Program Characterization Using Runtime Values and Its Application to Software Plagiarism Detection
Illegal code reuse has become a serious threat to the software community. Identifying similar or identical code fragments becomes much more challenging in code theft cases where plagiarizers can use various automated code transformation or obfuscation techniques to hide stolen code from being detect...
Saved in:
| Published in: | IEEE transactions on software engineering Vol. 41; no. 9; pp. 925 - 943 |
|---|---|
| Main Authors: | , , , , , |
| Format: | Journal Article |
| Language: | English |
| Published: |
New York
IEEE
01.09.2015
IEEE Computer Society |
| Subjects: | |
| ISSN: | 0098-5589, 1939-3520 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Abstract | Illegal code reuse has become a serious threat to the software community. Identifying similar or identical code fragments becomes much more challenging in code theft cases where plagiarizers can use various automated code transformation or obfuscation techniques to hide stolen code from being detected. Previous works in this field are largely limited in that (i) most of them cannot handle advanced obfuscation techniques, and (ii) the methods based on source code analysis are not practical since the source code of suspicious programs typically cannot be obtained until strong evidences have been collected. Based on the observation that some critical runtime values of a program are hard to be replaced or eliminated by semantics-preserving transformation techniques, we introduce a novel approach to dynamic characterization of executable programs. Leveraging such invariant values, our technique is resilient to various control and data obfuscation techniques. We show how the values can be extracted and refined to expose the critical values and how we can apply this runtime property to help solve problems in software plagiarism detection. We have implemented a prototype with a dynamic taint analyzer atop a generic processor emulator. Our value-based plagiarism detection method (VaPD) uses the longest common subsequence based similarity measuring algorithms to check whether two code fragments belong to the same lineage. We evaluate our proposed method through a set of real-world automated obfuscators. Our experimental results show that the value-based method successfully discriminates 34 plagiarisms obfuscated by SandMark, plagiarisms heavily obfuscated by KlassMaster, programs obfuscated by Thicket, and executables obfuscated by Loco/Diablo. |
|---|---|
| AbstractList | Illegal code reuse has become a serious threat to the software community. Identifying similar or identical code fragments becomes much more challenging in code theft cases where plagiarizers can use various automated code transformation or obfuscation techniques to hide stolen code from being detected. Previous works in this field are largely limited in that (i) most of them cannot handle advanced obfuscation techniques, and (ii) the methods based on source code analysis are not practical since the source code of suspicious programs typically cannot be obtained until strong evidences have been collected. Based on the observation that some critical runtime values of a program are hard to be replaced or eliminated by semantics-preserving transformation techniques, we introduce a novel approach to dynamic characterization of executable programs. Leveraging such invariant values, our technique is resilient to various control and data obfuscation techniques. We show how the values can be extracted and refined to expose the critical values and how we can apply this runtime property to help solve problems in software plagiarism detection. We have implemented a prototype with a dynamic taint analyzer atop a generic processor emulator. Our value-based plagiarism detection method (VaPD) uses the longest common subsequence based similarity measuring algorithms to check whether two code fragments belong to the same lineage. We evaluate our proposed method through a set of real-world automated obfuscators. Our experimental results show that the value-based method successfully discriminates 34 plagiarisms obfuscated by SandMark, plagiarisms heavily obfuscated by KlassMaster, programs obfuscated by Thicket, and executables obfuscated by Loco/Diablo. |
| Author | Xiaoqi Jia Xinran Wang Sencun Zhu Yoon-Chan Jhi Peng Liu Dinghao Wu |
| Author_xml | – sequence: 1 givenname: Yoon-Chan surname: Jhi fullname: Jhi, Yoon-Chan – sequence: 2 givenname: Xiaoqi surname: Jia fullname: Jia, Xiaoqi – sequence: 3 givenname: Xinran surname: Wang fullname: Wang, Xinran – sequence: 4 givenname: Sencun surname: Zhu fullname: Zhu, Sencun – sequence: 5 givenname: Peng surname: Liu fullname: Liu, Peng – sequence: 6 givenname: Dinghao surname: Wu fullname: Wu, Dinghao |
| BookMark | eNp9kE1LAzEQhoMo2Kp3wUvAi5etySbZbI5SP6Gg-HVdZrPZmrK7qUmK6K83teKhB08Dw_O8zLxjtDu4wSB0TMmEUqLOn5-uJjmhYpJzWkopd9CIKqYyJnKyi0aEqDITolT7aBzCghAipBQjVD94N_fQ4-kbeNDRePsF0boBvwQ7zPHjaoi2N_gVupUJGIYG38WAL5bLzuoNGB1-cm38AG_wQwdzC96GHl-aaPQaOER7LXTBHP3OA_RyffU8vc1m9zd304tZplnOY0aBS065BlM0uhbQ1JQBlWnDTaHylrYlzaHmrFGN5G2ds0aqsm6T3YpGSHaAzja5S-_e07Gx6m3QputgMG4VKioVy1OSEAk93UIXbuWHdF2iaCEJZ5QlqthQ2rsQvGkrbePPz9GD7SpKqnX1Vaq-Wldf_VafRLIlLr3twX_-p5xsFGuM-cMlkUXBBPsGbkuRcA |
| CODEN | IESEDJ |
| CitedBy_id | crossref_primary_10_1016_j_infsof_2020_106320 crossref_primary_10_1155_2021_9954520 crossref_primary_10_1002_cpe_5000 crossref_primary_10_1016_j_cose_2022_103023 crossref_primary_10_1080_23752696_2018_1563757 crossref_primary_10_1109_TR_2016_2570554 crossref_primary_10_1016_j_eswa_2020_114348 crossref_primary_10_1109_TSE_2022_3149240 crossref_primary_10_1007_s00521_022_07707_2 crossref_primary_10_1109_TSE_2017_2655046 crossref_primary_10_1109_TSE_2017_2688383 crossref_primary_10_1016_j_jss_2016_06_014 crossref_primary_10_1109_TSE_2018_2872958 crossref_primary_10_1145_3569933 crossref_primary_10_1109_ACCESS_2021_3069367 crossref_primary_10_1109_ACCESS_2021_3103186 crossref_primary_10_1007_s11042_018_5827_6 crossref_primary_10_1109_ACCESS_2020_3021184 crossref_primary_10_1109_ACCESS_2021_3094517 crossref_primary_10_1109_TDSC_2022_3223103 |
| Cites_doi | 10.1109/ICSE.2004.1317484 10.1002/spe.4380210706 10.1007/11424925_2 10.1109/CMPSAC.2003.1245338 10.1109/TSE.2002.1019480 10.1145/268946.268962 10.1109/WCRE.1995.514697 10.1145/2338965.2336767 10.1145/1066677.1066753 10.1145/1268784.1268807 10.1109/ICSM.1998.738528 10.1109/ICIS.2007.167 10.1145/872757.872770 10.1007/978-3-642-28166-2_11 10.1145/948148.948149 10.1109/WCRE.2001.957835 10.1145/1287624.1287634 10.1109/HONET.2008.4810236 10.1145/1572272.1572287 10.1145/1653662.1653696 10.1109/ISSRE.2014.18 10.1145/1150402.1150522 10.1145/1321631.1321672 10.1145/2635868.2635900 10.1145/2133601.2133640 10.1145/1368088.1368132 10.1007/978-3-540-44993-5_1 10.1109/MSECP.2003.1219058 |
| ContentType | Journal Article |
| Copyright | Copyright IEEE Computer Society Sep 1, 2015 |
| Copyright_xml | – notice: Copyright IEEE Computer Society Sep 1, 2015 |
| DBID | 97E RIA RIE AAYXX CITATION JQ2 K9. 7SC 7SP 8FD F28 FR3 L7M L~C L~D |
| DOI | 10.1109/TSE.2015.2418777 |
| DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005–Present IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef ProQuest Computer Science Collection ProQuest Health & Medical Complete (Alumni) Computer and Information Systems Abstracts Electronics & Communications Abstracts Technology Research Database ANTE: Abstracts in New Technology & Engineering Engineering Research Database Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
| DatabaseTitle | CrossRef ProQuest Health & Medical Complete (Alumni) ProQuest Computer Science Collection Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts Computer and Information Systems Abstracts Engineering Research Database Advanced Technologies Database with Aerospace ANTE: Abstracts in New Technology & Engineering Computer and Information Systems Abstracts Professional |
| DatabaseTitleList | Technology Research Database ProQuest Health & Medical Complete (Alumni) |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 1939-3520 |
| EndPage | 943 |
| ExternalDocumentID | 3818672271 10_1109_TSE_2015_2418777 7076635 |
| Genre | orig-research Feature |
| GrantInformation_xml | – fundername: US National Science Foundation (NSF) grantid: CCF-1320605; NSF CNS-1223710; NSF CNS-0905131; NSF CNS-0916469; AFOSR FA9550-07-1-0527; ARO W911NF-09-1-0525; ARO W911NF-13-1-0421 funderid: 10.13039/100000001 – fundername: National Natural Science Foundation of China (NSFC) grantid: 61100228 funderid: 10.13039/501100001809 – fundername: AFRL grantid: FA8750-08-C-0137 funderid: 10.13039/100006602 – fundername: National High-tech R&D Program of China grantid: 2012AA013101 – fundername: Strategic Priority Research Program of the Chinese Academy of Sciences grantid: XDA06030601; XDA06010701 funderid: 10.13039/501100002367 |
| GroupedDBID | --Z -DZ -~X .4S .DC 0R~ 29I 4.4 5GY 6IK 85S 8R4 8R5 97E AAJGR AARMG AASAJ AAWTH ABAZT ABPPZ ABQJQ ABVLG ACGFO ACGOD ACIWK ACNCT AENEX AGQYO AGSQL AHBIQ AKQYR ALMA_UNASSIGNED_HOLDINGS ASUFR ATWAV BEFXN BFFAM BGNUA BKEBE BKOMP BPEOZ CS3 DU5 EBS EDO EJD HZ~ I-F IEDLZ IFIPE IPLJI JAVBF LAI M43 MS~ O9- OCL P2P Q2X RIA RIE RNS RXW S10 TAE TN5 TWZ UHB UPT WH7 YZZ AAYXX CITATION JQ2 K9. 7SC 7SP 8FD F28 FR3 L7M L~C L~D |
| ID | FETCH-LOGICAL-c324t-1a47414cae6dcb5adb13a1714c4e692f1f812ab43d9d74fb23d798bfc32f5d573 |
| IEDL.DBID | RIE |
| ISICitedReferencesCount | 28 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000361700500005&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 0098-5589 |
| IngestDate | Thu Oct 02 11:14:04 EDT 2025 Fri Oct 03 04:01:20 EDT 2025 Tue Nov 18 22:21:57 EST 2025 Sat Nov 29 03:10:23 EST 2025 Wed Aug 27 02:47:44 EDT 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 9 |
| Keywords | Software plagiarism detection dynamic code identification |
| Language | English |
| License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c324t-1a47414cae6dcb5adb13a1714c4e692f1f812ab43d9d74fb23d798bfc32f5d573 |
| Notes | SourceType-Scholarly Journals-1 ObjectType-Feature-1 content type line 14 ObjectType-Article-1 ObjectType-Feature-2 content type line 23 |
| PQID | 1716704313 |
| PQPubID | 21418 |
| PageCount | 19 |
| ParticipantIDs | proquest_journals_1716704313 ieee_primary_7076635 crossref_citationtrail_10_1109_TSE_2015_2418777 proquest_miscellaneous_1793269255 crossref_primary_10_1109_TSE_2015_2418777 |
| PublicationCentury | 2000 |
| PublicationDate | 2015-Sept.-1 2015-9-1 20150901 |
| PublicationDateYYYYMMDD | 2015-09-01 |
| PublicationDate_xml | – month: 09 year: 2015 text: 2015-Sept.-1 day: 01 |
| PublicationDecade | 2010 |
| PublicationPlace | New York |
| PublicationPlace_xml | – name: New York |
| PublicationTitle | IEEE transactions on software engineering |
| PublicationTitleAbbrev | TSE |
| PublicationYear | 2015 |
| Publisher | IEEE IEEE Computer Society |
| Publisher_xml | – name: IEEE – name: IEEE Computer Society |
| References | ref56 ref12 ref53 ref52 chow (ref49) 2005 tamada (ref28) 0 ref10 ref16 ref19 ref18 egele (ref57) 0 (ref55) 0 tamada (ref48) 0 hanna (ref37) 0 bellard (ref43) 0 (ref45) 0 ref47 myles (ref25) 0 madou (ref13) 0 ref44 (ref59) 0 (ref30) 0 (ref54) 0 ref7 ref4 ref6 ref5 zhang (ref41) 0 ref35 ref34 ref36 ref31 huang (ref40) 0 ref33 ref32 ref2 ref1 ref38 prechelt (ref21) 2000 (ref14) 0 truong (ref20) 0 cavallaro (ref58) 0 tamada (ref17) 0 tamada (ref27) 0 ref24 ref23 ref26 kontogiannis (ref3) 0 ref22 knuth (ref50) 1998 (ref11) 0 (ref15) 0 collberg (ref9) 1997 newsome (ref42) 0 (ref29) 0 chow (ref51) 2003 jiang (ref8) 0 crussell (ref39) 0 (ref46) 0 |
| References_xml | – year: 0 ident: ref42 article-title: Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software publication-title: Proc Symp Network and Distributed System Security – ident: ref44 doi: 10.1109/ICSE.2004.1317484 – year: 0 ident: ref11 – start-page: 41 year: 0 ident: ref43 article-title: Qemu, a fast and portable dynamic translator publication-title: Proc Annu Conf USENIX Annu Tech Conf – start-page: 317 year: 0 ident: ref20 article-title: Static analysis of students' Java programs publication-title: Proc 6th Australasian Computing Education Conf – year: 0 ident: ref55 – ident: ref18 doi: 10.1002/spe.4380210706 – start-page: 96 year: 0 ident: ref8 article-title: DECKARD: Scalable and accurate tree-based detection of code clones publication-title: Proc 29th Int'l Conf Software Eng – ident: ref19 doi: 10.1007/11424925_2 – ident: ref53 doi: 10.1109/CMPSAC.2003.1245338 – year: 0 ident: ref54 – ident: ref5 doi: 10.1109/TSE.2002.1019480 – ident: ref10 doi: 10.1145/268946.268962 – year: 0 ident: ref30 – start-page: 169 year: 0 ident: ref40 article-title: A framework for evaluating mobile app repackaging detection algorithms publication-title: Proc International Conference on Trust and Trustworthy Computing – ident: ref1 doi: 10.1109/WCRE.1995.514697 – ident: ref34 doi: 10.1145/2338965.2336767 – start-page: 143 year: 0 ident: ref58 article-title: On the limits of information flow techniques for malware analysis and containment publication-title: Proceedings of the 4th International Conference on Detection of Intrusions and Malware and Vulnerability Assessment – start-page: 140 year: 0 ident: ref13 article-title: Loco: An interactive code (de)obfuscation tool publication-title: Proc ACM SIGPLAN Symp Partial Eval Semantics-Based Program Manipulation – ident: ref24 doi: 10.1145/1066677.1066753 – year: 2005 ident: ref49 – year: 0 ident: ref3 article-title: Detecting code similarity using patterns publication-title: Working Notes of 3rd Workshop on AI and Software Engineering – ident: ref23 doi: 10.1145/1268784.1268807 – year: 0 ident: ref28 – ident: ref2 doi: 10.1109/ICSM.1998.738528 – ident: ref47 doi: 10.1109/ICIS.2007.167 – ident: ref22 doi: 10.1145/872757.872770 – ident: ref38 doi: 10.1007/978-3-642-28166-2_11 – ident: ref52 doi: 10.1145/948148.948149 – ident: ref4 doi: 10.1109/WCRE.2001.957835 – start-page: 125 year: 0 ident: ref48 article-title: Introducing dynamic name resolution mechanism for obfuscating system-defined names in programs publication-title: Proc of the Int I Conf on Software Engineering – start-page: 569 year: 0 ident: ref17 article-title: Design and evaluation of birthmarks for detecting theft of Java programs publication-title: IASTED Conf on Software Engineering – ident: ref7 doi: 10.1145/1287624.1287634 – year: 2000 ident: ref21 article-title: Finding plagiarisms among a set of programs with JPLAG publication-title: Journal for Universal Computer Science – year: 0 ident: ref45 – ident: ref56 doi: 10.1109/HONET.2008.4810236 – ident: ref31 doi: 10.1145/1572272.1572287 – ident: ref33 doi: 10.1145/1653662.1653696 – start-page: 233 year: 0 ident: ref57 article-title: Dynamic spyware analysis publication-title: Proc USENIX Annu Tech Conf – ident: ref35 doi: 10.1109/ISSRE.2014.18 – ident: ref16 doi: 10.1145/1150402.1150522 – ident: ref26 doi: 10.1145/1321631.1321672 – start-page: 62 year: 0 ident: ref37 article-title: Juxtapp: A scalable system for detecting code reuse among android applications publication-title: Proc Detection Intrusions Malware Vulnerability Assess – ident: ref32 doi: 10.1145/2635868.2635900 – ident: ref36 doi: 10.1145/2133601.2133640 – ident: ref6 doi: 10.1145/1368088.1368132 – start-page: 1 year: 2003 ident: ref51 article-title: A white-box DES implementation for DRM applications publication-title: Digital Rights Management doi: 10.1007/978-3-540-44993-5_1 – year: 0 ident: ref14 – year: 0 ident: ref15 – start-page: 25 year: 0 ident: ref41 article-title: ViewDroid: Towards obfuscation-resilient mobile application repackaging detection publication-title: Proc ACM Conf Security Privacy Wireless Mobile Netw – year: 0 ident: ref46 – year: 0 ident: ref27 article-title: Dynamic software birthmarks to detect the theft of Windows applications publication-title: 8th Int Symp Future Software Technology – year: 1997 ident: ref9 – start-page: 404 year: 0 ident: ref25 article-title: Detecting software theft via whole program path birthmarks publication-title: Proc 7th Int Conf Inf Syst Security – year: 0 ident: ref29 – ident: ref12 doi: 10.1109/MSECP.2003.1219058 – start-page: 37 year: 0 ident: ref39 article-title: Attack of the clones: Detecting cloned applications on Android markets publication-title: Proc Euro Symp Res Computer Security – year: 1998 ident: ref50 publication-title: The Art of Computer Programming Volume2 Seminumerical Algorithms – year: 0 ident: ref59 |
| SSID | ssj0005775 ssib053395008 |
| Score | 2.3321173 |
| Snippet | Illegal code reuse has become a serious threat to the software community. Identifying similar or identical code fragments becomes much more challenging in code... |
| SourceID | proquest crossref ieee |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 925 |
| SubjectTerms | Automation Code reuse Coding theory Computer programming Computer programs dynamic code identification Dynamics Fragments Java Optimization Plagiarism Program processors Prototypes Run time (computers) Runtime Semantics Software Software engineering Software plagiarism detection Source code Studies Transformations |
| Title | Program Characterization Using Runtime Values and Its Application to Software Plagiarism Detection |
| URI | https://ieeexplore.ieee.org/document/7076635 https://www.proquest.com/docview/1716704313 https://www.proquest.com/docview/1793269255 |
| Volume | 41 |
| WOSCitedRecordID | wos000361700500005&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVIEE databaseName: IEEE Electronic Library (IEL) customDbUrl: eissn: 1939-3520 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0005775 issn: 0098-5589 databaseCode: RIE dateStart: 19750101 isFulltext: true titleUrlDefault: https://ieeexplore.ieee.org/ providerName: IEEE |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1bS8MwFD7o8MEX5xWnUyL4Ili3rs3SPA6dKIgMneJbyVWE2cnW6d83J72IKIJvhaZtyNfknJNz8n0AxyGXKrJCB0loogD3GAJplYtaGZVJnPA-tV615Ibd3iZPT3y0BKf1WRhjjC8-M2d46XP5eqoWuFXWYS7odgZyGZYZ6xdntb7KORijFT8mpQmvUpJd3hnfD7GGi545a4X0d99MkNdU-bEQe-ty2fxfv9ZhrfQiyaCAfQOWTLYJzUqhgZQTdgvkqCi_Iuc1L3Nx7JL4UgFyh0IRr4Y8ionrFRGZJtf5nAy-stokn5J7t1R_iJkho4l4fkHVwldyYXJfxJVtw8PlcHx-FZSqCoFyzlMehCJ2XkSshOlrJanQMowEyqCr2PR5z4bW2Xwh40hzzWIre5FmPHEARj1LNWXRDjSyaWZ2gVBuulR2vc8RU2q5RfIY5yMlRrm4jbegUw10qkrKcVS-mKQ-9Ojy1EGTIjRpCU0LTuon3gq6jT_abiEUdbsShRa0KyzTcj7OUyQFYsgjFLXgqL7tZhKmR0Rmpgtsg74sdzHW3u9v3odV_H5RYdaGRj5bmANYUe_5y3x26H_HT_5_3Qo |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3dS9xAEB_UFvSl1qr0rLZb6ItgvOSye5t9FD9QvB5HPcW3sJ9FOHNyl7P_fnc2HyKK4Fsgm7Dkl92Z2Zn5_QB-JULp1EkTZYlNIzxjiJTTPmrlTGU0E33mgmrJgA-H2e2tGC3BQdsLY60NxWf2EC9DLt9M9QKPyrrcB93eQC7DB0ZpL666tZ4KOjhnDUMmY5lokpKx6I6vTrGKix16e4UEeM-MUFBVebEVB_tytv6-mX2GT7UfSY4q4DdgyRZfYL3RaCD1kt0ENaoKsMhxy8xcNV6SUCxA_qBUxL0lN3LiZ0VkYchFOSdHT3ltUk7Jld-s_8mZJaOJ_HuHuoX35MSWoYyr2ILrs9Px8XlU6ypE2rtPZZRI6v0IqqXtG62YNCpJJQqha2r7oucS562-VDQ1wnDqVC81XGQewrTnmGE83YaVYlrYr0CYsDFTcfA6KGNOOKSP8V5SZrWP3EQHus2HznVNOo7aF5M8BB-xyD00OUKT19B0YL994qEi3Hhj7CZC0Y6rUejAboNlXq_IeY60QByZhNIO_Gxv-7WECRJZ2OkCx6A3K3yUtfP6m3_A6vn49yAfXAwvv8EazqWqN9uFlXK2sHvwUT-Wd_PZ9_Br_gejTuBR |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Program+Characterization+Using+Runtime+Values+and+Its+Application+to+Software+Plagiarism+Detection&rft.jtitle=IEEE+transactions+on+software+engineering&rft.au=Yoon-Chan+Jhi&rft.au=Xiaoqi+Jia&rft.au=Xinran+Wang&rft.au=Sencun+Zhu&rft.date=2015-09-01&rft.pub=IEEE&rft.issn=0098-5589&rft.volume=41&rft.issue=9&rft.spage=925&rft.epage=943&rft_id=info:doi/10.1109%2FTSE.2015.2418777&rft.externalDocID=7076635 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0098-5589&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0098-5589&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0098-5589&client=summon |