TY - GEN
T1 - A first step towards algorithm plagiarism detection
AU - Zhang, Fangfang
AU - Jhi, Yoon Chan
AU - Wu, Dinghao
AU - Liu, Peng
AU - Zhu, Sencun
PY - 2012
Y1 - 2012
N2 - In this work, we address the problem of algorithm plagiarism, which occurs when a plagiarist, violating intellectual property rights, steals others' algorithms and covertly implements them. In contrast to software plagiarism, which has been extensively studied, limited attention has been paid to algorithm plagiarism. In this paper, we propose two dynamic value-based approaches, namely N-version and annotation, for algorithm plagiarism detection. Our approaches are motivated by the observation that there exist some critical runtime values which are irreplaceable and uneliminatable for all implementations of the same algorithm. The N-version approach extracts such values by filtering out non-core values. The annotation approach leverages auxiliary information to flag important variables which contain core values. We also propose a value dependence graph based similarity metric in addition to the longest common subsequence based one, in order to address the potential value reordering attack. We have implemented a prototype and evaluated the proposed schemes on various algorithms. The results show that our approaches to algorithm plagiarism detection are practical, effective and resilient to many automatic obfuscation techniques.
AB - In this work, we address the problem of algorithm plagiarism, which occurs when a plagiarist, violating intellectual property rights, steals others' algorithms and covertly implements them. In contrast to software plagiarism, which has been extensively studied, limited attention has been paid to algorithm plagiarism. In this paper, we propose two dynamic value-based approaches, namely N-version and annotation, for algorithm plagiarism detection. Our approaches are motivated by the observation that there exist some critical runtime values which are irreplaceable and uneliminatable for all implementations of the same algorithm. The N-version approach extracts such values by filtering out non-core values. The annotation approach leverages auxiliary information to flag important variables which contain core values. We also propose a value dependence graph based similarity metric in addition to the longest common subsequence based one, in order to address the potential value reordering attack. We have implemented a prototype and evaluated the proposed schemes on various algorithms. The results show that our approaches to algorithm plagiarism detection are practical, effective and resilient to many automatic obfuscation techniques.
UR - http://www.scopus.com/inward/record.url?scp=84865283994&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84865283994&partnerID=8YFLogxK
U2 - 10.1145/04000800.2336767
DO - 10.1145/04000800.2336767
M3 - Conference contribution
AN - SCOPUS:84865283994
SN - 9781450314541
T3 - 2012 International Symposium on Software Testing and Analysis, ISSTA 2012 - Proceedings
SP - 111
EP - 121
BT - 2012 International Symposium on Software Testing and Analysis, ISSTA 2012 - Proceedings
T2 - 21st International Symposium on Software Testing and Analysis, ISSTA 2012
Y2 - 15 July 2012 through 20 July 2012
ER -