2020
DOI: 10.1145/3428206
|View full text |Cite
|
Sign up to set email alerts
|

Mossad: defeating software plagiarism detection

Abstract: Automatic software plagiarism detection tools are widely used in educational settings to ensure that submitted work was not copied. These tools have grown in use together with the rise in enrollments in computer science programs and the widespread availability of code on-line. Educators rely on the robustness of plagiarism detection tools; the working assumption is that the effort required to evade detection is as high as that required to actually do the assigned work. This paper shows t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 22 publications
(9 citation statements)
references
References 19 publications
0
8
0
Order By: Relevance
“…Universities use software systems such as Turnitin, SafeAssign, SNITCH, Cross-Check, AntiPlag and other related software to detect plagiarism, and these systems are constantly improving (Pàmieset al, 2020;Bolkan, 2006;Jiffriya et al, 2013;Niezgoda & Way, 2006;Walker, 2010;Zhang, 2010). However, currently, there is no fully reliable tool with which to detect all cases of plagiarism and contract cheating, and some researchers have developed systems to defeat plagiarism detection (Devore-McDonald & Berger, 2020). Existing systems have gaps that are being addressed but are not resolved at this stage (Bin-Habtoor & Zaher, 2012).…”
Section: Plagiarism and Contract Cheatingmentioning
confidence: 99%
“…Universities use software systems such as Turnitin, SafeAssign, SNITCH, Cross-Check, AntiPlag and other related software to detect plagiarism, and these systems are constantly improving (Pàmieset al, 2020;Bolkan, 2006;Jiffriya et al, 2013;Niezgoda & Way, 2006;Walker, 2010;Zhang, 2010). However, currently, there is no fully reliable tool with which to detect all cases of plagiarism and contract cheating, and some researchers have developed systems to defeat plagiarism detection (Devore-McDonald & Berger, 2020). Existing systems have gaps that are being addressed but are not resolved at this stage (Bin-Habtoor & Zaher, 2012).…”
Section: Plagiarism and Contract Cheatingmentioning
confidence: 99%
“…We test our method against the Mossad approach 4 to plagiarism detection evasion (Devore-McDonald and Berger, 2020). After applying our method, the rank of the pair of the original and the mutation are consistently below 10 in the 5 groups tested.…”
Section: Results Against Mossadmentioning
confidence: 99%
“…Suspicious code pair filtering. For the convenient and easily interpretable quantification of the possibility of plagiarism, many existing methods employ a single suspiciousness index for each source code pair (Devore-McDonald and Berger, 2020;Freire et al, 2007;Ajmal et al, 2013;Yasaswi et al, 2017;Sulistiani and Karnalim, 2019; R. Wu, A. Lv, Q. Zhao 94 Jiffriya et al, 2014). With the aid of the suspicious index, human operators are able to filter the most relevant pairs for manual inspection (Devore-McDonald and Berger, 2020;Freire et al, 2007).…”
Section: Distribution Approximationmentioning
confidence: 99%
See 1 more Smart Citation
“…Meanwhile, in the Winnowing algorithm, fingerprints are determined by first grouping all hash values into windows based on a certain width. The rightmost minimum hash value obtained from each window is used as fingerprints [6], [7], [8], [9]. To prevent collisions in hash values, the Rolling Hash formula is used with the base number in the procedure using prime numbers [4], [10], [11].…”
Section: Introductionmentioning
confidence: 99%