Proceedings of the 2012 International Symposium on Software Testing and Analysis 2012
DOI: 10.1145/2338965.2336767
|View full text |Cite
|
Sign up to set email alerts
|

A first step towards algorithm plagiarism detection

Abstract: In this work, we address the problem of algorithm plagiarism, which occurs when a plagiarist, violating intellectual property rights, steals others' algorithms and covertly implements them. In contrast to software plagiarism, which has been extensively studied, limited attention has been paid to algorithm plagiarism. In this paper, we propose two dynamic value-based approaches, namely N-version and annotation, for algorithm plagiarism detection. Our approaches are motivated by the observation that there exist … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
33
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
5
2
1

Relationship

2
6

Authors

Journals

citations
Cited by 55 publications
(33 citation statements)
references
References 31 publications
0
33
0
Order By: Relevance
“…Moreover, it can also capture dynamic behaviours of the programs by executing the compiled code. In the last few years, there have been several studies to discover cloned and plagiarised programs (especially mobile applications) based on compiled code (Chae et al 2013;Chen et al 2014;Gibler et al 2013;Crussell et al 2012Crussell et al , 2013Tian et al 2014;Tamada et al 2004;Myles and Collberg 2004;Hi et al 2009;Zhang et al 2012Zhang et al , 2014McMillan et al 2012;Luo et al 2014).…”
Section: Code Similarity Measurementmentioning
confidence: 99%
See 1 more Smart Citation
“…Moreover, it can also capture dynamic behaviours of the programs by executing the compiled code. In the last few years, there have been several studies to discover cloned and plagiarised programs (especially mobile applications) based on compiled code (Chae et al 2013;Chen et al 2014;Gibler et al 2013;Crussell et al 2012Crussell et al , 2013Tian et al 2014;Tamada et al 2004;Myles and Collberg 2004;Hi et al 2009;Zhang et al 2012Zhang et al , 2014McMillan et al 2012;Luo et al 2014).…”
Section: Code Similarity Measurementmentioning
confidence: 99%
“…Two programs can be similar at the level of purpose, algorithm, or implementation (Zhang et al 2012). Most software plagiarism tools and techniques focus on the level of implementation since it is most likely to be plagiarised.…”
Section: Related Workmentioning
confidence: 99%
“…Dynamic birthmark based software plagiarism detection: Jhi et al [5], [13] proposed to use core values as birthmark to detect software plagiarism. This approach has no theoretical guarantee, since core value is hard to define.…”
Section: A Software Plagiarism Detectionmentioning
confidence: 99%
“…The existing approaches to software plagiarism detection can be divided into the following categories: (C1) static source code comparison methods [6], [7], [8]; (C2) static executable code comparison methods [9]; (C3) dynamic control flow based methods [10]; (C4) dynamic API based methods [11], [12]; (C5) dynamic value based approach [5], [13]. First, C1 does not meet R1 because it has to access source code.…”
Section: Introductionmentioning
confidence: 99%
“…The existing approaches to software plagiarism detection can be divided into the following categories: (C1) static source code comparison methods [6]- [8]; (C2) static executable code comparison methods [9]; (C3) dynamic control flow-based methods [10]; (C4) dynamic API-based methods [11], [12]; (C5) dynamic value-based approach [5], [13]. First, C1 does not meet R1 because it has to access source code.…”
Section: Introductionmentioning
confidence: 99%