A new software birthmark based on weight sequences of dynamic control flow graph for plagiarism detection

被引:0
|
作者
机构
[1] Yuan, Baoguo
[2] Wang, Junfeng
[3] Fang, Zhiyang
[4] Qi, Li
来源
Wang, Junfeng (wangjf@scu.edu.cn) | 1600年 / Oxford University Press卷 / 61期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
Open source software
引用
收藏
相关论文
共 50 条
  • [21] Graph-Based Similarity Analysis: A New Approach to Cross-Language Plagiarism Detection
    Franco-Salvador, Marc
    Gupta, Parth
    Rosso, Paolo
    PROCESAMIENTO DEL LENGUAJE NATURAL, 2013, (50): : 21 - 28
  • [22] Software Source Code Plagiarism and Direction Detection Based on PDG
    Shu, Bo
    Du, Xiaojun
    MECHATRONICS, ROBOTICS AND AUTOMATION, PTS 1-3, 2013, 373-375 : 1172 - 1177
  • [23] Dynamic graph-based software fingerprinting
    Collberg, Christian S.
    Thomborson, Clark
    Townsend, Gregg M.
    ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, 2007, 29 (06):
  • [24] Control Flow Graph Visualization in Compiled Software Engineering
    Mikhailov, Andrey
    Hmelnov, Aleksey
    Cherkashin, Evgeny
    Bychkov, Igor
    2016 39TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), 2016, : 1313 - 1317
  • [25] Hidden Path: Dynamic Software Watermarking Based on Control flow Obfuscation
    Chen, Zhe
    Jia, Chunfu
    Xu, Donghui
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 2, 2017, : 443 - 450
  • [26] Heap Graph Based Software Theft Detection
    Chan, Patrick P. F.
    Hui, Lucas C. K.
    Yiu, S. M.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (01) : 101 - 110
  • [27] Interpretation-enabled Software Reuse Detection Based on a Multi-Level Birthmark Model
    Xu, Xi
    Zheng, Qinghua
    Yan, Zheng
    Fan, Ming
    Jia, Ang
    Liu, Ting
    2021 IEEE/ACM 43RD INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2021), 2021, : 873 - 884
  • [28] CFG2AT: Control Flow Graph and Graph Attention Network-Based Software Defect Prediction
    Liu, Haiyang
    Li, Zhiqiang
    Zhang, Hongyu
    Jing, Xiao-Yuan
    Liu, Jinhui
    IEEE TRANSACTIONS ON RELIABILITY, 2024,
  • [29] Value-Based Program Characterization and Its Application to Software Plagiarism Detection
    Jhi, Yoon-Chan
    Wang, Xinran
    Jia, Xiaoqi
    Zhu, Sencun
    Liu, Peng
    Wu, Dinghao
    2011 33RD INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE), 2011, : 756 - 765
  • [30] Similarity Based Binary Backdoor Detection via Attributed Control Flow Graph
    Zhang, Tianchen
    Wang, Haixiang
    Ying, Huan
    Li, Jiyuan
    PROCEEDINGS OF 2020 IEEE 4TH INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC 2020), 2020, : 453 - 457