Volume 36 Issue 4
Apr.  2010
Turn off MathJax
Article Contents
Li Hu, Liu Chao, Liu Nan, et al. Method and its system of Java source and byte code plagiarism detection[J]. Journal of Beijing University of Aeronautics and Astronautics, 2010, 36(4): 424-428. (in Chinese)
Citation: Li Hu, Liu Chao, Liu Nan, et al. Method and its system of Java source and byte code plagiarism detection[J]. Journal of Beijing University of Aeronautics and Astronautics, 2010, 36(4): 424-428. (in Chinese)

Method and its system of Java source and byte code plagiarism detection

  • Received Date: 29 Apr 2009
  • Publish Date: 30 Apr 2010
  • A plagiarism detection approach to detect both Java source code and byte code was proposed. The proposed method compares Java source files or class files by multiple similarity measures developed to represent the syntax structures and semantic features of the programs. An efficient plagiarism detection tool using the proposed technique was developed to analyze plagiarism behavior of Java source code or class code. Statistical analysis and several graphical visualizations aid in the interpretation of analysis results. An experimental comparison with a typical commercial source code plagiarism detection tool as well as a case study by applying the tool to plagiarism detection with a set of manually modified programs were conducted. Experiment results show that the tool is more efficient and the proposed technique can recognize both exact copy and approximate copy, including those most of the types of source code transformations in program plagiarism behavior.

     

  • loading
  • [1] Matthias R.Effective clone detection without language barriers .Switzerland:Institut fur Informatik und angewandte Mathematik,Bern University,2005  [2] Verco K L,Wise M J.Software for detecting suspected plagiarism: comparing structure and attribute counting systems //John R.Proceedings of 1st Australian Conference on Computer Science Education.New York:ACM,1996:81-88  [3] Baker B S,Manber U.Deducing similarities in Java sources from byte codes //Douglis F.Proceedings of Usenix Annual Technical Conference.Louisiana: USENIX,1998  [4] Tamada H,Nakamura M,Monden A.Design and evaluation of birthmarks for detecting theft of Java programs //Proceedings of the IASTED International Conference on Software Engineering.Innsbruck:IASTED,2004:569-574  [5] Parker A,Hamblen J.Computer algorithms for plagiarism detection[J].IEEE Transactions on Education,1989,32(2): 94-99  [6] Faidhi J A,Robinson S K.An empirical approach for detecting program similarity and plagiarism within a university programming environment[J].Computers and Education,1987,11(1):11-19  [7] Simian:Similarity analyser .Australia:Redhill Consulting LTD,2008 .http://www.redhillconsulting.com.au/products/simian/
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views(2987) PDF downloads(2266) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return