loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Georgia Frantzeskou ; Efstathios Stamatatos and Stefanos Gritzalis

Affiliation: Laboratory of Information and Communication Systems Security, Aegean University, Greece

Keyword(s): Source Code Authorship Analysis, Software Forensics, Security.

Related Ontology Subjects/Areas/Topics: Data and Application Security and Privacy ; Data Engineering ; Data Privacy and Security ; Databases and Data Security ; Information and Systems Security

Abstract: Source code authorship analysis is the particular field that attempts to identify the author of a computer program by treating each program as a linguistically analyzable entity. This is usually based on other undisputed program samples from the same author. There are several cases where the application of such a method could be of a major benefit, such as tracing the source of code left in the system after a cyber attack, authorship disputes, proof of authorship in court, etc. In this paper, we present our approach which is based on byte-level n-gram profiles and is an extension of a method that has been successfully applied to natural language text authorship attribution. We propose a simplified profile and a new similarity measure which is less complicated than the algorithm followed in text authorship attribution and it seems more suitable for source code identification since is better able to deal with very small training sets. Experiments were performed on two different data se ts, one with programs written in C++ and the second with programs written in Java. Unlike the traditional language-dependent metrics used by previous studies, our approach can be applied to any programming language with no additional cost. The presented accuracy rates are much better than the best reported results for the same data sets. (More)

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 3.139.236.93

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Frantzeskou, G.; Stamatatos, E. and Gritzalis, S. (2005). SUPPΟRTING THE CYBERCRIME INVESTIGATION PROCESS: EFFECTIVE DISCRIMINATION OF SOURCE CODE AUTHORS BASED ON BYTE-LEVEL INFORMATION. In Proceedings of the Second International Conference on e-Business and Telecommunication Networks - Volume 1: ICETE; ISBN 972-8865-32-5; ISSN 2184-3236, SciTePress, pages 283-290. DOI: 10.5220/0001414902830290

@conference{icete05,
author={Georgia Frantzeskou. and Efstathios Stamatatos. and Stefanos Gritzalis.},
title={SUPPΟRTING THE CYBERCRIME INVESTIGATION PROCESS: EFFECTIVE DISCRIMINATION OF SOURCE CODE AUTHORS BASED ON BYTE-LEVEL INFORMATION},
booktitle={Proceedings of the Second International Conference on e-Business and Telecommunication Networks - Volume 1: ICETE},
year={2005},
pages={283-290},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0001414902830290},
isbn={972-8865-32-5},
issn={2184-3236},
}

TY - CONF

JO - Proceedings of the Second International Conference on e-Business and Telecommunication Networks - Volume 1: ICETE
TI - SUPPΟRTING THE CYBERCRIME INVESTIGATION PROCESS: EFFECTIVE DISCRIMINATION OF SOURCE CODE AUTHORS BASED ON BYTE-LEVEL INFORMATION
SN - 972-8865-32-5
IS - 2184-3236
AU - Frantzeskou, G.
AU - Stamatatos, E.
AU - Gritzalis, S.
PY - 2005
SP - 283
EP - 290
DO - 10.5220/0001414902830290
PB - SciTePress