{"id":"https://openalex.org/W2432058664","doi":"https://doi.org/10.1109/tr.2016.2570554","title":"Deviation-Based Obfuscation-Resilient Program Equivalence Checking With Application to Software Plagiarism Detection","display_name":"Deviation-Based Obfuscation-Resilient Program Equivalence Checking With Application to Software Plagiarism Detection","publication_year":2016,"publication_date":"2016-06-13","ids":{"openalex":"https://openalex.org/W2432058664","doi":"https://doi.org/10.1109/tr.2016.2570554","mag":"2432058664"},"language":"en","primary_location":{"id":"doi:10.1109/tr.2016.2570554","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tr.2016.2570554","pdf_url":null,"source":{"id":"https://openalex.org/S87725633","display_name":"IEEE Transactions on Reliability","issn_l":"0018-9529","issn":["0018-9529","1558-1721"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Reliability","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101420644","display_name":"Jiang Ming","orcid":"https://orcid.org/0000-0001-9682-0502"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Jiang Ming","raw_affiliation_strings":["College of Information Sciences and Technology, Pennsylvania State University, University Park, PA, USA"],"affiliations":[{"raw_affiliation_string":"College of Information Sciences and Technology, Pennsylvania State University, University Park, PA, USA","institution_ids":["https://openalex.org/I130769515"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100425815","display_name":"Fangfang Zhang","orcid":"https://orcid.org/0000-0002-9254-3525"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Fangfang Zhang","raw_affiliation_strings":["Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA","institution_ids":["https://openalex.org/I130769515"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008435786","display_name":"Dinghao Wu","orcid":"https://orcid.org/0000-0002-0741-5511"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Dinghao Wu","raw_affiliation_strings":["College of Information Sciences and Technology, Pennsylvania State University, University Park, PA, USA"],"affiliations":[{"raw_affiliation_string":"College of Information Sciences and Technology, Pennsylvania State University, University Park, PA, USA","institution_ids":["https://openalex.org/I130769515"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100346828","display_name":"Peng Liu","orcid":"https://orcid.org/0000-0002-5091-8464"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Peng Liu","raw_affiliation_strings":["College of Information Sciences and Technology, Pennsylvania State University, University Park, PA, USA"],"affiliations":[{"raw_affiliation_string":"College of Information Sciences and Technology, Pennsylvania State University, University Park, PA, USA","institution_ids":["https://openalex.org/I130769515"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101952501","display_name":"Sencun Zhu","orcid":"https://orcid.org/0000-0002-1047-7967"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sencun Zhu","raw_affiliation_strings":["Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA","institution_ids":["https://openalex.org/I130769515"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5101420644"],"corresponding_institution_ids":["https://openalex.org/I130769515"],"apc_list":null,"apc_paid":null,"fwci":3.0262,"has_fulltext":false,"cited_by_count":34,"citation_normalized_percentile":{"value":0.92217459,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"65","issue":"4","first_page":"1647","last_page":"1664"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7661937475204468},{"id":"https://openalex.org/keywords/plagiarism-detection","display_name":"Plagiarism detection","score":0.7077111601829529},{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.63618004322052},{"id":"https://openalex.org/keywords/symbolic-execution","display_name":"Symbolic execution","score":0.5933745503425598},{"id":"https://openalex.org/keywords/copying","display_name":"Copying","score":0.5387358069419861},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5271199345588684},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.5088127255439758},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.5064557790756226},{"id":"https://openalex.org/keywords/static-analysis","display_name":"Static analysis","score":0.49809908866882324},{"id":"https://openalex.org/keywords/program-analysis","display_name":"Program analysis","score":0.4955083131790161},{"id":"https://openalex.org/keywords/software-verification","display_name":"Software verification","score":0.473114937543869},{"id":"https://openalex.org/keywords/model-checking","display_name":"Model checking","score":0.439494788646698},{"id":"https://openalex.org/keywords/semantics","display_name":"Semantics (computer science)","score":0.41108986735343933},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3989430367946625},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.3960633873939514},{"id":"https://openalex.org/keywords/software-development","display_name":"Software development","score":0.27369290590286255},{"id":"https://openalex.org/keywords/software-construction","display_name":"Software construction","score":0.2577475905418396},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.20431137084960938},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.17709049582481384}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7661937475204468},{"id":"https://openalex.org/C2780907237","wikidata":"https://www.wikidata.org/wiki/Q2986238","display_name":"Plagiarism detection","level":2,"score":0.7077111601829529},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.63618004322052},{"id":"https://openalex.org/C2779639559","wikidata":"https://www.wikidata.org/wiki/Q7661178","display_name":"Symbolic execution","level":3,"score":0.5933745503425598},{"id":"https://openalex.org/C2779151265","wikidata":"https://www.wikidata.org/wiki/Q1156791","display_name":"Copying","level":2,"score":0.5387358069419861},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5271199345588684},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.5088127255439758},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.5064557790756226},{"id":"https://openalex.org/C97686452","wikidata":"https://www.wikidata.org/wiki/Q7604153","display_name":"Static analysis","level":2,"score":0.49809908866882324},{"id":"https://openalex.org/C98183937","wikidata":"https://www.wikidata.org/wiki/Q2112188","display_name":"Program analysis","level":2,"score":0.4955083131790161},{"id":"https://openalex.org/C33054407","wikidata":"https://www.wikidata.org/wiki/Q6504747","display_name":"Software verification","level":5,"score":0.473114937543869},{"id":"https://openalex.org/C110251889","wikidata":"https://www.wikidata.org/wiki/Q1569697","display_name":"Model checking","level":2,"score":0.439494788646698},{"id":"https://openalex.org/C184337299","wikidata":"https://www.wikidata.org/wiki/Q1437428","display_name":"Semantics (computer science)","level":2,"score":0.41108986735343933},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3989430367946625},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.3960633873939514},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.27369290590286255},{"id":"https://openalex.org/C186846655","wikidata":"https://www.wikidata.org/wiki/Q3398377","display_name":"Software construction","level":4,"score":0.2577475905418396},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.20431137084960938},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.17709049582481384},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tr.2016.2570554","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tr.2016.2570554","pdf_url":null,"source":{"id":"https://openalex.org/S87725633","display_name":"IEEE Transactions on Reliability","issn_l":"0018-9529","issn":["0018-9529","1558-1721"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Reliability","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G4958794329","display_name":null,"funder_award_id":"CNS-1505664","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G5441460892","display_name":null,"funder_award_id":"CNS-1422594","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G5863267203","display_name":null,"funder_award_id":"N00014-16-1-2265","funder_id":"https://openalex.org/F4320337345","funder_display_name":"Office of Naval Research"},{"id":"https://openalex.org/G6471190695","display_name":null,"funder_award_id":"W911NF-13-1-0421","funder_id":"https://openalex.org/F4320338281","funder_display_name":"Army Research Office"},{"id":"https://openalex.org/G6956173379","display_name":null,"funder_award_id":"W911NF-09-1-0525","funder_id":"https://openalex.org/F4320338281","funder_display_name":"Army Research Office"},{"id":"https://openalex.org/G7932902577","display_name":null,"funder_award_id":"N00014-13-1-0175","funder_id":"https://openalex.org/F4320337345","funder_display_name":"Office of Naval Research"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320337345","display_name":"Office of Naval Research","ror":"https://ror.org/00rk2pe57"},{"id":"https://openalex.org/F4320338281","display_name":"Army Research Office","ror":"https://ror.org/05epdh915"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":81,"referenced_works":["https://openalex.org/W33043110","https://openalex.org/W110636400","https://openalex.org/W126407768","https://openalex.org/W150085617","https://openalex.org/W157156687","https://openalex.org/W183494281","https://openalex.org/W199976391","https://openalex.org/W200653874","https://openalex.org/W1480909796","https://openalex.org/W1508225132","https://openalex.org/W1538186256","https://openalex.org/W1545038039","https://openalex.org/W1578479379","https://openalex.org/W1593203335","https://openalex.org/W1690253345","https://openalex.org/W1710734607","https://openalex.org/W1856462361","https://openalex.org/W1863385414","https://openalex.org/W1971497680","https://openalex.org/W1974527629","https://openalex.org/W1979400615","https://openalex.org/W1981033991","https://openalex.org/W1995739251","https://openalex.org/W2002934700","https://openalex.org/W2009489720","https://openalex.org/W2009614414","https://openalex.org/W2010417554","https://openalex.org/W2029491280","https://openalex.org/W2038159719","https://openalex.org/W2041839827","https://openalex.org/W2047113058","https://openalex.org/W2049461910","https://openalex.org/W2052844069","https://openalex.org/W2062847633","https://openalex.org/W2067982285","https://openalex.org/W2071779312","https://openalex.org/W2074888021","https://openalex.org/W2081561469","https://openalex.org/W2082594235","https://openalex.org/W2084201645","https://openalex.org/W2096449544","https://openalex.org/W2096491586","https://openalex.org/W2101512909","https://openalex.org/W2101629181","https://openalex.org/W2103953153","https://openalex.org/W2107697055","https://openalex.org/W2109943392","https://openalex.org/W2111295912","https://openalex.org/W2111525908","https://openalex.org/W2113371678","https://openalex.org/W2116952712","https://openalex.org/W2117583561","https://openalex.org/W2119251836","https://openalex.org/W2125260159","https://openalex.org/W2128389850","https://openalex.org/W2128782367","https://openalex.org/W2129487583","https://openalex.org/W2132897303","https://openalex.org/W2138756793","https://openalex.org/W2145657894","https://openalex.org/W2146659255","https://openalex.org/W2153185479","https://openalex.org/W2157532207","https://openalex.org/W2159702664","https://openalex.org/W2163446760","https://openalex.org/W2194609298","https://openalex.org/W2528795537","https://openalex.org/W2588779456","https://openalex.org/W2987907651","https://openalex.org/W3146075203","https://openalex.org/W4232601069","https://openalex.org/W4237492309","https://openalex.org/W4246166885","https://openalex.org/W4247464060","https://openalex.org/W6601371887","https://openalex.org/W6606201245","https://openalex.org/W6606430823","https://openalex.org/W6637688222","https://openalex.org/W6679170867","https://openalex.org/W6681648988","https://openalex.org/W6733513268"],"related_works":["https://openalex.org/W2995488812","https://openalex.org/W2810872891","https://openalex.org/W3128730542","https://openalex.org/W2285838919","https://openalex.org/W2794792966","https://openalex.org/W4238968567","https://openalex.org/W345638404","https://openalex.org/W2006860739","https://openalex.org/W2514597554","https://openalex.org/W2401568214"],"abstract_inverted_index":{"Software":[0],"plagiarism,":[1],"an":[2,56,83,202],"act":[3],"of":[4,33,43,65,141],"illegally":[5],"copying":[6],"others'":[7],"code,":[8],"has":[9],"become":[10],"a":[11,48,129],"serious":[12],"concern":[13],"for":[14,59,75],"honest":[15],"software":[16,34,189,207],"companies":[17],"and":[18,45,144],"the":[19,31,60,68,113,139,151],"open":[20],"source":[21],"community.":[22],"Considerable":[23],"research":[24,44],"efforts":[25],"have":[26],"been":[27],"dedicated":[28],"to":[29,91,137,145,150,163,187,205],"searching":[30],"evidence":[32],"plagiarism.":[35,178],"In":[36],"this":[37,41],"paper,":[38],"we":[39,108,120,180],"continue":[40],"line":[42],"propose":[46],"LoPD,":[47],"deviation-based":[49],"program":[50,157],"equivalence":[51],"checking":[52],"approach,":[53],"which":[54],"is":[55,126,160,173,201],"ideal":[57],"fit":[58],"whole-program":[61,177],"plagiarism":[62,130,190,208],"detection.":[63],"Instead":[64],"directly":[66],"comparing":[67],"similarity":[69],"between":[70,78],"two":[71,79,89],"programs,":[72],"LoPD":[73,172,183,200],"searches":[74],"any":[76,123],"dissimilarity":[77],"programs":[80,90,114],"by":[81],"finding":[82],"input":[84],"that":[85,171,182,199],"will":[86],"cause":[87],"these":[88],"behave":[92],"differently,":[93],"either":[94],"with":[95,100],"different":[96,102],"output":[97],"states":[98],"or":[99],"semantically":[101,116],"execution":[103,136,142],"paths.":[104],"As":[105],"long":[106],"as":[107,192],"can":[109,184],"find":[110,122,146],"one":[111],"dissimilarity,":[112,124],"are":[115],"different;":[117],"but":[118],"if":[119],"cannot":[121],"it":[125],"more":[127,161],"likely":[128],"case.":[131],"We":[132],"leverage":[133],"dynamic":[134],"symbolic":[135],"capture":[138],"semantics":[140],"paths":[143],"path":[147],"deviations.":[148],"Compared":[149],"existing":[152,206],"detection":[153,191,209],"approaches,":[154],"LoPD's":[155],"formal":[156],"semantics-based":[158],"method":[159],"resilient":[162],"automatic":[164],"obfuscation":[165],"schemes.":[166],"Our":[167],"evaluation":[168],"results":[169,197],"indicate":[170],"effective":[174],"in":[175],"detecting":[176],"Furthermore,":[179],"demonstrate":[181],"be":[185],"applied":[186],"partial":[188],"well.":[193],"The":[194],"encouraging":[195],"experiment":[196],"show":[198],"appealing":[203],"complement":[204],"approaches.":[210]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":6},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":7},{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
