2016
DOI: 10.1109/tr.2016.2570554
|View full text |Cite
|
Sign up to set email alerts
|

Deviation-Based Obfuscation-Resilient Program Equivalence Checking With Application to Software Plagiarism Detection

Abstract: Software plagiarism, an act of illegally copying others' code, has become a serious concern for honest software companies and the open source community. Considerable research efforts have been dedicated to searching the evidence of software plagiarism. In this paper, we continue this line of research and propose LoPD, a deviation-based program equivalence checking approach, which is an ideal fit for the whole-program plagiarism detection. Instead of directly comparing the similarity between two programs, LoPD … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
15
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 29 publications
(16 citation statements)
references
References 62 publications
0
15
0
Order By: Relevance
“…By combining rigorous program semantics with longest common subsequence based fuzzy matching, Cop [20] is obfuscation-resilient and can satisfy R3. Since the dynamic approaches can concentrate more on the program semantics, DYKIS [30], TOB [28], TreSB [27], and LoPD [21] meet R3 quite well.…”
Section: Recent State Of the Art And Practicementioning
confidence: 96%
See 3 more Smart Citations
“…By combining rigorous program semantics with longest common subsequence based fuzzy matching, Cop [20] is obfuscation-resilient and can satisfy R3. Since the dynamic approaches can concentrate more on the program semantics, DYKIS [30], TOB [28], TreSB [27], and LoPD [21] meet R3 quite well.…”
Section: Recent State Of the Art And Practicementioning
confidence: 96%
“…4. In the domain of software plagiarism detection, our three works were widely cited by top conferences and top journals [21], [10], and many favorable comments were made upon the good resilience to code obfuscation techniques and the capability to work on multithreaded programs.…”
Section: Contributionmentioning
confidence: 99%
See 2 more Smart Citations
“…Thus, it is a code containment problem. The problem has been emphasized by previous work [27], [37], [45], [66], [60], [61], [38], but the proposed solutions can only work for code of the same ISA. Resolving the cross-architecture code containment problem is a new and important endeavor.…”
Section: Introductionmentioning
confidence: 99%