loading
Papers

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Georgia Frantzeskou ; Efstathios Stamatatos and Stefanos Gritzalis

Affiliation: Laboratory of Information and Communication Systems Security, Aegean University, Greece

ISBN: 972-8865-32-5

Keyword(s): Source Code Authorship Analysis, Software Forensics, Security.

Related Ontology Subjects/Areas/Topics: Data and Application Security and Privacy ; Data Engineering ; Data Privacy and Security ; Databases and Data Security ; Information and Systems Security

Abstract: Source code authorship analysis is the particular field that attempts to identify the author of a computer program by treating each program as a linguistically analyzable entity. This is usually based on other undisputed program samples from the same author. There are several cases where the application of such a method could be of a major benefit, such as tracing the source of code left in the system after a cyber attack, authorship disputes, proof of authorship in court, etc. In this paper, we present our approach which is based on byte-level n-gram profiles and is an extension of a method that has been successfully applied to natural language text authorship attribution. We propose a simplified profile and a new similarity measure which is less complicated than the algorithm followed in text authorship attribution and it seems more suitable for source code identification since is better able to deal with very small training sets. Experiments were performed on two different data set s, one with programs written in C++ and the second with programs written in Java. Unlike the traditional language-dependent metrics used by previous studies, our approach can be applied to any programming language with no additional cost. The presented accuracy rates are much better than the best reported results for the same data sets. (More)

PDF ImageFull Text

Download
CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 18.210.24.208

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Frantzeskou G.; Stamatatos E.; Gritzalis S. and (2005). SUPPΟRTING THE CYBERCRIME INVESTIGATION PROCESS: EFFECTIVE DISCRIMINATION OF SOURCE CODE AUTHORS BASED ON BYTE-LEVEL INFORMATION.In Proceedings of the Second International Conference on e-Business and Telecommunication Networks - Volume 1: ICETE, ISBN 972-8865-32-5, pages 283-290. DOI: 10.5220/0001414902830290

@conference{icete05,
author={Georgia Frantzeskou and Efstathios Stamatatos and Stefanos Gritzalis},
title={SUPPΟRTING THE CYBERCRIME INVESTIGATION PROCESS: EFFECTIVE DISCRIMINATION OF SOURCE CODE AUTHORS BASED ON BYTE-LEVEL INFORMATION},
booktitle={Proceedings of the Second International Conference on e-Business and Telecommunication Networks - Volume 1: ICETE,},
year={2005},
pages={283-290},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0001414902830290},
isbn={972-8865-32-5},
}

TY - CONF

JO - Proceedings of the Second International Conference on e-Business and Telecommunication Networks - Volume 1: ICETE,
TI - SUPPΟRTING THE CYBERCRIME INVESTIGATION PROCESS: EFFECTIVE DISCRIMINATION OF SOURCE CODE AUTHORS BASED ON BYTE-LEVEL INFORMATION
SN - 972-8865-32-5
AU - Frantzeskou, G.
AU - Stamatatos, E.
AU - Gritzalis, S.
PY - 2005
SP - 283
EP - 290
DO - 10.5220/0001414902830290

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.