Publication | Closed Access
Value-based program characterization and its application to software plagiarism detection
83
Citations
27
References
2011
Year
Unknown Venue
Software MaintenanceProgram CheckingEngineeringInformation SecurityVerificationSoftware EngineeringSource Code AnalysisInformation ForensicsSoftware AnalysisFormal VerificationIdentical Code FragmentsProgram TransformationSystem SoftwareSoftware MiningSource CodeComputer ScienceStatic Program AnalysisSoftware DesignSoftware Plagiarism DetectionSoftware SecurityContent Similarity DetectionProgram AnalysisSoftware TestingFormal MethodsObfuscation (Software)Malware Analysis
Identifying similar or identical code fragments becomes much more challenging in code theft cases where plagiarizers can use various automated code transformation techniques to hide stolen code from being detected. Previous works in this field are largely limited in that (1) most of them cannot handle advanced obfuscation techniques; (2) the methods based on source code analysis are less practical since the source code of suspicious programs is typically not available until strong evidences are collected; and (3) those depending on the features of specific operating systems or programming languages have limited applicability.
| Year | Citations | |
|---|---|---|
Page 1
Page 1