes generating first and second filtered signature set based on the first and second signature sets, respectively, by excluding signatures corresponding to the trusted assets. The method also includes generating a similarity rating for the subject application based on a comparison of the first filtered signature set and the second filtered signature set.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FORADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORYOR FORECASTING PURPOSES</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>PHYSICS</subject><subject>SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE,COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTINGPURPOSES, NOT OTHERWISE PROVIDED FOR</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2014</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZJBzSS1JTS7JzEtXKMgsSixJTVFILCjIyUxOLMnMzyvmYWBNS8wpTuWF0twMCm6uIc4euqkF-fGpxQWJyal5qSXxocEWFuamxgbGTkbGRCgBANYbJKI</recordid><startdate>20141028</startdate><enddate>20141028</enddate><creator>BANDHAKAVI SRUTHI</creator><creator>KANG MIN GYUNG</creator><creator>PROVOS NIELS</creator><creator>SHARIF MONIRUL ISLAM</creator><creator>BHATIA ASHISH</creator><creator>MAVROMMATIS PANAYIOTIS</creator><scope>EVB</scope></search><sort><creationdate>20141028</creationdate><title>Detecting pirated applications</title><author>BANDHAKAVI SRUTHI ; KANG MIN GYUNG ; PROVOS NIELS ; SHARIF MONIRUL ISLAM ; BHATIA ASHISH ; MAVROMMATIS PANAYIOTIS</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US8875303B23</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2014</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FORADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORYOR FORECASTING PURPOSES</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>PHYSICS</topic><topic>SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE,COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTINGPURPOSES, NOT OTHERWISE PROVIDED FOR</topic><toplevel>online_resources</toplevel><creatorcontrib>BANDHAKAVI SRUTHI</creatorcontrib><creatorcontrib>KANG MIN GYUNG</creatorcontrib><creatorcontrib>PROVOS NIELS</creatorcontrib><creatorcontrib>SHARIF MONIRUL ISLAM</creatorcontrib><creatorcontrib>BHATIA ASHISH</creatorcontrib><creatorcontrib>MAVROMMATIS PANAYIOTIS</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>BANDHAKAVI SRUTHI</au><au>KANG MIN GYUNG</au><au>PROVOS NIELS</au><au>SHARIF MONIRUL ISLAM</au><au>BHATIA ASHISH</au><au>MAVROMMATIS PANAYIOTIS</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Detecting pirated applications</title><date>2014-10-28</date><risdate>2014</risdate><abstract>A method includes receiving a plurality of trusted assets, generating a first signature set for a known software application, and generating a second signature set for a subject software application. Each trusted asset is associated with at least a threshold number of trusted authors. Each signature in the first signature set corresponds to a known asset that is associated with the known software application. Each signature in the second signature set corresponds to a subject asset that is associated with the subject software application. The method further includes generating first and second filtered signature set based on the first and second signature sets, respectively, by excluding signatures corresponding to the trusted assets. The method also includes generating a similarity rating for the subject application based on a comparison of the first filtered signature set and the second filtered signature set.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_epo_espacenet_US8875303B2
source esp@cenet
subjects CALCULATING
COMPUTING
COUNTING
DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FORADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORYOR FORECASTING PURPOSES
ELECTRIC DIGITAL DATA PROCESSING
PHYSICS
SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE,COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTINGPURPOSES, NOT OTHERWISE PROVIDED FOR
title Detecting pirated applications
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-30T23%3A44%3A34IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=BANDHAKAVI%20SRUTHI&rft.date=2014-10-28&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS8875303B2%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true