Credible, resilient, and scalable detection of software plagiarism using authority histograms
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Chae, Dong-Kyu | - |
dc.contributor.author | Ha, Jiwoon | - |
dc.contributor.author | Kim, Sang-Wook | - |
dc.contributor.author | Kang, BooJoong | - |
dc.contributor.author | Im, Eul Gyu | - |
dc.contributor.author | Park, SunJu | - |
dc.date.accessioned | 2022-07-15T18:10:44Z | - |
dc.date.available | 2022-07-15T18:10:44Z | - |
dc.date.created | 2021-05-12 | - |
dc.date.issued | 2016-03 | - |
dc.identifier.issn | 0950-7051 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/hanyang/handle/2021.sw.hanyang/155002 | - |
dc.description.abstract | Software plagiarism has become a serious threat to the health of software industry. A software birthmark indicates unique characteristics of a program that can be used to analyze the similarity between two programs and provide proof of plagiarism. In this paper, we propose a novel birthmark, Authority Histograms (AH), which can satisfy three essential requirements for good birthmarks resiliency, credibility, and scat ability. Existing birthmarks fail to satisfy all of them simultaneously. AH reflects not only the frequency of APIs, but also their call orders, whereas previous birthmarks rarely consider them together. This property provides more accurate plagiarism detection, making our birthmark more resilient and credible than previously proposed birthmarks. By random walk with restart when generating AH, we make our proposal fully applicable to even large programs. Extensive experiments with a set of Windows applications verify that both the credibility and resiliency of AH exceed those of existing birthmarks; therefore AH provides improved accuracy in detecting plagiarism. Moreover, the construction and comparison phases of All are established within a reasonable time. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | ELSEVIER | - |
dc.title | Credible, resilient, and scalable detection of software plagiarism using authority histograms | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Chae, Dong-Kyu | - |
dc.contributor.affiliatedAuthor | Kim, Sang-Wook | - |
dc.contributor.affiliatedAuthor | Im, Eul Gyu | - |
dc.identifier.doi | 10.1016/j.knosys.2015.12.009 | - |
dc.identifier.scopusid | 2-s2.0-84957727746 | - |
dc.identifier.wosid | 000370104800010 | - |
dc.identifier.bibliographicCitation | KNOWLEDGE-BASED SYSTEMS, v.95, pp.114 - 124 | - |
dc.relation.isPartOf | KNOWLEDGE-BASED SYSTEMS | - |
dc.citation.title | KNOWLEDGE-BASED SYSTEMS | - |
dc.citation.volume | 95 | - |
dc.citation.startPage | 114 | - |
dc.citation.endPage | 124 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.isOpenAccess | N | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Artificial Intelligence | - |
dc.subject.keywordPlus | BIRTHMARK | - |
dc.subject.keywordAuthor | Software plagiarism detection | - |
dc.subject.keywordAuthor | Birthmark | - |
dc.subject.keywordAuthor | Similarity analysis | - |
dc.subject.keywordAuthor | Static analysis | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
222, Wangsimni-ro, Seongdong-gu, Seoul, 04763, Korea+82-2-2220-1365
COPYRIGHT © 2021 HANYANG UNIVERSITY.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.