sourcecode plagiarism is a persistent problem in undergraduate computer science education. Unfortunately, it is a widespread phenomena with many students plagiarising either because they are unwilling or incapable of...
详细信息
ISBN:
(纸本)9781450376860
sourcecode plagiarism is a persistent problem in undergraduate computer science education. Unfortunately, it is a widespread phenomena with many students plagiarising either because they are unwilling or incapable of completing their own work. Many sourcecode plagiarism detection tools have been proposed to identify suspected cases of sourcecode plagiarism. However, these tools are not resilient to pervasive plagiarism-hiding transformations that significantly change the structure of sourcecode. In this paper, two case studies are presented that explore how resilient current sourcecode plagiarism detection tools are to plagiarism-hiding transformations. Furthermore, an evaluation of a new advanced technique for sourcecode plagiarism detection is presented to show that is it possible to identify pervasive cases of sourcecode plagiarism. The results of this evaluation indicate the technique is robust in its ability to identify the same program after it has been transformed.
The main goal of obfuscation is to make software difficult to analyze. Although obfuscation is one useful method to protect programs, the ability to analyze malware is greatly reduced if used for malicious purposes. T...
详细信息
The main goal of obfuscation is to make software difficult to analyze. Although obfuscation is one useful method to protect programs, the ability to analyze malware is greatly reduced if used for malicious purposes. The obfuscation technique is most applicable at the binary level, but it can also be applied at the sourcecode level. Although source-level techniques can be applied regardless of the target platform, these are often optimized and eliminated during compilation. However, when control-flow obfuscation is applied at the sourcecode level, removal is not possible. When applied for malicious purposes, the ability to analyze the sourcecode and compiled binary code is greatly reduced. To date, no research has presented a method that increases the readability of sourcecode or the ability to analyze compiled binaries via optimization at the source level. In this paper, we select a very powerful obfuscation tool that provides options, including control-flow obfuscation, at the source level. The result of our research is a tool that outputs optimized sourcecode and performs control-flow reconstruction as preprocessing, which increases readability even when control-flow obfuscation has been applied. The results also suggest an improvement in the ability to analyze binary code. As a result, more than 70% of the sourcecode can be optimized at the source level, and the control-flow graph can be serialized. The optimized sourcecode compiles more concise binary code even if no compiler optimizations are applied. Finally, the paper concludes by presenting the results of a module that prevents deobfuscation through code tampering (preventive obfuscation) at the sourcecode level.
暂无评论