Nothing Special   »   [go: up one dir, main page]

Cheers et al., 2019 - Google Patents

A novel approach for detecting logic similarity in plagiarised source code

Cheers et al., 2019

Document ID
636380841111332357
Author
Cheers H
Lin Y
Smith S
Publication year
Publication venue
2019 IEEE 10th International Conference on Software Engineering and Service Science (ICSESS)

External Links

Snippet

Source code plagiarism is a persistent problem in computer science education. Many tools have been developed to identify indications of source code plagiarism in large data sets. These tools are good at identifying simple cases of plagiarism (eg renaming identifiers or …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • G06F17/30587Details of specialised database models
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • G06F17/30386Retrieval requests
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • G06F17/30289Database design, administration or maintenance
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/44Arrangements for executing specific programmes
    • G06F9/455Emulation; Software simulation, i.e. virtualisation or emulation of application or operating system execution engines
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/70Software maintenance or management
    • G06F8/75Structural analysis for program understanding
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/40Transformations of program code
    • G06F8/41Compilation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3604Software analysis for verifying properties of programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3409Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation; Recording or statistical evaluation of user activity, e.g. usability assessment for performance assessment
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • G06N5/02Knowledge representation
    • G06N5/022Knowledge engineering, knowledge acquisition

Similar Documents

Publication Publication Date Title
CN110162296B (en) Method and device for generating application programming interface document and terminal equipment
Cesare et al. Control flow-based malware variantdetection
Lam et al. Context-sensitive program analysis as database queries
US11481494B2 (en) System and method for identifying and comparing code by semantic abstractions
Farhadi et al. Binclone: Detecting code clones in malware
Pak Hybrid fuzz testing: Discovering software bugs via fuzzing and symbolic execution
Cesare et al. Malwise—an effective and efficient classification system for packed and polymorphic malware
Crussell et al. Andarwin: Scalable detection of android application clones based on semantics
Nouh et al. Binsign: fingerprinting binary functions to support automated analysis of code executables
Loring et al. Sound regular expression semantics for dynamic symbolic execution of JavaScript
Rad et al. Metamorphic virus variants classification using opcode frequency histogram
Keivanloo et al. SeByte: Scalable clone and similarity search for bytecode
Farhadi et al. Scalable code clone search for malware analysis
Cheers et al. A novel approach for detecting logic similarity in plagiarised source code
Alrabaee et al. On leveraging coding habits for effective binary authorship attribution
US10929531B1 (en) Automated scoring of intra-sample sections for malware detection
Cheers et al. A novel graph-based program representation for java code plagiarism detection
Alam et al. Droidclone: Attack of the android malware clones-a step towards stopping them
Lv et al. BovdGFE: buffer overflow vulnerability detection based on graph feature extraction
Alrabaee et al. Decoupling coding habits from functionality for effective binary authorship attribution
Jin et al. Fumvar: a practical framework for generating f ully-working and u nseen m alware var iants
WO2018116522A1 (en) Determination device, determination method, and determination program
Saebjornsen Detecting fine-grained similarity in binaries
Ghosh et al. An empirical study of a hybrid code clone detection approach on java byte code
Shaw et al. Mining android apps to predict market ratings