Software Birthmark Based Similarity Comparison of JavaScript Programs
English

About The Book

An increased use of JavaScript in web development has also increased the theft of JavaScript programs. Code of JavaScript program can be easily obtained as most of the browsers provide the simplest way to access it. Watermarking and code obfuscation are the techniques used to safeguard the software. A potential attacker can easily deface watermark and hence watermark cannot completely protect the code. Code obfuscation cannot avoid copy of code. It only prevents others by understanding the logic of the program. Aim is to secure the intellectual property rights of JavaScript developers. Even if the code is obfuscated or a watermark is added in it this system can easily detect theft. Heap Graph is used to depict the behavior of a JavaScript program as how it calls other objects to fulfil the desired functionality. Agglomerative clustering is used to efficiently merge the heap graphs formed at various points of time. Frequent Subgraph Mining is used to find the subgraph that represents the unique behavior of the program. Finally the subgraph of the genuine program is searched against the graph of the suspected one. The system was made to run on 3000 combinations of websites.
Piracy-free
Piracy-free
Assured Quality
Assured Quality
Secure Transactions
Secure Transactions
Delivery Options
Please enter pincode to check delivery time.
*COD & Shipping Charges may apply on certain items.
Review final details at checkout.
downArrow

Details


LOOKING TO PLACE A BULK ORDER?CLICK HERE