home *** CD-ROM | disk | FTP | other *** search
- From: spaf@cs.purdue.EDU (Gene Spafford)
- Newsgroups: alt.security,comp.security.misc
- Subject: Re: Criminalizing unauthorized use
- Message-ID: <SPAF.92Jun29213235@uther.cs.purdue.EDU>
- Date: 30 Jun 92 02:32:35 GMT
- References: <16863@ulysses.att.com> <709468085snx@global.hacktic.nl>
- <1992Jun29.073941.24114@cbfsb.cb.att.com>
- <1992Jun29.155234.21049@cl.cam.ac.uk>
- Organization: Department of Computer Sciences, Purdue University
- In-reply-to: rja14@cl.cam.ac.uk's message of 29 Jun 92 15:52:34 GMT
-
- In article <1992Jun29.155234.21049@cl.cam.ac.uk> rja14@cl.cam.ac.uk (Ross Anderson) writes:
-
- The literature departments have done a lot of work on identifying authors
- by feature extraction from text. Maybe this is a technology the computer
- security community should plug in to.
-
- Interesting that you should mention that. A few months back, Stephen
- Weeber and I did a paper on this very topic. A short version of the
- paper has been accepted for presentation at the 15th National Computer
- Security Conference in October, and a more extended version has been
- submitted for consideration for publication in "Computers & Security."
-
- If you want to get a copy of the tech report version of the conference
- paper (short version), send your *surface postal* mail address to:
- maf@cs.purdue.edu and request a copy of "Software Forensics: Can We
- Track Code to its Authors?", by Spafford & Weeber, TR-92-010.
-
-