Source Code Authorship Attribution Using Long Short-Term Memory Based Networks

被引:57
作者
Alsulami, Bander [1 ]
Dauber, Edwin [1 ]
Harang, Richard [2 ]
Mancoridis, Spiros [1 ]
Greenstadt, Rachel [1 ]
机构
[1] Drexel Univ, Philadelphia, PA 19104 USA
[2] Sophos, Abingdon, Oxon, England
来源
COMPUTER SECURITY - ESORICS 2017, PT I | 2018年 / 10492卷
关键词
Source code authorship attribution; Code stylometry; Long short-term memory; Abstract syntax tree; Security; Privacy; BACKPROPAGATION;
D O I
10.1007/978-3-319-66402-6_6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Machine learning approaches to source code authorship attribution attempt to find statistical regularities in human-generated source code that can identify the author or authors of that code. This has applications in plagiarism detection, intellectual property infringement, and post-incident forensics in computer security. The introduction of features derived from the Abstract Syntax Tree (AST) of source code has recently set new benchmarks in this area, significantly improving over previous work that relied on easily obfuscatable lexical and format features of program source code. However, these AST-based approaches rely on hand-constructed features derived from such trees, and often include ancillary information such as function and variable names that may be obfuscated or manipulated. In this work, we provide novel contributions to AST-based source code authorship attribution using deep neural networks. We implement Long Short-Term Memory (LSTM) and Bidirectional Long Short-Term Memory (BiLSTM) models to automatically extract relevant features from the AST representation of programmers' source code. We show that our models can automatically learn efficient representations of AST-based features without needing hand-constructed ancillary information used by previous methods. Our empirical study on multiple datasets with different programming languages shows that our proposed approach achieves the state-of-the-art performance for source code authorship attribution on AST-based features, despite not leveraging information that was previously thought to be required for high-confidence classification.
引用
收藏
页码:65 / 82
页数:18
相关论文
共 59 条
[1]  
[Anonymous], 25 ANN NETW DISTR SY
[2]  
[Anonymous], 2013, ACL
[3]  
[Anonymous], 1995, Artificial Intelligence
[4]  
[Anonymous], 2015, 24 USENIX SEC S USEN
[5]  
[Anonymous], 2016, IEEE T NEURAL NETW L
[6]  
[Anonymous], 2016, Google's neural machine translation system: Bridging the gap between human and machine translation
[7]  
[Anonymous], 2016, GENERALIZING RESIDUA
[8]   Using metrics to identify design patterns in object-oriented software [J].
Antoniol, G ;
Fiutem, R ;
Cristoforetti, L .
FIFTH INTERNATIONAL SOFTWARE METRICS SYMPOSIUM - METRICS 1998, PROCEEDINGS, 1998, :23-34
[9]   Control flow obfuscation for Android applications [J].
Balachandran, Vivek ;
Sufatrio ;
Tan, Darell J. J. ;
Thing, Vrizlynn L. L. .
COMPUTERS & SECURITY, 2016, 61 :72-93
[10]  
Barford P, 2007, ADV INFORM SECUR, P171