Code Authorship Attribution: Methods and Challenges

作者: Vaibhavi Kalgutkar , Ratinder Kaur , Hugo Gonzalez , Natalia Stakhanova , Alina Matyukhina

DOI: 10.1145/3292577

关键词:

摘要: … in code authorship attribution. Figure 1 shows a timeline of publications related to authorship attribution. … of code attribution research. Although a number of general surveys discuss the …

参考文章(87)
P. W. Oman, C. R. Cook, Programming style authorship analysis Proceedings of the seventeenth annual ACM conference on Computer science : Computing trends in the 1990's Computing trends in the 1990's - CSC '89. pp. 320- 326 ,(1989) , 10.1145/75427.75469
Michael J. Wise, YAP3: improved detection of similarities in computer program and other texts technical symposium on computer science education. ,vol. 28, pp. 130- 134 ,(1996) , 10.1145/236452.236525
Robert Layton, Paul Watters, Richard Dazeley, Unsupervised authorship analysis of phishing webpages international symposium on communications and information technologies. pp. 1104- 1109 ,(2012) , 10.1109/ISCIT.2012.6380857
Robert Charles Lange, Spiros Mancoridis, Using code metric histograms and genetic algorithms to perform author identification for software forensics Proceedings of the 9th annual conference on Genetic and evolutionary computation - GECCO '07. pp. 2082- 2089 ,(2007) , 10.1145/1276958.1277364
Matthew F. Tennyson, Francisco J. Mitropoulos, Choosing a profile length in the SCAP method of source code authorship attribution southeastcon. pp. 1- 6 ,(2014) , 10.1109/SECON.2014.6950705
Xinran Wang, Yoon-Chan Jhi, Sencun Zhu, Peng Liu, Behavior based software theft detection computer and communications security. pp. 280- 290 ,(2009) , 10.1145/1653662.1653696
John L. Donaldson, Ann-Marie Lancaster, Paula H. Sposato, A plagiarism detection system technical symposium on computer science education. ,vol. 13, pp. 21- 25 ,(1981) , 10.1145/800037.800955
P. Sallis, A. Aakjaer, S. MacDonell, Software forensics: old methods for a new science international conference on software engineering. pp. 481- 485 ,(1996) , 10.1109/SEEP.1996.534037
Nathan Rosenblum, Barton P. Miller, Xiaojin Zhu, Recovering the toolchain provenance of binary code Proceedings of the 2011 International Symposium on Software Testing and Analysis - ISSTA '11. pp. 100- 110 ,(2011) , 10.1145/2001420.2001433
G. Whale, Identification of Program Similarity in Large Populations The Computer Journal. ,vol. 33, pp. 140- 146 ,(1990) , 10.1093/COMJNL/33.2.140