Program Characterization Using Runtime Values and Its Application to Software Plagiarism Detection

Illegal code reuse has become a serious threat to the software community. Identifying similar or identical code fragments becomes much more challenging in code theft cases where plagiarizers can use various automated code transformation or obfuscation techniques to hide stolen code from being detect...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:IEEE transactions on software engineering Ročník 41; číslo 9; s. 925 - 943
Hlavní autoři: Jhi, Yoon-Chan, Jia, Xiaoqi, Wang, Xinran, Zhu, Sencun, Liu, Peng, Wu, Dinghao
Médium: Journal Article
Jazyk:angličtina
Vydáno: New York IEEE 01.09.2015
IEEE Computer Society
Témata:
ISSN:0098-5589, 1939-3520
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Abstract Illegal code reuse has become a serious threat to the software community. Identifying similar or identical code fragments becomes much more challenging in code theft cases where plagiarizers can use various automated code transformation or obfuscation techniques to hide stolen code from being detected. Previous works in this field are largely limited in that (i) most of them cannot handle advanced obfuscation techniques, and (ii) the methods based on source code analysis are not practical since the source code of suspicious programs typically cannot be obtained until strong evidences have been collected. Based on the observation that some critical runtime values of a program are hard to be replaced or eliminated by semantics-preserving transformation techniques, we introduce a novel approach to dynamic characterization of executable programs. Leveraging such invariant values, our technique is resilient to various control and data obfuscation techniques. We show how the values can be extracted and refined to expose the critical values and how we can apply this runtime property to help solve problems in software plagiarism detection. We have implemented a prototype with a dynamic taint analyzer atop a generic processor emulator. Our value-based plagiarism detection method (VaPD) uses the longest common subsequence based similarity measuring algorithms to check whether two code fragments belong to the same lineage. We evaluate our proposed method through a set of real-world automated obfuscators. Our experimental results show that the value-based method successfully discriminates 34 plagiarisms obfuscated by SandMark, plagiarisms heavily obfuscated by KlassMaster, programs obfuscated by Thicket, and executables obfuscated by Loco/Diablo.
AbstractList Illegal code reuse has become a serious threat to the software community. Identifying similar or identical code fragments becomes much more challenging in code theft cases where plagiarizers can use various automated code transformation or obfuscation techniques to hide stolen code from being detected. Previous works in this field are largely limited in that (i) most of them cannot handle advanced obfuscation techniques, and (ii) the methods based on source code analysis are not practical since the source code of suspicious programs typically cannot be obtained until strong evidences have been collected. Based on the observation that some critical runtime values of a program are hard to be replaced or eliminated by semantics-preserving transformation techniques, we introduce a novel approach to dynamic characterization of executable programs. Leveraging such invariant values, our technique is resilient to various control and data obfuscation techniques. We show how the values can be extracted and refined to expose the critical values and how we can apply this runtime property to help solve problems in software plagiarism detection. We have implemented a prototype with a dynamic taint analyzer atop a generic processor emulator. Our value-based plagiarism detection method (VaPD) uses the longest common subsequence based similarity measuring algorithms to check whether two code fragments belong to the same lineage. We evaluate our proposed method through a set of real-world automated obfuscators. Our experimental results show that the value-based method successfully discriminates 34 plagiarisms obfuscated by SandMark, plagiarisms heavily obfuscated by KlassMaster, programs obfuscated by Thicket, and executables obfuscated by Loco/Diablo.
Author Xiaoqi Jia
Xinran Wang
Sencun Zhu
Yoon-Chan Jhi
Peng Liu
Dinghao Wu
Author_xml – sequence: 1
  givenname: Yoon-Chan
  surname: Jhi
  fullname: Jhi, Yoon-Chan
– sequence: 2
  givenname: Xiaoqi
  surname: Jia
  fullname: Jia, Xiaoqi
– sequence: 3
  givenname: Xinran
  surname: Wang
  fullname: Wang, Xinran
– sequence: 4
  givenname: Sencun
  surname: Zhu
  fullname: Zhu, Sencun
– sequence: 5
  givenname: Peng
  surname: Liu
  fullname: Liu, Peng
– sequence: 6
  givenname: Dinghao
  surname: Wu
  fullname: Wu, Dinghao
BookMark eNp9kE1LAzEQhoMo2Kp3wUvAi5etySbZbI5SP6Gg-HVdZrPZmrK7qUmK6K83teKhB08Dw_O8zLxjtDu4wSB0TMmEUqLOn5-uJjmhYpJzWkopd9CIKqYyJnKyi0aEqDITolT7aBzCghAipBQjVD94N_fQ4-kbeNDRePsF0boBvwQ7zPHjaoi2N_gVupUJGIYG38WAL5bLzuoNGB1-cm38AG_wQwdzC96GHl-aaPQaOER7LXTBHP3OA_RyffU8vc1m9zd304tZplnOY0aBS065BlM0uhbQ1JQBlWnDTaHylrYlzaHmrFGN5G2ds0aqsm6T3YpGSHaAzja5S-_e07Gx6m3QputgMG4VKioVy1OSEAk93UIXbuWHdF2iaCEJZ5QlqthQ2rsQvGkrbePPz9GD7SpKqnX1Vaq-Wldf_VafRLIlLr3twX_-p5xsFGuM-cMlkUXBBPsGbkuRcA
CODEN IESEDJ
CitedBy_id crossref_primary_10_1016_j_infsof_2020_106320
crossref_primary_10_1155_2021_9954520
crossref_primary_10_1002_cpe_5000
crossref_primary_10_1016_j_cose_2022_103023
crossref_primary_10_1080_23752696_2018_1563757
crossref_primary_10_1109_TR_2016_2570554
crossref_primary_10_1016_j_eswa_2020_114348
crossref_primary_10_1109_TSE_2022_3149240
crossref_primary_10_1007_s00521_022_07707_2
crossref_primary_10_1109_TSE_2017_2655046
crossref_primary_10_1109_TSE_2017_2688383
crossref_primary_10_1016_j_jss_2016_06_014
crossref_primary_10_1109_TSE_2018_2872958
crossref_primary_10_1145_3569933
crossref_primary_10_1109_ACCESS_2021_3069367
crossref_primary_10_1109_ACCESS_2021_3103186
crossref_primary_10_1007_s11042_018_5827_6
crossref_primary_10_1109_ACCESS_2020_3021184
crossref_primary_10_1109_ACCESS_2021_3094517
crossref_primary_10_1109_TDSC_2022_3223103
Cites_doi 10.1109/ICSE.2004.1317484
10.1002/spe.4380210706
10.1007/11424925_2
10.1109/CMPSAC.2003.1245338
10.1109/TSE.2002.1019480
10.1145/268946.268962
10.1109/WCRE.1995.514697
10.1145/2338965.2336767
10.1145/1066677.1066753
10.1145/1268784.1268807
10.1109/ICSM.1998.738528
10.1109/ICIS.2007.167
10.1145/872757.872770
10.1007/978-3-642-28166-2_11
10.1145/948148.948149
10.1109/WCRE.2001.957835
10.1145/1287624.1287634
10.1109/HONET.2008.4810236
10.1145/1572272.1572287
10.1145/1653662.1653696
10.1109/ISSRE.2014.18
10.1145/1150402.1150522
10.1145/1321631.1321672
10.1145/2635868.2635900
10.1145/2133601.2133640
10.1145/1368088.1368132
10.1007/978-3-540-44993-5_1
10.1109/MSECP.2003.1219058
ContentType Journal Article
Copyright Copyright IEEE Computer Society Sep 1, 2015
Copyright_xml – notice: Copyright IEEE Computer Society Sep 1, 2015
DBID 97E
RIA
RIE
AAYXX
CITATION
JQ2
K9.
7SC
7SP
8FD
F28
FR3
L7M
L~C
L~D
DOI 10.1109/TSE.2015.2418777
DatabaseName IEEE Xplore (IEEE)
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library (IEL)
CrossRef
ProQuest Computer Science Collection
ProQuest Health & Medical Complete (Alumni)
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Technology Research Database
ANTE: Abstracts in New Technology & Engineering
Engineering Research Database
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
ProQuest Health & Medical Complete (Alumni)
ProQuest Computer Science Collection
Technology Research Database
Computer and Information Systems Abstracts – Academic
Electronics & Communications Abstracts
Computer and Information Systems Abstracts
Engineering Research Database
Advanced Technologies Database with Aerospace
ANTE: Abstracts in New Technology & Engineering
Computer and Information Systems Abstracts Professional
DatabaseTitleList Technology Research Database

ProQuest Health & Medical Complete (Alumni)
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1939-3520
EndPage 943
ExternalDocumentID 3818672271
10_1109_TSE_2015_2418777
7076635
Genre orig-research
Feature
GrantInformation_xml – fundername: US National Science Foundation (NSF)
  grantid: CCF-1320605; NSF CNS-1223710; NSF CNS-0905131; NSF CNS-0916469; AFOSR FA9550-07-1-0527; ARO W911NF-09-1-0525; ARO W911NF-13-1-0421
  funderid: 10.13039/100000001
– fundername: National Natural Science Foundation of China (NSFC)
  grantid: 61100228
  funderid: 10.13039/501100001809
– fundername: AFRL
  grantid: FA8750-08-C-0137
  funderid: 10.13039/100006602
– fundername: National High-tech R&D Program of China
  grantid: 2012AA013101
– fundername: Strategic Priority Research Program of the Chinese Academy of Sciences
  grantid: XDA06030601; XDA06010701
  funderid: 10.13039/501100002367
GroupedDBID --Z
-DZ
-~X
.4S
.DC
0R~
29I
4.4
5GY
6IK
85S
8R4
8R5
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABPPZ
ABQJQ
ABVLG
ACGFO
ACGOD
ACIWK
ACNCT
AENEX
AGQYO
AGSQL
AHBIQ
AKQYR
ALMA_UNASSIGNED_HOLDINGS
ASUFR
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BKOMP
BPEOZ
CS3
DU5
EBS
EDO
EJD
HZ~
I-F
IEDLZ
IFIPE
IPLJI
JAVBF
LAI
M43
MS~
O9-
OCL
P2P
Q2X
RIA
RIE
RNS
RXW
S10
TAE
TN5
TWZ
UHB
UPT
WH7
YZZ
AAYXX
CITATION
JQ2
K9.
7SC
7SP
8FD
F28
FR3
L7M
L~C
L~D
ID FETCH-LOGICAL-c324t-1a47414cae6dcb5adb13a1714c4e692f1f812ab43d9d74fb23d798bfc32f5d573
IEDL.DBID RIE
ISICitedReferencesCount 28
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000361700500005&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 0098-5589
IngestDate Thu Oct 02 11:14:04 EDT 2025
Fri Oct 03 04:01:20 EDT 2025
Tue Nov 18 22:21:57 EST 2025
Sat Nov 29 03:10:23 EST 2025
Wed Aug 27 02:47:44 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 9
Keywords Software plagiarism detection
dynamic code identification
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c324t-1a47414cae6dcb5adb13a1714c4e692f1f812ab43d9d74fb23d798bfc32f5d573
Notes SourceType-Scholarly Journals-1
ObjectType-Feature-1
content type line 14
ObjectType-Article-1
ObjectType-Feature-2
content type line 23
PQID 1716704313
PQPubID 21418
PageCount 19
ParticipantIDs proquest_journals_1716704313
ieee_primary_7076635
crossref_citationtrail_10_1109_TSE_2015_2418777
proquest_miscellaneous_1793269255
crossref_primary_10_1109_TSE_2015_2418777
PublicationCentury 2000
PublicationDate 2015-Sept.-1
2015-9-1
20150901
PublicationDateYYYYMMDD 2015-09-01
PublicationDate_xml – month: 09
  year: 2015
  text: 2015-Sept.-1
  day: 01
PublicationDecade 2010
PublicationPlace New York
PublicationPlace_xml – name: New York
PublicationTitle IEEE transactions on software engineering
PublicationTitleAbbrev TSE
PublicationYear 2015
Publisher IEEE
IEEE Computer Society
Publisher_xml – name: IEEE
– name: IEEE Computer Society
References ref56
ref12
ref53
ref52
chow (ref49) 2005
tamada (ref28) 0
ref10
ref16
ref19
ref18
egele (ref57) 0
(ref55) 0
tamada (ref48) 0
hanna (ref37) 0
bellard (ref43) 0
(ref45) 0
ref47
myles (ref25) 0
madou (ref13) 0
ref44
(ref59) 0
(ref30) 0
(ref54) 0
ref7
ref4
ref6
ref5
zhang (ref41) 0
ref35
ref34
ref36
ref31
huang (ref40) 0
ref33
ref32
ref2
ref1
ref38
prechelt (ref21) 2000
(ref14) 0
truong (ref20) 0
cavallaro (ref58) 0
tamada (ref17) 0
tamada (ref27) 0
ref24
ref23
ref26
kontogiannis (ref3) 0
ref22
knuth (ref50) 1998
(ref11) 0
(ref15) 0
collberg (ref9) 1997
newsome (ref42) 0
(ref29) 0
chow (ref51) 2003
jiang (ref8) 0
crussell (ref39) 0
(ref46) 0
References_xml – year: 0
  ident: ref42
  article-title: Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
  publication-title: Proc Symp Network and Distributed System Security
– ident: ref44
  doi: 10.1109/ICSE.2004.1317484
– year: 0
  ident: ref11
– start-page: 41
  year: 0
  ident: ref43
  article-title: Qemu, a fast and portable dynamic translator
  publication-title: Proc Annu Conf USENIX Annu Tech Conf
– start-page: 317
  year: 0
  ident: ref20
  article-title: Static analysis of students' Java programs
  publication-title: Proc 6th Australasian Computing Education Conf
– year: 0
  ident: ref55
– ident: ref18
  doi: 10.1002/spe.4380210706
– start-page: 96
  year: 0
  ident: ref8
  article-title: DECKARD: Scalable and accurate tree-based detection of code clones
  publication-title: Proc 29th Int'l Conf Software Eng
– ident: ref19
  doi: 10.1007/11424925_2
– ident: ref53
  doi: 10.1109/CMPSAC.2003.1245338
– year: 0
  ident: ref54
– ident: ref5
  doi: 10.1109/TSE.2002.1019480
– ident: ref10
  doi: 10.1145/268946.268962
– year: 0
  ident: ref30
– start-page: 169
  year: 0
  ident: ref40
  article-title: A framework for evaluating mobile app repackaging detection algorithms
  publication-title: Proc International Conference on Trust and Trustworthy Computing
– ident: ref1
  doi: 10.1109/WCRE.1995.514697
– ident: ref34
  doi: 10.1145/2338965.2336767
– start-page: 143
  year: 0
  ident: ref58
  article-title: On the limits of information flow techniques for malware analysis and containment
  publication-title: Proceedings of the 4th International Conference on Detection of Intrusions and Malware and Vulnerability Assessment
– start-page: 140
  year: 0
  ident: ref13
  article-title: Loco: An interactive code (de)obfuscation tool
  publication-title: Proc ACM SIGPLAN Symp Partial Eval Semantics-Based Program Manipulation
– ident: ref24
  doi: 10.1145/1066677.1066753
– year: 2005
  ident: ref49
– year: 0
  ident: ref3
  article-title: Detecting code similarity using patterns
  publication-title: Working Notes of 3rd Workshop on AI and Software Engineering
– ident: ref23
  doi: 10.1145/1268784.1268807
– year: 0
  ident: ref28
– ident: ref2
  doi: 10.1109/ICSM.1998.738528
– ident: ref47
  doi: 10.1109/ICIS.2007.167
– ident: ref22
  doi: 10.1145/872757.872770
– ident: ref38
  doi: 10.1007/978-3-642-28166-2_11
– ident: ref52
  doi: 10.1145/948148.948149
– ident: ref4
  doi: 10.1109/WCRE.2001.957835
– start-page: 125
  year: 0
  ident: ref48
  article-title: Introducing dynamic name resolution mechanism for obfuscating system-defined names in programs
  publication-title: Proc of the Int I Conf on Software Engineering
– start-page: 569
  year: 0
  ident: ref17
  article-title: Design and evaluation of birthmarks for detecting theft of Java programs
  publication-title: IASTED Conf on Software Engineering
– ident: ref7
  doi: 10.1145/1287624.1287634
– year: 2000
  ident: ref21
  article-title: Finding plagiarisms among a set of programs with JPLAG
  publication-title: Journal for Universal Computer Science
– year: 0
  ident: ref45
– ident: ref56
  doi: 10.1109/HONET.2008.4810236
– ident: ref31
  doi: 10.1145/1572272.1572287
– ident: ref33
  doi: 10.1145/1653662.1653696
– start-page: 233
  year: 0
  ident: ref57
  article-title: Dynamic spyware analysis
  publication-title: Proc USENIX Annu Tech Conf
– ident: ref35
  doi: 10.1109/ISSRE.2014.18
– ident: ref16
  doi: 10.1145/1150402.1150522
– ident: ref26
  doi: 10.1145/1321631.1321672
– start-page: 62
  year: 0
  ident: ref37
  article-title: Juxtapp: A scalable system for detecting code reuse among android applications
  publication-title: Proc Detection Intrusions Malware Vulnerability Assess
– ident: ref32
  doi: 10.1145/2635868.2635900
– ident: ref36
  doi: 10.1145/2133601.2133640
– ident: ref6
  doi: 10.1145/1368088.1368132
– start-page: 1
  year: 2003
  ident: ref51
  article-title: A white-box DES implementation for DRM applications
  publication-title: Digital Rights Management
  doi: 10.1007/978-3-540-44993-5_1
– year: 0
  ident: ref14
– year: 0
  ident: ref15
– start-page: 25
  year: 0
  ident: ref41
  article-title: ViewDroid: Towards obfuscation-resilient mobile application repackaging detection
  publication-title: Proc ACM Conf Security Privacy Wireless Mobile Netw
– year: 0
  ident: ref46
– year: 0
  ident: ref27
  article-title: Dynamic software birthmarks to detect the theft of Windows applications
  publication-title: 8th Int Symp Future Software Technology
– year: 1997
  ident: ref9
– start-page: 404
  year: 0
  ident: ref25
  article-title: Detecting software theft via whole program path birthmarks
  publication-title: Proc 7th Int Conf Inf Syst Security
– year: 0
  ident: ref29
– ident: ref12
  doi: 10.1109/MSECP.2003.1219058
– start-page: 37
  year: 0
  ident: ref39
  article-title: Attack of the clones: Detecting cloned applications on Android markets
  publication-title: Proc Euro Symp Res Computer Security
– year: 1998
  ident: ref50
  publication-title: The Art of Computer Programming Volume2 Seminumerical Algorithms
– year: 0
  ident: ref59
SSID ssj0005775
ssib053395008
Score 2.3321173
Snippet Illegal code reuse has become a serious threat to the software community. Identifying similar or identical code fragments becomes much more challenging in code...
SourceID proquest
crossref
ieee
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 925
SubjectTerms Automation
Code reuse
Coding theory
Computer programming
Computer programs
dynamic code identification
Dynamics
Fragments
Java
Optimization
Plagiarism
Program processors
Prototypes
Run time (computers)
Runtime
Semantics
Software
Software engineering
Software plagiarism detection
Source code
Studies
Transformations
Title Program Characterization Using Runtime Values and Its Application to Software Plagiarism Detection
URI https://ieeexplore.ieee.org/document/7076635
https://www.proquest.com/docview/1716704313
https://www.proquest.com/docview/1793269255
Volume 41
WOSCitedRecordID wos000361700500005&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVIEE
  databaseName: IEEE Electronic Library (IEL)
  customDbUrl:
  eissn: 1939-3520
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0005775
  issn: 0098-5589
  databaseCode: RIE
  dateStart: 19750101
  isFulltext: true
  titleUrlDefault: https://ieeexplore.ieee.org/
  providerName: IEEE
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1JS8QwFH6oePDiLo4bEbwI1umSNM1RXNCLDG54K2kWEWY6MtPRv-9LuogogrdCkzb0a_Ley3v5PoAjqkXGlMDYBM1ngKtkHIg0C4M4zWKbiEIZrbzYBL-9zZ6fxWAOTrqzMMYYX3xmTt2lz-XrsZq5rbI-x6AbDeQ8zHOe1me1vso5OGctPyZjmWhTkqHoP9xfuhoudorWytHffTNBXlPlx0LsrcvVyv_GtQrLjRdJzmrY12DOlOuw0io0kGbCbkAxqMuvyHnHy1wfuyS-VIDcOaGIkSFPcoijIrLU5KaakrOvrDapxuQel-oPOTFkMJQvr061cEQuTOWLuMpNeLy6fDi_DhpVhUCh81QFkaToRVAlTapVwaQuokQ6GXRFTSpiG1m0-bKgiRaaU1vEieYiKyz2tkwznmzBQjkuzTaQSNgooZZZriyNQy0TdOCkNjTMKLpZsgf99kPnqqEcd8oXw9yHHqHIEZrcQZM30PTguOvxVtNt_NF2w0HRtWtQ6MFei2XezMdp7kiBuOMRSnpw2N3GmeTSI7I045lr43xZgTHWzu9P3oUl9_66wmwPFqrJzOzDonqvXqeTA_87fgJFb91g
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3dT9swED8xmDRe1jFAFNgwEi9IhObDruPHioFAQFVBN_EWOf5AlUqK2pT9-5ydD4Q2TdpbpNiRlV_su8vd_X4AR1SLlCmBsQmazwBPyTgQ_TQM4n4a20TkymjlxSb4cJg-PIjRCpy0vTDGGF98Zk7dpc_l65laul9lPY5BNxrID7DGKI3DqlvrraCDc9YwZDKWiiYpGYre-P7cVXGxU7RXjgDvnRHyqip_HMXevlx0_m9lX-Bz7UeSQQX8BqyY4it0Go0GUm_ZTchHVQEWOWuZmavGS-KLBcidk4p4MuSXnOKqiCw0uSoXZPCW1ybljNzjYf1bzg0ZTeXjxOkWPpEfpvRlXMUW_Lw4H59dBrWuQqDQfSqDSFL0I6iSpq9VzqTOo0Q6IXRFTV_ENrJo9WVOEy00pzaPE81FmlucbZlmPNmG1WJWmB0gkbBRQi2zXFlERMsEXTipDQ1Tio6W7EKvedGZqknHnfbFNPPBRygyhCZz0GQ1NF04bmc8V4Qb_xi76aBox9UodGG_wTKrd-Qic7RA3DEJJV04bG_jXnIJElmY2dKNcd6swChr9-9PPoBPl-Pbm-zmani9B-tuLVW92T6slvOl-QYf1Us5Wcy_-0_zFe0p4Kc
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Program+Characterization+Using+Runtime+Values+and+Its+Application+to+Software+Plagiarism+Detection&rft.jtitle=IEEE+transactions+on+software+engineering&rft.au=Jhi%2C+Yoon-Chan&rft.au=Jia%2C+Xiaoqi&rft.au=Wang%2C+Xinran&rft.au=Zhu%2C+Sencun&rft.date=2015-09-01&rft.issn=0098-5589&rft.eissn=1939-3520&rft.volume=41&rft.issue=9&rft.spage=925&rft.epage=943&rft_id=info:doi/10.1109%2FTSE.2015.2418777&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_TSE_2015_2418777
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0098-5589&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0098-5589&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0098-5589&client=summon