引用本文: |
-
田振洲,刘烃,郑庆华,佟菲菲,吴定豪,朱森存,陈恺.软件抄袭检测研究综述[J].信息安全学报,2016,1(3):52-76 [点击复制]
- TIAN Zhenzhou,LIU Ting,ZHENG Qinghua,TONG Feifei,WU Dinghao,ZHU Sencun,CHEN Kai.Software Plagiarism Detection: A Survey[J].Journal of Cyber Security,2016,1(3):52-76 [点击复制]
|
|
摘要: |
随着开源软件项目的蓬勃发展,软件抄袭俨然已成为软件生态环境健康发展的威胁之一,其得到越来越多的研究人员、教育人员、开源社区及软件企业的关注,软件抄袭检测对于软件知识产权保护具有重要意义。本文对软件抄袭检测的研究现状和进展进行综述。首先介绍软件抄袭检测的意义和威胁模型;然后,根据应用场景和技术手段,从源代码抄袭检测、无源码场景下基于软件水印和基于软件胎记的抄袭检测三个方面,对现有软件抄袭检测技术进行阐述和比较;最后,通过分析软件抄袭检测研究存在的问题及其面临的挑战和实际需求,对未来研究方向进行了展望。 |
关键词: 知识产权保护 软件保护 软件抄袭 软件抄袭检测 软件胎记 代码相似性分析 软件水印 代码混淆 |
DOI:10.19363/j.cnki.cn10-1380/tn.2016.03.005 |
投稿时间:2016-06-26修订日期:2016-07-07 |
基金项目:本课题得到国家自然科学基金(91118005,91218301,61221063,61428206,61203174,91418205,61472318,1500365);教育部创新团队(IRT13035);国家科技支撑计划(2013BAK09B01)资助。 |
|
Software Plagiarism Detection: A Survey |
TIAN Zhenzhou1, LIU Ting1, ZHENG Qinghua1, TONG Feifei1, WU Dinghao2, ZHU Sencun2,3, CHEN Kai4
|
(1.Ministry of Education Key Lab For Intelligent Networks and Network Security, Xi'an Jiaotong University, Xi'an 710049, China;2.Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA 16802, USA;3.College of Information Sciences and Technology, Pennsylvania State University, University Park, PA 16802, USA;4.Institute of Information Engineering, Chinese Academy of Science, Beijing 100093, China) |
Abstract: |
With the burst of free and open source software projects, software plagiarism has become a serious threat to the healthy development of the software ecosystem. Researchers, educators, open source developers, and software company managers are paying more and more attention to the problem. Software plagiarism detection is critical to the protection of software intellectual property. This paper provides a review of the state-of-the-art software plagiarism detection techniques. First, the significance and threat models of plagiarism detection are presented, followed by the description and comparison of existing techniques on plagiarism detection. We classify the existing methods into three major categories, including source-code plagiarism detection, software watermark based plagiarism detection and software birthmark based plagiarism detection, according to the scenarios they are designed for and applicable to as well as different principles adopted. Finally, through analyzing the limitations of the existing plagiarism detection techniques, the emerging challenges and practical requirements, we discuss several possible future research directions. |
Key words: intellectual property protection software protection software plagiarism software plagiarism detection software birthmark code similarity analysis software watermarking code obfuscation |