메뉴 건너뛰기




Volumn , Issue , 2012, Pages 111-121

A first step towards algorithm plagiarism detection

Author keywords

Algorithm plagiarism detection; N version programming; program slicing; software plagiarism detection

Indexed keywords

AUXILIARY INFORMATION; CORE VALUES; DEPENDENCE GRAPHS; INTELLECTUAL PROPERTY RIGHTS; LONGEST COMMON SUBSEQUENCES; N VERSION PROGRAMMING; PLAGIARISM DETECTION; POTENTIAL VALUES; PROGRAM SLICING; RUNTIMES; SIMILARITY METRICS; SOFTWARE PLAGIARISMS; VALUE-BASED APPROACH;

EID: 84865283994     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/04000800.2336767     Document Type: Conference Paper
Times cited : (55)

References (38)
  • 3
    • 84904098864 scopus 로고    scopus 로고
    • Semantic designs inc. C source code obfuscator. http://www.semdesigns. com/products/obfuscators/CObfuscator.html.
    • C Source Code Obfuscator
  • 4
    • 0022252695 scopus 로고
    • The n-version approach to fault-tolerant software
    • 11, December
    • A. Avizienis. The n-version approach to fault-tolerant software. IEEE Trans. Softw. Eng., 11, December 1985.
    • (1985) IEEE Trans. Softw. Eng.
    • Avizienis, A.1
  • 8
    • 70349141059 scopus 로고    scopus 로고
    • On the limits of information flow techniques for malware analysis and containment
    • L. Cavallaro, P. Saxena, and R. Sekar. On the limits of information flow techniques for malware analysis and containment. In DIMVA' 08, 2008.
    • (2008) DIMVA' 08
    • Cavallaro, L.1    Saxena, P.2    Sekar, R.3
  • 15
    • 84885626052 scopus 로고    scopus 로고
    • GrammaTech. Codesurfer. http://www.grammatech.com.
    • Codesurfer
  • 19
    • 0036648690 scopus 로고    scopus 로고
    • Ccfinder: A multilinguistic token-based code clone detection system for large scale source code
    • 28, July
    • T. Kamiya, S. Kusumoto, and K. Inoue. Ccfinder: a multilinguistic token-based code clone detection system for large scale source code. IEEE Trans. Softw. Eng., 28, July 2002.
    • (2002) IEEE Trans. Softw. Eng.
    • Kamiya, T.1    Kusumoto, S.2    Inoue, K.3
  • 20
    • 24044475960 scopus 로고    scopus 로고
    • Addison-Wesley Longman Publishing Co., Inc.
    • J. Kleinberg and E. Tardos. Algorithm Design. Addison-Wesley Longman Publishing Co., Inc., 2005.
    • (2005) Algorithm Design
    • Kleinberg, J.1    Tardos, E.2
  • 26
    • 35048854764 scopus 로고    scopus 로고
    • Detecting software theft via whole program path birthmarks
    • G. Myles and C. Collberg. Detecting software theft via whole program path birthmarks. Information Security, 3225/2004:404-415, 2004.
    • (2004) Information Security , vol.3225 , Issue.2004 , pp. 404-415
    • Myles, G.1    Collberg, C.2
  • 28
    • 79953672829 scopus 로고    scopus 로고
    • Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
    • J. Newsome and D. Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In Proceedings of the NDSS 2005, 2005.
    • Proceedings of the NDSS 2005, 2005
    • Newsome, J.1    Song, D.2
  • 37
    • 77950834638 scopus 로고    scopus 로고
    • Detecting software theft via system call based birthmarks
    • X. Wang, Y.-C. Jhi, S. Zhu, and P. Liu. Detecting software theft via system call based birthmarks. In ACSAC, 2009.
    • (2009) ACSAC
    • Wang, X.1    Jhi, Y.-C.2    Zhu, S.3    Liu, P.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.