On Plagiarism and Software Plagiarism

被引:0
作者
Folea, Rares [1 ,2 ]
Slusanschi, Emil [1 ]
机构
[1] Natl Univ Sci & Technol Politehn Bucharest, Fac Automat Control & Comp, Dept Comp Sci & Engn, Bucharest, Romania
[2] Doctoral Sch Engn & Applicat Lasers & Accelerator, Bucharest, Romania
来源
ADVANCES IN COMPUTATIONAL COLLECTIVE INTELLIGENCE, ICCCI 2024, PT II | 2024年 / 2166卷
关键词
code similarity; software plagiarism; software fingerprints; software birthmarks; code embeddings; plagiarism detection;
D O I
10.1007/978-3-031-70259-4_24
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper explores the complexities of automatic detection of software similarities, in relation to the unique challenges of digital artifacts, and introduces Project Martial, an open-source software solution for detecting code similarity. This research enumerates some of the existing approaches to counter software plagiarism by examining both the academia and legal landscape, including notable lawsuits and court rulings that have shaped the understanding of software copyright infringements in commercial applications. Furthermore, we categorize the classes of detection challenges based on the available artifacts, and we provide a survey of the previously studied techniques in the literature, including solutions based on fingerprinting, software birthmarks, or code embeddings, and exemplify how a subset of them can be applied in the context of Project Martial.
引用
收藏
页码:314 / 326
页数:13
相关论文
共 43 条
[1]  
[Anonymous], 2023, GPT-4 Technical Report, DOI 10.48550/arXiv.2303.08774
[2]  
[Anonymous], 2023, HP Enterprise settles Oracle copyright lawsuit after $30 mln verdict.
[3]  
BCS T.C.I. f.I., 2022, Record numbers have applied for UK computer science degrees this year.
[4]   Fooling MOSS Detection with Pretrained Language Models [J].
Biderman, Stella ;
Raff, Edward .
PROCEEDINGS OF THE 31ST ACM INTERNATIONAL CONFERENCE ON INFORMATION AND KNOWLEDGE MANAGEMENT, CIKM 2022, 2022, :2933-2943
[5]  
Blog G, 2020, The case for open innovation
[6]  
Blog O, 2020, Copyright Caveat Emptor
[7]  
Cer D, 2018, Arxiv, DOI [arXiv:1803.11175, DOI 10.48550/ARXIV.1803.11175]
[8]  
Cesare S., 2012, Software Similarity and Classification, V1st, DOI [10.1007/978-1-4471-2909-7, DOI 10.1007/978-1-4471-2909-7]
[9]   Software Plagiarism Detection: A Graph-based Approach [J].
Chae, Dong-Kyu ;
Ha, Jiwoon ;
Kim, Sang-Wook ;
Kang, BooJoong ;
Im, Eul Gyu .
PROCEEDINGS OF THE 22ND ACM INTERNATIONAL CONFERENCE ON INFORMATION & KNOWLEDGE MANAGEMENT (CIKM'13), 2013, :1577-1580
[10]  
Chen ZM, 2019, Arxiv, DOI arXiv:1904.03061