{"title":"Author Identification of Software Source Code with Program Dependence Graphs","authors":"Rong Chen, Lina Hong, Chunyan Lü, Wu Deng","doi":"10.1109/COMPSACW.2010.56","DOIUrl":null,"url":null,"abstract":"With the significant increase of computer and Internet based crimes, it becomes increasingly important to have techniques that can be applied in a legal setting to assist the court in making judgements about malware, theft of code and computer fraud. To better deal with author identification of software, we propose a semantic approach to identifying authorship through the comparison of program data flows. To do so, we compute program dependences, compute program similarity if detecting theft of code is needed, and thus query about not only the syntactic structure of programs but also the data flow within in order to discriminate authors. The experimental result reveals that our technique is more robust even with some intentional code modifications.","PeriodicalId":121135,"journal":{"name":"2010 IEEE 34th Annual Computer Software and Applications Conference Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"11","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 IEEE 34th Annual Computer Software and Applications Conference Workshops","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/COMPSACW.2010.56","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 11
Abstract
With the significant increase of computer and Internet based crimes, it becomes increasingly important to have techniques that can be applied in a legal setting to assist the court in making judgements about malware, theft of code and computer fraud. To better deal with author identification of software, we propose a semantic approach to identifying authorship through the comparison of program data flows. To do so, we compute program dependences, compute program similarity if detecting theft of code is needed, and thus query about not only the syntactic structure of programs but also the data flow within in order to discriminate authors. The experimental result reveals that our technique is more robust even with some intentional code modifications.