首页 > 范文大全 > 正文

基于本地和索引信息的代码侵权检测方法

开篇:润墨网以专业的文秘视角,为您筛选了一篇基于本地和索引信息的代码侵权检测方法范文,如需获取更多写作素材,在线客服老师一对一协助。欢迎您的阅读与分享!

摘要:开源软件越来越丰富,企业开发人员可以方便地通过复用开源代码提高开发效率。但是开源代码的许可证非常复杂,未加管理的

>> 基于中间表示的代码相似性检测方法 基于行为特征的恶意代码检测方法 基于软件代码演化信息的克隆谱系提取方法 基于字符串的代码克隆检测方法的分析 基于交互行为的恶意代码检测研究 使用哈希值和标识符冲突率的克隆代码检测的误检消除方法 基于视频信息分割分类索引方法的初步研究 基于无线通信技术可提供本地交互应用和信息服务系统的实现 基于粗糙集和信息熵的入侵检测特征选择方法研究 基于Morlet复小波变换幅值和相位信息的间谐波检测方法 基于撞击旋转法解除保险引信的发火方法 基于涡流场的装甲目标磁引信近场定距方法 一种基于关联和的分布式入侵检测模型 基于源代码的隐通道搜索方法 基于代码生成的XML自动解析方法研究 基于源代码挖掘的软件质量改进方法研究 基于LCS和GST算法的代码相似度分析 基于大数据的APT攻击方法和检测方法 基于信息不对称和交易费用理论的在线旅游商研究 基于语义的元数据索引查询方法 常见问题解答 当前所在位置:l?utm_source=tuicool&utm_medium=referral.

[2] FREE SOFTWARE FOUNDATION.Various licenses and comments about them,2017[EB/OL]..

[3] 田振洲,刘烃,郑庆华,等.软件抄袭检测研究综述[J].信息安全学报,2016,1(3):158-161.

[4] PRECHELT L,MALPOHL G.Finding plagiarisms among a set of programs with JPlag[EB/OL].https:///publication/2832828_Finding_Plagiarisms_among_a_Set_of_Programs_with_JPlag.

[5] WISE M J.YAP3:improved detection of similarities in computer program and other texts[J].Acm Sigcse Bulletin,1996,28(1):130-134.

[6] LIVIERI S,HIGO Y,MATUSHITA M,et al.Very-large scale code clone analysis and visualization of open source programs using distributed CCFinder: D-CCFinder[C].International Conference on Software Engineering.IEEE,2007:106-115.

[7] LIU C,CHEN C,HAN J,et al.GPLAG: detection of software plagiarism by program dependence graph analysis[C].ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.ACM,2006:872--881.

[8] 史庆庆,孟繁军,张丽萍,等.克隆代码技术研究综述[J].计算机应用研究,2013,30(6):1617-1623.

[9] HUMMEL B,JUERGENS E,HEINEMANN L,et al.Index-based code clone detection: incremental,distributed,scalable[C].IEEE International Conference on Software Maintenance.IEEE Computer Society,2010:1-9.

[10] HALSTEAD M H.Elements of software science[M].Elsevierence,1977.

[11] OTTENSTEIN K J.An algorithmic approach to the detection and prevention of plagiarism[J].Acm Sigcse Bulletin,1976,8(4):30-41.

[12] GRIER S.A tool that detects plagiarism in pascal programs[J].ACM SIGCSE Bulletin,1981,13(1):15-20.

[13] VERCO K L,WISE M J.Software for detecting suspected plagiarism: comparing structure and attribute-counting systems[C].Australasian Conference on Computer Science Education.ACM,1996:81-88.

[14] BAKER B S.A program for identifying duplicated code[M].Computing Science & Statistics,1992.

[15] KIM Y C,CHO Y Y,MOON J B.A plagiarism detection system using a syntax-tree.[C].International Conference on Computational Intelligence,ICCI 2004.

[16] JIANG L,MISHERGHI G,SU Z,et al.DECKARD:scalable and accurate tree-based detection of code clones[C].International Conference on Software Engineering.IEEE,2007:96-105.

[17] RIVEST R.The MD5 message-digest algorithm[M].RFC Editor,1992.

[18] JONES E L.Metrics based plagiarism monitoring[C].Ccsc Northeastern Conference,2001:1-8.

英文摘要Abstract:With the growing of open source software,enterprise developers tends to reuse existing open source code to improve development efficiency.But the complexity and variety of open source licenses may bring serious legal risks to enterprises.As a result,the immediate infringement detection is important to help enterprises to avoid such risks.However,general enterprises are unable to maintain the Internet-level open source code library,and needs to provide their own source code when using the third-party detection system which may cause the disclosure of enterprises’ technological secrets.In order to solve those problems,our paper proposes a local proxy code infringement detection approach.It only require enterprises providing the code structure and index information,without necessary of all of its source code.Our approach can protect enterprise source privacy and achieve efficient infringement detection.

英文关键词Key Words:Infringement Detection;Hash;Index;Code Plagiarism;Clone Detection;Local Proxy