Baer et al., 2012 - Google Patents
Measuring whitespace pattern sequences as an indication of plagiarismBaer et al., 2012
View HTML- Document ID
- 13199824308317882076
- Author
- Baer N
- Zeidman R
- Publication year
External Links
Snippet
There are several methods and technologies for comparing the statements, comments, strings, identifiers, and other visible elements of source code in order to efficiently identify similarity. In a prior paper we found that comparing the whitespace patterns was not precise …
- 238000001914 filtration 0 description 17
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30289—Database design, administration or maintenance
- G06F17/30303—Improving data quality; Data cleansing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/3604—Software analysis for verifying properties of programs
- G06F11/3612—Software analysis for verifying properties of programs by runtime analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/3668—Software testing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F19/00—Digital computing or data processing equipment or methods, specially adapted for specific applications
- G06F19/10—Bioinformatics, i.e. methods or systems for genetic or protein-related data processing in computational molecular biology
- G06F19/22—Bioinformatics, i.e. methods or systems for genetic or protein-related data processing in computational molecular biology for sequence comparison involving nucleotides or amino acids, e.g. homology search, motif or SNP [Single-Nucleotide Polymorphism] discovery or sequence alignment
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/20—Handling natural language data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/50—Computer-aided design
- G06F17/5009—Computer-aided design using simulation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2201/00—Indexing scheme relating to error detection, to error correction, and to monitoring
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Ragkhitwetsagul et al. | A comparison of code similarity analysers | |
Spafford et al. | Software forensics: Can we track code to its authors? | |
Sæbjørnsen et al. | Detecting code clones in binary executables | |
Nishi et al. | Scalable code clone detection and search based on adaptive prefix filtering | |
Doogan et al. | Topic model or topic twaddle? Re-evaluating demantic interpretability measures | |
Ragkhitwetsagul et al. | Similarity of source code in the presence of pervasive modifications | |
Breitinger et al. | Approximate matching: definition and terminology | |
Hage et al. | A comparison of plagiarism detection tools | |
Martins et al. | Plagiarism detection: A tool survey and comparison | |
Yuan et al. | Boreas: an accurate and scalable token-based approach to code clone detection | |
WO2021182986A1 (en) | Method and system for searching for similar malicious programs on the basis of dynamic analysis results | |
Feng et al. | Hierarchical abstraction of execution traces for program comprehension | |
Nakagawa et al. | Nil: large-scale detection of large-variance clones | |
Wu et al. | Lvmapper: A large-variance clone detector using sequencing alignment approach | |
US20080052662A1 (en) | Software For Filtering The Results Of A Software Source Code Comparison | |
Allyson et al. | Sherlock N-Overlap: invasive normalization and overlap coefficient for the similarity analysis between source code | |
Kuang et al. | Can method data dependencies support the assessment of traceability between requirements and source code? | |
Bendík | Consistency checking in requirements analysis | |
Baer et al. | Measuring whitespace pattern sequences as an indication of plagiarism | |
Yang et al. | Silent compiler bug de-duplication via three-dimensional analysis | |
Milea et al. | Vector abstraction and concretization for scalable detection of refactorings | |
Mariani et al. | AuDeNTES: Automatic detection of tentative plagiarism according to a reference solution | |
Zhang et al. | Common program similarity metric method for anti-obfuscation | |
Krinke et al. | Code similarity in clone detection | |
Orvalho et al. | InvAASTCluster: On applying invariant-based program clustering to introductory programming assignments |