• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Tian Zhenzhou, Wang Ningning, Wang Qing, Gao Cong, Liu Ting, Zheng Qinghua. Plagiarism Detection of Multi-Threaded Programs by Mining Behavioral motifs[J]. Journal of Computer Research and Development, 2020, 57(1): 202-213. DOI: 10.7544/issn1000-1239.2020.20180871
Citation: Tian Zhenzhou, Wang Ningning, Wang Qing, Gao Cong, Liu Ting, Zheng Qinghua. Plagiarism Detection of Multi-Threaded Programs by Mining Behavioral motifs[J]. Journal of Computer Research and Development, 2020, 57(1): 202-213. DOI: 10.7544/issn1000-1239.2020.20180871

Plagiarism Detection of Multi-Threaded Programs by Mining Behavioral motifs

Funds: This work was supported by the National Natural Science Foundation of China (61702414), the Natural Science Basic Research Program of Shaanxi (2018JQ6078), the International Science and Technology Cooperation Program of Shaanxi Province (2018KW-049, 2019KW-008), and the Key Research and Development Program of Shaanxi Province (2019ZDLGY07-08).
More Information
  • Published Date: December 31, 2019
  • Thread scheduling nondeterminism in multi-threaded programs severely perturbs dynamic birthmarking techniques, which serves as one of the most promising approaches in solving obfuscation-resilient software plagiarism detection problem. In the extreme cases, a traditional dynamic birthmarking method even fails to detect plagiarism between a multi-threaded program and itself. To solve the problem, a novel method for plagiarism detection of multi-threaded programs is proposed by abstracting behavioral motifs, which are less susceptible to thread scheduling, from the similar parts of same-input-driven execution traces of a multi-threaded program. Specifically, the method captures execution traces during program runs, from which a series of motifs are inferred by performing trace pruning, gram-based matching, as well as bidirectional extending and abstraction, to depict the behavior of the multi-threaded program. Plagiarism between two programs is then determined by measuring the similarity of their motifs and a threshold. An empirical study conducted on a public benchmark consisting of totally 234 different versions of multi-threaded programs shows that the proposed method is resilient against most state-of-the-art code obfuscation techniques and outperforms two existing dynamic birthmarking methods TreSB (thread-related system call birthmark) and TOB (thread-oblivious birthmark) framework which also target multi-threaded program plagiarism detection. It indicates that the mined behavioral motifs form a new kind of robust thread-oblivious birthmark.
  • Related Articles

    [1]Wang Jingjing, Wang Yanhao, Jiang Wenjun, Zeng Yifu, Zhu Tuanfei. Fast Algorithm for Approximate Motif Counting in Temporal Graph Streams[J]. Journal of Computer Research and Development, 2025, 62(3): 709-719. DOI: 10.7544/issn1000-1239.202330788
    [2]Xu Mingda, Zhang Zike, Xu Xiaoke. Research on Spreading Mechanism of False Information in Social Networks by Motif Degree[J]. Journal of Computer Research and Development, 2021, 58(7): 1425-1435. DOI: 10.7544/issn1000-1239.2021.20200806
    [3]Tian Junfeng, Cao Xun. A Cloud User Behavior Authentication Model Based on Multi-Partite Graphs[J]. Journal of Computer Research and Development, 2014, 51(10): 2308-2317. DOI: 10.7544/issn1000-1239.2014.20130619
    [4]Li Zhen, Tian Junfeng, and Yang Xiaohui. Program Behavior Monitoring Based on System Call Attributes[J]. Journal of Computer Research and Development, 2012, 49(8): 1676-1684.
    [5]Tian Junfeng, Han Jine, Du Ruizhong, and Wang Yong. Creditability Evaluation Model Based on Software Behavior Trace[J]. Journal of Computer Research and Development, 2012, 49(7): 1514-1524.
    [6]Zhao Tianlei, Tang Yuxing, Fu Guitao, Jia Xiaomin, Qi Shubo, and Zhang Minxuan. Accelerating Program Behavior Analysis with Dynamic Binary Translation[J]. Journal of Computer Research and Development, 2012, 49(1): 35-43.
    [7]Wu Huaiguang, Wu Guoqing, Chen Shu, and Wan Li. A Software Behavior Oriented Requirements Model and Properties Verification[J]. Journal of Computer Research and Development, 2011, 48(5): 869-876.
    [8]Liu Ying, Zhang Yichuan, Zhang Bin, Zhang Mingwei, Zhu Zhiliang. Analysis of Service Replaceability on Behavior Effect[J]. Journal of Computer Research and Development, 2010, 47(8): 1442-1449.
    [9]Tong Xiangrong, Huang Houkuan, Zhang Wei. Prediction and Abnormal Behavior Detection of Agent Dynamic Interaction Trust[J]. Journal of Computer Research and Development, 2009, 46(8): 1364-1370.
    [10]Lin Chuang, Tian Liqin, Wang Yuanzhuo. Research on User Behavior Trust in Trustworthy Network[J]. Journal of Computer Research and Development, 2008, 45(12): 2033-2043.
  • Cited by

    Periodical cited type(0)

    Other cited types(2)

Catalog

    Article views (918) PDF downloads (300) Cited by(2)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return