Detecting plagiarism in student Pascal programs
The Computer Journal
Identifying the semantic and textual differences between two versions of a program
PLDI '90 Proceedings of the ACM SIGPLAN 1990 conference on Programming language design and implementation
Copy detection mechanisms for digital documents
SIGMOD '95 Proceedings of the 1995 ACM SIGMOD international conference on Management of data
Building a scalable and accurate copy detection mechanism
Proceedings of the first ACM international conference on Digital libraries
Parameterized pattern matching: algorithms and applications
Journal of Computer and System Sciences
Parameterized Duplication in Strings: Algorithms and an Application to Software Maintenance
SIAM Journal on Computing
Manufacturing cheap, resilient, and stealthy opaque constructs
POPL '98 Proceedings of the 25th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Syntactic clustering of the Web
Selected papers from the sixth international conference on World Wide Web
Java Virtual Machine Specification
Java Virtual Machine Specification
The UNIX Programming Environment
The UNIX Programming Environment
Substring Matching for Clone Detection and Change Tracking
ICSM '94 Proceedings of the International Conference on Software Maintenance
Tamper Resistant Software: An Implementation
Proceedings of the First International Workshop on Information Hiding
On finding duplication and near-duplication in large software systems
WCRE '95 Proceedings of the Second Working Conference on Reverse Engineering
Breaking Abstractions and Unstructuring Data Structures
ICCL '98 Proceedings of the 1998 International Conference on Computer Languages
Measurements of program similarity in identical task environments
ACM SIGPLAN Notices
Krakatoa: decompilation in java (dose bytecode reveal source?)
COOTS'97 Proceedings of the 3rd conference on USENIX Conference on Object-Oriented Technologies (COOTS) - Volume 3
On the limits of steganography
IEEE Journal on Selected Areas in Communications
Proceedings of the tenth annual ACM-SIAM symposium on Discrete algorithms
Forensic engineering techniques for VLSI CAD tools
Proceedings of the 37th Annual Design Automation Conference
Compiler techniques for code compaction
ACM Transactions on Programming Languages and Systems (TOPLAS)
Proceedings of the 38th annual Design Automation Conference
Combining Global Code and Data Compaction
OM '01 Proceedings of the 2001 ACM SIGPLAN workshop on Optimization of middleware and distributed systems
Sifting out the mud: low level C++ code reuse
OOPSLA '02 Proceedings of the 17th ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications
Computational Forensic Techniques for Intellectual Property Protection
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Intellectual Property Metering
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
On the side-effects of code abstraction
Proceedings of the 2003 ACM SIGPLAN conference on Language, compiler, and tool for embedded systems
Winnowing: local algorithms for document fingerprinting
Proceedings of the 2003 ACM SIGMOD international conference on Management of data
Plagiarism detection of text using knowledge-based techniques
Design and application of hybrid intelligent systems
K-gram based software birthmarks
Proceedings of the 2005 ACM symposium on Applied computing
Link-time binary rewriting techniques for program compaction
ACM Transactions on Programming Languages and Systems (TOPLAS)
Software watermarking in the frequency domain: implementation, analysis, and attacks
Journal of Computer Security - Special issue on security track at ACM symposium on applied computing 2004
ACM Transactions on Programming Languages and Systems (TOPLAS)
Efficient plagiarism detection for large code repositories
Software—Practice & Experience
Dynamic graph-based software fingerprinting
ACM Transactions on Programming Languages and Systems (TOPLAS)
Comparison and evaluation of code clone detection techniques and tools: A qualitative approach
Science of Computer Programming
Clone detection via structural abstraction
Software Quality Control
Clone detection by exploiting assembler
Proceedings of the 4th International Workshop on Software Clones
Clone detection through process algebras and Java bytecode
Proceedings of the 5th International Workshop on Software Clones
Juxtapp: a scalable system for detecting code reuse among android applications
DIMVA'12 Proceedings of the 9th international conference on Detection of Intrusions and Malware, and Vulnerability Assessment
Similarity in languages and programs
Theoretical Computer Science
Systematic audit of third-party android phones
Proceedings of the 4th ACM conference on Data and application security and privacy
Hi-index | 0.00 |
Several techniques for detecting similarities of Java programs from bytecode files, without access to the source, are introduced in this paper. These techniques can be used to compare two files, to find similarities among thousands of files, or to compare one new file to an index of many old ones. Experimental results indicate that these techniques can be very effective. Even changes of 30% to the source file will usually result in bytecode that can be associated with the original. Several applications are discussed.