{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T07:06:06Z","timestamp":1763017566368,"version":"3.37.3"},"reference-count":77,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"12","license":[{"start":{"date-parts":[[2015,12,1]],"date-time":"2015-12-01T00:00:00Z","timestamp":1448928000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2015,12,1]],"date-time":"2015-12-01T00:00:00Z","timestamp":1448928000000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2015,12,1]],"date-time":"2015-12-01T00:00:00Z","timestamp":1448928000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2015,12,1]],"date-time":"2015-12-01T00:00:00Z","timestamp":1448928000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["91118005","91218301","61221063","61428206","61203174","91418205","61472318"],"award-info":[{"award-number":["91118005","91218301","61221063","61428206","61203174","91418205","61472318"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Ministry of Education Innovation Research Team","award":["IRT13035"],"award-info":[{"award-number":["IRT13035"]}]},{"name":"Key Projects in the National Science and Technology Pillar Program of China","award":["2013BAK09B01"],"award-info":[{"award-number":["2013BAK09B01"]}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCF-1500365"],"award-info":[{"award-number":["CCF-1500365"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IIEEE Trans. Software Eng."],"published-print":{"date-parts":[[2015,12,1]]},"DOI":"10.1109\/tse.2015.2454508","type":"journal-article","created":{"date-parts":[[2015,7,9]],"date-time":"2015-07-09T18:37:15Z","timestamp":1436467035000},"page":"1217-1235","source":"Crossref","is-referenced-by-count":51,"title":["Software Plagiarism Detection with Birthmarks Based on Dynamic Key Instruction Sequences"],"prefix":"10.1109","volume":"41","author":[{"given":"Zhenzhou","family":"Tian","sequence":"first","affiliation":[]},{"given":"Qinghua","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Ting","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Ming","family":"Fan","sequence":"additional","affiliation":[]},{"given":"Eryue","family":"Zhuang","sequence":"additional","affiliation":[]},{"given":"Zijiang","family":"Yang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","first-page":"116","article-title":"Panorama: Capturing system-wide information flow for malware detection and analysis","author":"yin","year":"0","journal-title":"Proc ACM Conf Comput Commun Security"},{"key":"ref72","first-page":"8","article-title":"Scalable, behavior-based malware clustering","volume":"9","author":"bayer","year":"0","journal-title":"ISOC Symp Network and Distributed System Security"},{"key":"ref71","first-page":"108","article-title":"Learning and classification of malware behavior","author":"rieck","year":"0","journal-title":"Detection of Intrusions and Malware and Vulnerability Assessment"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1145\/2020408.2020419"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1145\/1882291.1882316"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985809"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/VLHCC.2006.32"},{"key":"ref39","first-page":"98","article-title":"A study of the packer problem and its solutions","author":"guo","year":"0","journal-title":"Proc Int Symp Recent Adv Intrusion Detection"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2005.06.044"},{"key":"ref38","first-page":"63","article-title":"Behavioral distance for intrusion detection","author":"gao","year":"0","journal-title":"Proc Int Symp Recent Adv Intrusion Detection"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2009.04.011"},{"year":"0","key":"ref32"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxp095"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1587\/transinf.E95.D.565"},{"key":"ref37","first-page":"140","article-title":"LOCO: An interactive code (de)obfuscation tool","author":"madou","year":"0","journal-title":"Proc ACM SIGPLAN Symp Partial Eval Semantics-Based Program Manipulation"},{"key":"ref36","article-title":"Binary obfuscation using signals","author":"popov","year":"0","journal-title":"Proc Usenix Security Symp"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/948148.948149"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/1167473.1167488"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2004.1317484"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2001.957835"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2006.18"},{"key":"ref63","first-page":"40","article-title":"Using slicing to identify duplication in source code","author":"komondoor","year":"0","journal-title":"Proc Int Symp Static Analysis"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065034"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368132"},{"key":"ref27","first-page":"740","article-title":"DBPD: A dynamic birthmark-based software plagiarism detection tool","author":"tian","year":"2014"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/1572272.1572283"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1145\/1572272.1572287"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2151024.2151042"},{"key":"ref67","first-page":"2721","article-title":"Learning to detect and classify malicious executables in the wild","volume":"6","author":"kolter","year":"2006","journal-title":"J Mach Learn Res"},{"key":"ref68","first-page":"129","article-title":"Detecting self-mutating malware using control-flow graph matching","author":"bruschi","year":"0","journal-title":"Proceedings of the 2nd International Conference on Intrusion and Malware Detection and Vulnerability Assessment"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653736"},{"year":"0","key":"ref2"},{"year":"0","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227178"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2223685"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC.and.EUC.2013.93"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/SNPD.2013.11"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653696"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ASWEC.2008.4483257"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICICISYS.2010.5658584"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/1985441.1985453"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635900"},{"key":"ref59","first-page":"156","article-title":"Detecting higher-level similarity patterns in programs","author":"basit","year":"0","journal-title":"Proc 5th Joint Metting Eur Softw Eng Conf ACM SIGSOFT Symp Found Softw Eng"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.1995.514697"},{"key":"ref57","first-page":"109","article-title":"A language independent approach for detecting duplicated code","author":"ducasse","year":"0","journal-title":"Proc IEEE Int Conf Softw Maintenance"},{"key":"ref56","first-page":"96","article-title":"Deckard: Scalable and accurate tree-based detection of code clones","author":"jiang","year":"0","journal-title":"Proc Int Conf Softw Eng"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985835"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1019480"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2006.28"},{"key":"ref52","article-title":"Dynamic software birthmarks to detect the theft of windows applications","author":"tamada","year":"0","journal-title":"Proc Int l Symp Future Software Technology"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150522"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1321631.1321672"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ISORC.2010.23"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2009.24"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1219058"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2522968.2522972"},{"key":"ref15","first-page":"919","article-title":"Design and evaluation of dynamic software birthmarks based on api calls","author":"tamada","year":"2007"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2008.11.848"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICSC.2007.15"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985899"},{"key":"ref19","article-title":"Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software","author":"newsome","year":"0","journal-title":"ISOC Symp Network and Distributed System Security"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/996841.996856"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/292540.292569"},{"key":"ref6","first-page":"404","article-title":"Detecting software theft via whole program path birthmarks","author":"myles","year":"0","journal-title":"Proc Int Conf Inf Commun Security"},{"key":"ref5","first-page":"569","article-title":"Design and evaluation of birthmarks for detecting theft of Java programs","author":"tamada","year":"0","journal-title":"Proc of the IASTED Conf on Software Engineering"},{"key":"ref8","first-page":"1016","article-title":"Finding plagiarisms among a set of programs with jplag","volume":"8","author":"prechelt","year":"2002","journal-title":"J Universal Comput Sci"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1066677.1066753"},{"article-title":"On the limits of software watermarking","year":"1998","author":"collberg","key":"ref49"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1268784.1268807"},{"key":"ref46","first-page":"25","article-title":"ViewDroid: Towards obfuscation-resilient mobile application repackaging detection","author":"zhang","year":"0","journal-title":"Proc ACM Conf Security Privacy Wireless Mobile Netw"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2011.223"},{"key":"ref48","first-page":"177","article-title":"A functional taxonomy for software watermarking","author":"nagra","year":"0","journal-title":"Proc Australian Computer Science Conf"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/2133601.2133640"},{"key":"ref42","first-page":"143","article-title":"On the limits of information flow techniques for malware analysis and containment","author":"cavallaro","year":"0","journal-title":"Proceedings of the 2nd International Conference on Intrusion and Malware Detection and Vulnerability Assessment"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/0005-2795(75)90109-9"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/2663761.2664219"},{"key":"ref43","article-title":"DTA++: Dynamic taint analysis with targeted control-flow propagation","author":"kang","year":"0","journal-title":"ISOC Symp Network and Distributed System Security"}],"container-title":["IEEE Transactions on Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielaam\/32\/7349123\/7153572-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/32\/7349123\/07153572.pdf?arnumber=7153572","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,8]],"date-time":"2022-04-08T18:48:20Z","timestamp":1649443700000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7153572\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12,1]]},"references-count":77,"journal-issue":{"issue":"12"},"URL":"https:\/\/doi.org\/10.1109\/tse.2015.2454508","relation":{},"ISSN":["0098-5589","1939-3520","2326-3881"],"issn-type":[{"type":"print","value":"0098-5589"},{"type":"electronic","value":"1939-3520"},{"type":"electronic","value":"2326-3881"}],"subject":[],"published":{"date-parts":[[2015,12,1]]}}}