{"title":"软件取证:旧方法催生新科学","authors":"P. Sallis, A. Aakjaer, Stephen G. MacDonell","doi":"10.1109/SEEP.1996.534037","DOIUrl":null,"url":null,"abstract":"Over the past few years there has been a renewed interest in the science of software authorship identification; this area of research has been termed 'software forensics'. This paper examines the range of possible measures that can be used to establish commonality and variance in programmer style, with a view to determining program authorship. It also describes some applications of these techniques, particularly for establishing the originator of programs in cases of security breach, plagiarism and computer fraud.","PeriodicalId":416862,"journal":{"name":"Proceedings 1996 International Conference Software Engineering: Education and Practice","volume":"79 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"50","resultStr":"{\"title\":\"Software forensics: old methods for a new science\",\"authors\":\"P. Sallis, A. Aakjaer, Stephen G. MacDonell\",\"doi\":\"10.1109/SEEP.1996.534037\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Over the past few years there has been a renewed interest in the science of software authorship identification; this area of research has been termed 'software forensics'. This paper examines the range of possible measures that can be used to establish commonality and variance in programmer style, with a view to determining program authorship. It also describes some applications of these techniques, particularly for establishing the originator of programs in cases of security breach, plagiarism and computer fraud.\",\"PeriodicalId\":416862,\"journal\":{\"name\":\"Proceedings 1996 International Conference Software Engineering: Education and Practice\",\"volume\":\"79 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"50\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings 1996 International Conference Software Engineering: Education and Practice\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SEEP.1996.534037\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings 1996 International Conference Software Engineering: Education and Practice","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SEEP.1996.534037","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Over the past few years there has been a renewed interest in the science of software authorship identification; this area of research has been termed 'software forensics'. This paper examines the range of possible measures that can be used to establish commonality and variance in programmer style, with a view to determining program authorship. It also describes some applications of these techniques, particularly for establishing the originator of programs in cases of security breach, plagiarism and computer fraud.