{"id":"https://openalex.org/W2194609298","doi":"https://doi.org/10.1109/tse.2015.2454508","title":"Software Plagiarism Detection with Birthmarks Based on Dynamic Key Instruction Sequences","display_name":"Software Plagiarism Detection with Birthmarks Based on Dynamic Key Instruction Sequences","publication_year":2015,"publication_date":"2015-07-09","ids":{"openalex":"https://openalex.org/W2194609298","doi":"https://doi.org/10.1109/tse.2015.2454508","mag":"2194609298"},"language":"en","primary_location":{"id":"doi:10.1109/tse.2015.2454508","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tse.2015.2454508","pdf_url":null,"source":{"id":"https://openalex.org/S8351582","display_name":"IEEE Transactions on Software Engineering","issn_l":"0098-5589","issn":["0098-5589","1939-3520","2326-3881"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Software Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5049436913","display_name":"Zhenzhou Tian","orcid":"https://orcid.org/0000-0001-7608-8908"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhenzhou Tian","raw_affiliation_strings":["Ministry of Education Key Lab For Intelligent Networks and Network Security (MOEKLINNS), Department of Computer Science and Technology, Xi\u2019an Jiaotong University, Xi\u2019an, China","Ministry of Education Key Lab For Intelligent Networks and Network Security (MOEKLINNS), Department of Computer Science and Technology, Xi'an Jiaotong University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"Ministry of Education Key Lab For Intelligent Networks and Network Security (MOEKLINNS), Department of Computer Science and Technology, Xi\u2019an Jiaotong University, Xi\u2019an, China","institution_ids":["https://openalex.org/I87445476"]},{"raw_affiliation_string":"Ministry of Education Key Lab For Intelligent Networks and Network Security (MOEKLINNS), Department of Computer Science and Technology, Xi'an Jiaotong University, Xi'an, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041083459","display_name":"Qinghua Zheng","orcid":"https://orcid.org/0000-0002-8436-4754"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qinghua Zheng","raw_affiliation_strings":["Ministry of Education Key Lab For Intelligent Networks and Network Security (MOEKLINNS), Department of Computer Science and Technology, Xi\u2019an Jiaotong University, Xi\u2019an, China","Ministry of Education Key Lab For Intelligent Networks and Network Security (MOEKLINNS), Department of Computer Science and Technology, Xi'an Jiaotong University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"Ministry of Education Key Lab For Intelligent Networks and Network Security (MOEKLINNS), Department of Computer Science and Technology, Xi\u2019an Jiaotong University, Xi\u2019an, China","institution_ids":["https://openalex.org/I87445476"]},{"raw_affiliation_string":"Ministry of Education Key Lab For Intelligent Networks and Network Security (MOEKLINNS), Department of Computer Science and Technology, Xi'an Jiaotong University, Xi'an, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101554099","display_name":"Ting Liu","orcid":"https://orcid.org/0000-0002-7600-0934"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ting Liu","raw_affiliation_strings":["Ministry of Education Key Lab For Intelligent Networks and Network Security (MOEKLINNS), School of Electronic and Information Engineering, Xi\u2019an Jiaotong University, Xi\u2019an, China","Ministry of Education Key Lab For Intelligent Networks and Network Security (MOEKLINNS), School of Electronic and Information Engineering, Xi'an Jiaotong University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"Ministry of Education Key Lab For Intelligent Networks and Network Security (MOEKLINNS), School of Electronic and Information Engineering, Xi\u2019an Jiaotong University, Xi\u2019an, China","institution_ids":["https://openalex.org/I87445476"]},{"raw_affiliation_string":"Ministry of Education Key Lab For Intelligent Networks and Network Security (MOEKLINNS), School of Electronic and Information Engineering, Xi'an Jiaotong University, Xi'an, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100692958","display_name":"Ming Fan","orcid":"https://orcid.org/0000-0002-9327-0987"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ming Fan","raw_affiliation_strings":["Ministry of Education Key Lab For Intelligent Networks and Network Security (MOEKLINNS), Department of Computer Science and Technology, Xi\u2019an Jiaotong University, Xi\u2019an, China","Ministry of Education Key Lab For Intelligent Networks and Network Security (MOEKLINNS), Department of Computer Science and Technology, Xi'an Jiaotong University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"Ministry of Education Key Lab For Intelligent Networks and Network Security (MOEKLINNS), Department of Computer Science and Technology, Xi\u2019an Jiaotong University, Xi\u2019an, China","institution_ids":["https://openalex.org/I87445476"]},{"raw_affiliation_string":"Ministry of Education Key Lab For Intelligent Networks and Network Security (MOEKLINNS), Department of Computer Science and Technology, Xi'an Jiaotong University, Xi'an, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067274105","display_name":"Eryue Zhuang","orcid":null},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Eryue Zhuang","raw_affiliation_strings":["Ministry of Education Key Lab For Intelligent Networks and Network Security (MOEKLINNS), Department of Computer Science and Technology, Xi\u2019an Jiaotong University, Xi\u2019an, China","Ministry of Education Key Lab For Intelligent Networks and Network Security (MOEKLINNS), Department of Computer Science and Technology, Xi'an Jiaotong University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"Ministry of Education Key Lab For Intelligent Networks and Network Security (MOEKLINNS), Department of Computer Science and Technology, Xi\u2019an Jiaotong University, Xi\u2019an, China","institution_ids":["https://openalex.org/I87445476"]},{"raw_affiliation_string":"Ministry of Education Key Lab For Intelligent Networks and Network Security (MOEKLINNS), Department of Computer Science and Technology, Xi'an Jiaotong University, Xi'an, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101995389","display_name":"Zijiang Yang","orcid":"https://orcid.org/0000-0001-7647-3718"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]},{"id":"https://openalex.org/I141649380","display_name":"Western Michigan University","ror":"https://ror.org/04j198w64","country_code":"US","type":"education","lineage":["https://openalex.org/I141649380"]}],"countries":["CN","US"],"is_corresponding":false,"raw_author_name":"Zijiang Yang","raw_affiliation_strings":["Department of Computer Science and Technology, Xi\u2019an Jiaotong University, Xi\u2019an, China","Department of Computer Science, Western Michigan University, Kalamazoo, MI","Department of Computer Science and Technology, Xi'an Jiaotong University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Technology, Xi\u2019an Jiaotong University, Xi\u2019an, China","institution_ids":["https://openalex.org/I87445476"]},{"raw_affiliation_string":"Department of Computer Science, Western Michigan University, Kalamazoo, MI","institution_ids":["https://openalex.org/I141649380"]},{"raw_affiliation_string":"Department of Computer Science and Technology, Xi'an Jiaotong University, Xi'an, China","institution_ids":["https://openalex.org/I87445476"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5049436913"],"corresponding_institution_ids":["https://openalex.org/I87445476"],"apc_list":null,"apc_paid":null,"fwci":14.3027,"has_fulltext":false,"cited_by_count":60,"citation_normalized_percentile":{"value":0.9867412,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"41","issue":"12","first_page":"1217","last_page":"1235"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/birthmark","display_name":"Birthmark","score":0.8917512893676758},{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.8786540031433105},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8749338984489441},{"id":"https://openalex.org/keywords/executable","display_name":"Executable","score":0.7587066888809204},{"id":"https://openalex.org/keywords/plagiarism-detection","display_name":"Plagiarism detection","score":0.7180292010307312},{"id":"https://openalex.org/keywords/compiler","display_name":"Compiler","score":0.6021643877029419},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5658503174781799},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5648114681243896},{"id":"https://openalex.org/keywords/source-code","display_name":"Source code","score":0.5596069097518921},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.5561107397079468},{"id":"https://openalex.org/keywords/static-program-analysis","display_name":"Static program analysis","score":0.5404855012893677},{"id":"https://openalex.org/keywords/static-analysis","display_name":"Static analysis","score":0.4249367117881775},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.38141125440597534},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2664012610912323},{"id":"https://openalex.org/keywords/software-development","display_name":"Software development","score":0.24445000290870667},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.11970996856689453}],"concepts":[{"id":"https://openalex.org/C2776826570","wikidata":"https://www.wikidata.org/wiki/Q3513591","display_name":"Birthmark","level":2,"score":0.8917512893676758},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.8786540031433105},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8749338984489441},{"id":"https://openalex.org/C160145156","wikidata":"https://www.wikidata.org/wiki/Q778586","display_name":"Executable","level":2,"score":0.7587066888809204},{"id":"https://openalex.org/C2780907237","wikidata":"https://www.wikidata.org/wiki/Q2986238","display_name":"Plagiarism detection","level":2,"score":0.7180292010307312},{"id":"https://openalex.org/C169590947","wikidata":"https://www.wikidata.org/wiki/Q47506","display_name":"Compiler","level":2,"score":0.6021643877029419},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5658503174781799},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5648114681243896},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.5596069097518921},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.5561107397079468},{"id":"https://openalex.org/C137287247","wikidata":"https://www.wikidata.org/wiki/Q1329550","display_name":"Static program analysis","level":4,"score":0.5404855012893677},{"id":"https://openalex.org/C97686452","wikidata":"https://www.wikidata.org/wiki/Q7604153","display_name":"Static analysis","level":2,"score":0.4249367117881775},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.38141125440597534},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2664012610912323},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.24445000290870667},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.11970996856689453},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C54355233","wikidata":"https://www.wikidata.org/wiki/Q7162","display_name":"Genetics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tse.2015.2454508","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tse.2015.2454508","pdf_url":null,"source":{"id":"https://openalex.org/S8351582","display_name":"IEEE Transactions on Software Engineering","issn_l":"0098-5589","issn":["0098-5589","1939-3520","2326-3881"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Software Engineering","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7400000095367432,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G3679935874","display_name":null,"funder_award_id":"61472318","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4595835242","display_name":null,"funder_award_id":"61428206","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4726457314","display_name":null,"funder_award_id":"61203174","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4736889177","display_name":null,"funder_award_id":"91218301","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5116378769","display_name":null,"funder_award_id":"61221063","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6458768848","display_name":null,"funder_award_id":"91118005","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6687633453","display_name":null,"funder_award_id":"CCF-1500365","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G8297120240","display_name":null,"funder_award_id":"91418205","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":106,"referenced_works":["https://openalex.org/W64563084","https://openalex.org/W150085617","https://openalex.org/W1500616534","https://openalex.org/W1508225132","https://openalex.org/W1510687364","https://openalex.org/W1515790419","https://openalex.org/W1551162551","https://openalex.org/W1573286687","https://openalex.org/W1581009051","https://openalex.org/W1593203335","https://openalex.org/W1863385414","https://openalex.org/W1910686388","https://openalex.org/W1966695331","https://openalex.org/W1970320668","https://openalex.org/W1971497680","https://openalex.org/W1981033991","https://openalex.org/W1985951985","https://openalex.org/W1986108510","https://openalex.org/W1986541713","https://openalex.org/W1995739251","https://openalex.org/W1998517692","https://openalex.org/W2009614414","https://openalex.org/W2019763646","https://openalex.org/W2021673689","https://openalex.org/W2023288969","https://openalex.org/W2024671287","https://openalex.org/W2031052551","https://openalex.org/W2038159719","https://openalex.org/W2040867586","https://openalex.org/W2041839827","https://openalex.org/W2062847633","https://openalex.org/W2068211976","https://openalex.org/W2084201645","https://openalex.org/W2086968222","https://openalex.org/W2096491586","https://openalex.org/W2097001189","https://openalex.org/W2100265429","https://openalex.org/W2102970979","https://openalex.org/W2104301886","https://openalex.org/W2104489637","https://openalex.org/W2107135371","https://openalex.org/W2107697055","https://openalex.org/W2108551812","https://openalex.org/W2108747667","https://openalex.org/W2109553965","https://openalex.org/W2109943392","https://openalex.org/W2111525908","https://openalex.org/W2116952712","https://openalex.org/W2117583561","https://openalex.org/W2120322286","https://openalex.org/W2120724609","https://openalex.org/W2121412398","https://openalex.org/W2121749752","https://openalex.org/W2125260159","https://openalex.org/W2125980283","https://openalex.org/W2127020518","https://openalex.org/W2128698639","https://openalex.org/W2128782367","https://openalex.org/W2134633067","https://openalex.org/W2136099030","https://openalex.org/W2136833842","https://openalex.org/W2138756793","https://openalex.org/W2145657894","https://openalex.org/W2146659255","https://openalex.org/W2151135920","https://openalex.org/W2161847731","https://openalex.org/W2162444146","https://openalex.org/W2166091242","https://openalex.org/W2166278331","https://openalex.org/W2166462894","https://openalex.org/W2166860375","https://openalex.org/W2396357243","https://openalex.org/W2401617229","https://openalex.org/W2588779456","https://openalex.org/W2744136779","https://openalex.org/W3137069269","https://openalex.org/W3142518606","https://openalex.org/W4230338025","https://openalex.org/W4232601069","https://openalex.org/W4239813889","https://openalex.org/W4245435048","https://openalex.org/W4285719527","https://openalex.org/W6602643744","https://openalex.org/W6606201245","https://openalex.org/W6629886115","https://openalex.org/W6630448420","https://openalex.org/W6631021998","https://openalex.org/W6632907626","https://openalex.org/W6634259793","https://openalex.org/W6635142148","https://openalex.org/W6635419185","https://openalex.org/W6639065747","https://openalex.org/W6639864006","https://openalex.org/W6656337532","https://openalex.org/W6674868386","https://openalex.org/W6675416627","https://openalex.org/W6675530728","https://openalex.org/W6676062913","https://openalex.org/W6678051712","https://openalex.org/W6678850886","https://openalex.org/W6679170867","https://openalex.org/W6681648988","https://openalex.org/W6711766707","https://openalex.org/W6713252871","https://openalex.org/W6733513268","https://openalex.org/W6922295283"],"related_works":["https://openalex.org/W2810872891","https://openalex.org/W4387947354","https://openalex.org/W4388483122","https://openalex.org/W2205483282","https://openalex.org/W4387126921","https://openalex.org/W2058699798","https://openalex.org/W3030592833","https://openalex.org/W2354385412","https://openalex.org/W3037087970","https://openalex.org/W2032897247"],"abstract_inverted_index":{"A":[0],"software":[1,25,29,64],"birthmark":[2,30,65],"is":[3,94],"a":[4,8,53,60,121],"unique":[5],"characteristic":[6],"of":[7,38,52,63,136],"program.":[9,54],"Thus,":[10],"comparing":[11],"the":[12,15,36,50,80,141,144],"birthmarks":[13,93],"between":[14],"plaintiff":[16],"and":[17,41,105,116,129,143],"defendant":[18],"programs":[19],"provides":[20],"an":[21,77],"effective":[22],"approach":[23],"for":[24,82],"plagiarism":[26,86],"detection.":[27],"However,":[28],"generation":[31],"faces":[32],"two":[33],"main":[34],"challenges:":[35],"absence":[37],"source":[39,83],"code":[40,43],"various":[42],"obfuscation":[44,99,107],"techniques":[45,100,108],"that":[46,72],"attempt":[47],"to":[48,96],"hide":[49],"characteristics":[51],"In":[55],"this":[56],"paper,":[57],"we":[58],"propose":[59],"new":[61,92],"type":[62],"called":[66,123],"DYnamic":[67],"Key":[68],"Instruction":[69],"Sequence":[70],"(DYKIS)":[71],"can":[73],"be":[74],"extracted":[75],"from":[76],"executable":[78],"without":[79],"need":[81],"code.":[84],"The":[85,139],"detection":[87],"algorithm":[88],"based":[89],"on":[90,133],"our":[91],"resilient":[95],"both":[97],"weak":[98],"such":[101,112],"as":[102,113],"compiler":[103],"optimizations":[104],"strong":[106],"implemented":[109],"in":[110],"tools":[111],"SandMark,":[114],"Allatori":[115],"Upx.":[117],"We":[118],"have":[119],"developed":[120],"tool":[122],"DYKIS-PD":[124],"(DYKIS":[125],"Plagiarism":[126],"Detection":[127],"tool)":[128],"conducted":[130],"extensive":[131],"experiments":[132],"large":[134],"number":[135],"binary":[137],"programs.":[138],"tool,":[140],"benchmarks":[142],"experimental":[145],"results":[146],"are":[147],"all":[148],"publicly":[149],"available.":[150]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":9},{"year":2020,"cited_by_count":11},{"year":2019,"cited_by_count":5},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":6},{"year":2016,"cited_by_count":9},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
