Cheers et al., 2019 - Google Patents
A novel approach for detecting logic similarity in plagiarised source codeCheers et al., 2019
- Document ID
- 636380841111332357
- Author
- Cheers H
- Lin Y
- Smith S
- Publication year
- Publication venue
- 2019 IEEE 10th International Conference on Software Engineering and Service Science (ICSESS)
External Links
Snippet
Source code plagiarism is a persistent problem in computer science education. Many tools have been developed to identify indications of source code plagiarism in large data sets. These tools are good at identifying simple cases of plagiarism (eg renaming identifiers or …
- 230000001131 transforming 0 abstract description 25
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30587—Details of specialised database models
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30386—Retrieval requests
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30289—Database design, administration or maintenance
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/44—Arrangements for executing specific programmes
- G06F9/455—Emulation; Software simulation, i.e. virtualisation or emulation of application or operating system execution engines
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/70—Software maintenance or management
- G06F8/75—Structural analysis for program understanding
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/40—Transformations of program code
- G06F8/41—Compilation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/3604—Software analysis for verifying properties of programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/34—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation; Recording or statistical evaluation of user activity, e.g. usability assessment
- G06F11/3409—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation; Recording or statistical evaluation of user activity, e.g. usability assessment for performance assessment
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/02—Knowledge representation
- G06N5/022—Knowledge engineering, knowledge acquisition
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110162296B (en) | Method and device for generating application programming interface document and terminal equipment | |
Cesare et al. | Control flow-based malware variantdetection | |
Lam et al. | Context-sensitive program analysis as database queries | |
US11481494B2 (en) | System and method for identifying and comparing code by semantic abstractions | |
Farhadi et al. | Binclone: Detecting code clones in malware | |
Pak | Hybrid fuzz testing: Discovering software bugs via fuzzing and symbolic execution | |
Cesare et al. | Malwise—an effective and efficient classification system for packed and polymorphic malware | |
Crussell et al. | Andarwin: Scalable detection of android application clones based on semantics | |
Nouh et al. | Binsign: fingerprinting binary functions to support automated analysis of code executables | |
Loring et al. | Sound regular expression semantics for dynamic symbolic execution of JavaScript | |
Rad et al. | Metamorphic virus variants classification using opcode frequency histogram | |
Keivanloo et al. | SeByte: Scalable clone and similarity search for bytecode | |
Farhadi et al. | Scalable code clone search for malware analysis | |
Cheers et al. | A novel approach for detecting logic similarity in plagiarised source code | |
Alrabaee et al. | On leveraging coding habits for effective binary authorship attribution | |
US10929531B1 (en) | Automated scoring of intra-sample sections for malware detection | |
Cheers et al. | A novel graph-based program representation for java code plagiarism detection | |
Alam et al. | Droidclone: Attack of the android malware clones-a step towards stopping them | |
Lv et al. | BovdGFE: buffer overflow vulnerability detection based on graph feature extraction | |
Alrabaee et al. | Decoupling coding habits from functionality for effective binary authorship attribution | |
Jin et al. | Fumvar: a practical framework for generating f ully-working and u nseen m alware var iants | |
WO2018116522A1 (en) | Determination device, determination method, and determination program | |
Saebjornsen | Detecting fine-grained similarity in binaries | |
Ghosh et al. | An empirical study of a hybrid code clone detection approach on java byte code | |
Shaw et al. | Mining android apps to predict market ratings |