Programs of online technological innovation enhance the quality of tracking and making decisions in intelligent lines. These online technological innovations are susceptible to harmful strikes, and limiting them can have serious technological and cost-effective problems. There are methods like rule obfuscation and watermarking which can make the source rule of a system difficult to understand by people and validate the ownership of the system. However, rule obfuscation cannot avoid the source program code being copied and a watermark can be defaced. In it uses a relatively new technique, program birthmark, to help identify program code theft of JavaScript applications. A birthmark is a unique attribute a system provides that can be used to identify the system. It improves two newest birthmark methods that attract out the birthmark of an program from the run-time load. It suggests a remodeled system with improved durability and performed comprehensive tests to justify the performance and durability of it. Keywords—Code theft detection, heap graph, software birthmark, software protection.
[1]
Sencun Zhu,et al.
Behavior based software theft detection
,
2009,
CCS.
[2]
Katsuro Inoue,et al.
A practical method for watermarking Java programs
,
2000,
Proceedings 24th Annual International Computer Software and Applications Conference. COMPSAC2000.
[3]
David Schuler,et al.
A dynamic birthmark for java
,
2007,
ASE.
[4]
Michael Stepp,et al.
Dynamic path-based software watermarking
,
2004,
PLDI '04.
[5]
Christian S. Collberg,et al.
Detecting Software Theft via Whole Program Path Birthmarks
,
2004,
ISC.
[6]
Christian S. Collberg,et al.
Software watermarking: models and dynamic embeddings
,
1999,
POPL '99.
[7]
Zaenal Akbar.
Watermarking Java Programs using Dummy Methods with Dynamically Opaque Predicates
,
2010,
ArXiv.
[8]
Christian S. Collberg,et al.
A Taxonomy of Obfuscating Transformations
,
1997
.