From: spaf@cs.purdue.EDU (Gene Spafford)
Newsgroups: alt.security,comp.security.misc
Subject: Re: Criminalizing unauthorized use
Message-ID: <SPAF.92Jun29213235@uther.cs.purdue.EDU>
Date: 30 Jun 92 02:32:35 GMT
References: <16863@ulysses.att.com> <709468085snx@global.hacktic.nl>
	<1992Jun29.073941.24114@cbfsb.cb.att.com>
	<1992Jun29.155234.21049@cl.cam.ac.uk>
Organization: Department of Computer Sciences, Purdue University
In-reply-to: rja14@cl.cam.ac.uk's message of 29 Jun 92 15:52:34 GMT

In article <1992Jun29.155234.21049@cl.cam.ac.uk> rja14@cl.cam.ac.uk (Ross Anderson) writes:

   The literature departments have done a lot of work on identifying authors
   by feature extraction from text. Maybe this is a technology the computer
   security community should plug in to.

Interesting that you should mention that.  A few months back, Stephen
Weeber and I did a paper on this very topic.  A short version of the
paper has been accepted for presentation at the 15th National Computer
Security Conference in October, and a more extended version has been
submitted for consideration for publication in "Computers & Security."

If you want to get a copy of the tech report version of the conference
paper (short version), send your *surface postal* mail address to:
maf@cs.purdue.edu and request a copy of "Software Forensics: Can We
Track Code to its Authors?", by Spafford & Weeber, TR-92-010.

