当前位置: X-MOL 学术Empir. Software Eng. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Evaluating the robustness of source code plagiarism detection tools to pervasive plagiarism-hiding modifications
Empirical Software Engineering ( IF 4.1 ) Pub Date : 2021-06-18 , DOI: 10.1007/s10664-021-09990-4
Hayden Cheers , Yuqing Lin , Shamus P. Smith

Source code plagiarism is a common occurrence in undergraduate computer science education. In order to identify such cases, many source code plagiarism detection tools have been proposed. A source code plagiarism detection tool evaluates pairs of assignment submissions to detect indications of plagiarism. However, a plagiarising student will commonly apply plagiarism-hiding modifications to source code in an attempt to evade detection. Subsequently, prior work has implied that currently available source code plagiarism detection tools are not robust to the application of pervasive plagiarism-hiding modifications. In this article, 11 source code plagiarism detection tools are evaluated for robustness against plagiarism-hiding modifications. The tools are evaluated with data sets of simulated undergraduate plagiarism, constructed with source code modifications representative of undergraduate students. The results of the performed evaluations indicate that currently available source code plagiarism detection tools are not robust against modifications which apply fine-grained transformations to the source code structure. Of the evaluated tools, JPlag and Plaggie demonstrates the greatest robustness to different types of plagiarism-hiding modifications. However, the results also indicate that graph-based tools, specifically those that compare programs as program dependence graphs, show potentially greater robustness to pervasive plagiarism-hiding modifications.



中文翻译:

评估源代码抄袭检测工具对普遍抄袭隐藏修改的稳健性

源代码抄袭在本科计算机科学教育中屡见不鲜。为了识别此类情况,已经提出了许多源代码抄袭检测工具。源代码抄袭检测工具评估成对的作业提交以检测抄袭迹象。但是,剽窃学生通常会对源代码进行剽窃隐藏修改,以逃避检测。随后,先前的工作表明,当前可用的源代码抄袭检测工具对于普遍存在的抄袭隐藏修改的应用并不稳健。在本文中,评估了 11 个源代码抄袭检测工具对抄袭隐藏修改的鲁棒性。这些工具使用模拟本科抄袭的数据集进行评估,用代表本科生的源代码修改构建。执行评估的结果表明,当前可用的源代码抄袭检测工具对于将细粒度转换应用于源代码结构的修改并不鲁棒。在评估的工具中,JPlag 和 Plaggie 展示了对不同类型的抄袭隐藏修改的最大稳健性。然而,结果还表明,基于图的工具,特别是那些将程序作为程序依赖图进行比较的工具,对普遍存在的抄袭隐藏修改表现出潜在的更大鲁棒性。执行评估的结果表明,当前可用的源代码抄袭检测工具对于将细粒度转换应用于源代码结构的修改并不鲁棒。在评估的工具中,JPlag 和 Plaggie 展示了对不同类型的抄袭隐藏修改的最大稳健性。然而,结果还表明,基于图的工具,特别是那些将程序作为程序依赖图进行比较的工具,对普遍存在的抄袭隐藏修改表现出潜在的更大鲁棒性。执行评估的结果表明,当前可用的源代码抄袭检测工具对于将细粒度转换应用于源代码结构的修改并不鲁棒。在评估的工具中,JPlag 和 Plaggie 展示了对不同类型的抄袭隐藏修改的最大稳健性。然而,结果还表明,基于图的工具,特别是那些将程序作为程序依赖图进行比较的工具,对普遍存在的抄袭隐藏修改表现出潜在的更大鲁棒性。

更新日期:2021-06-18
down
wechat
bug