2018
DOI: 10.1093/comjnl/bxy055
|View full text |Cite
|
Sign up to set email alerts
|

A New Software Birthmark based on Weight Sequences of Dynamic Control Flow Graph for Plagiarism Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
2
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 9 publications
0
2
0
1
Order By: Relevance
“…We call the features that we can obtain from the semantic analysis phase (S3) semantic features. To obtain semantic features, a complex analysis, such as symbolic execution [7], [8], [15], [18], [63], dynamic evaluation of code snippets [8], [30], [31], [33], [35], [63], [64], [66], [67], or machine learningbased embedding [12], [13], [19], [20], [21], [23], [24], [25], [26], [27], [28], [29] is necessary. There are mainly seven distinct semantic features used in the previous literature, as listed in Table 1.…”
Section: Semantic Featuresmentioning
confidence: 99%
See 1 more Smart Citation
“…We call the features that we can obtain from the semantic analysis phase (S3) semantic features. To obtain semantic features, a complex analysis, such as symbolic execution [7], [8], [15], [18], [63], dynamic evaluation of code snippets [8], [30], [31], [33], [35], [63], [64], [66], [67], or machine learningbased embedding [12], [13], [19], [20], [21], [23], [24], [25], [26], [27], [28], [29] is necessary. There are mainly seven distinct semantic features used in the previous literature, as listed in Table 1.…”
Section: Semantic Featuresmentioning
confidence: 99%
“…Third, the runtime behavior of a code snippet can directly express its semantics, as presented by traditional malware analysis [81]. By executing two target functions with the same execution environment, one can directly compare the executed instruction sequences [64] or visited CFG edges of the target functions [66]. For comparison, one may focus on specific behaviors observed during the execution [18], [28], [30], [31], [35], [67], [82]: the read/write values of stack and heap memory, return values from function calls, and invoked system/library function calls during the executions.…”
Section: Semantic Featuresmentioning
confidence: 99%
“…Um exemplo de método baseado nessa estratégia é apresentado em [Wan et al 2018], que usa uma técnica de estimativa de similaridade chamada simhash [Charikar 2002] para detectar plágio em códigos Verilog HDL. Marcas de nascenc ¸a, ou birthmarks, são características de códigos-fonte que são muito resistentes a tentativas de ofuscac ¸ão, onde uma série de mudanc ¸as são feitas nos códigos para tentar encobrir a prática de plágio [Yuan et al 2018, Tian et al 2015. Os métodos baseados nessas características procuram detectar ocorrências de plágio através da análise de similaridade entre as marcas de nascenc ¸a presentes em pares de códigos.…”
Section: Trabalhos Relacionadosunclassified