Code authorship identification using convolutional neural networks

被引:36
作者
Abuhamad, Mohammed [1 ]
Rhim, Ji-su [1 ]
AbuHmed, Tamer [1 ]
Ullah, Sana [2 ]
Kang, Sanggil [1 ]
Nyang, DaeHun [1 ]
机构
[1] Inha Univ, Comp Engn Dept, Incheon, South Korea
[2] Gyeongsang Natl Univ, Jinju, South Korea
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2019年 / 95卷
基金
新加坡国家研究基金会;
关键词
Code authorship identification; Program features privacy; Convolutional neural network; Deep learning identification; Software forensics and security; ATTRIBUTION;
D O I
10.1016/j.future.2018.12.038
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Although source code authorship identification creates a privacy threat for many open source contributors, it is an important topic for the forensics field and enables many successful forensic applications, including ghostwriting detection, copyright dispute settlements, and other code analysis applications. This work proposes a convolutional neural network (CNN) based code authorship identification system. Our proposed system exploits term frequency-inverse document frequency, word embedding modeling, and feature learning techniques for code representation. This representation is then fed into a CNN-based code authorship identification model to identify the code's author. Evaluation results from using our approach on data from Google Code Jam demonstrate an identification accuracy of up to 99.4% with 150 candidate programmers, and 96.2% with 1,600 programmers. The evaluation of our approach also shows high accuracy for programmers identification over real-world code samples from 1987 public repositories on GitHub with 95% accuracy for 745 C programmers and 97% for the C++ programmers. These results indicate that the proposed approaches are not language-specific techniques and can identify programmers of different programming languages. (C) 2018 Elsevier B.V. All rights reserved.
引用
收藏
页码:104 / 115
页数:12
相关论文
共 49 条
[1]  
Abadi M, 2016, PROCEEDINGS OF OSDI'16: 12TH USENIX SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, P265
[2]   Source Code Authorship Attribution Using Long Short-Term Memory Based Networks [J].
Alsulami, Bander ;
Dauber, Edwin ;
Harang, Richard ;
Mancoridis, Spiros ;
Greenstadt, Rachel .
COMPUTER SECURITY - ESORICS 2017, PT I, 2018, 10492 :65-82
[3]  
[Anonymous], P 2018 ACM SIGS C
[4]  
[Anonymous], 2021, NEURAL NETW MACH
[5]  
[Anonymous], 2003, Proc. of the conference pacific association for computational linguistics
[6]  
[Anonymous], P WORKSH INT C LEARN
[7]  
[Anonymous], 2015, DEEP LEARNING NATURE, DOI [10.1038/nature14539, DOI 10.1038/NATURE14539]
[8]  
[Anonymous], P 25 NETW DISTR SYST
[9]  
[Anonymous], 2014, P 52 ANN M ASS COMP
[10]  
[Anonymous], ABS1510038202015 COR