{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:24:12Z","timestamp":1750307052670,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,7,15]],"date-time":"2012-07-15T00:00:00Z","timestamp":1342310400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,7,15]]},"DOI":"10.1145\/2338965.2336767","type":"proceedings-article","created":{"date-parts":[[2012,7,26]],"date-time":"2012-07-26T14:41:14Z","timestamp":1343313674000},"page":"111-121","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":52,"title":["A first step towards algorithm plagiarism detection"],"prefix":"10.1145","author":[{"given":"Fangfang","family":"Zhang","sequence":"first","affiliation":[{"name":"Pennsylvania State University, USA"}]},{"given":"Yoon-Chan","family":"Jhi","sequence":"additional","affiliation":[{"name":"Samsung, South Korea"}]},{"given":"Dinghao","family":"Wu","sequence":"additional","affiliation":[{"name":"Pennsylvania State University, USA"}]},{"given":"Peng","family":"Liu","sequence":"additional","affiliation":[{"name":"Pennsylvania State University, USA"}]},{"given":"Sencun","family":"Zhu","sequence":"additional","affiliation":[{"name":"Pennsylvania State University, USA"}]}],"member":"320","published-online":{"date-parts":[[2012,7,15]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"binobf: Binary obfuscation software. http:\/\/www.cs. arizona.edu\/~debray\/binary-obfuscation\/.  binobf: Binary obfuscation software. http:\/\/www.cs. arizona.edu\/~debray\/binary-obfuscation\/."},{"key":"e_1_3_2_1_2_1","unstructured":"MOSS - a system for detecting software plagiarism. http:\/\/theory.stanford.edu\/~aiken\/moss\/.  MOSS - a system for detecting software plagiarism. http:\/\/theory.stanford.edu\/~aiken\/moss\/."},{"key":"e_1_3_2_1_3_1","unstructured":"Semantic designs inc. C source code obfuscator. http:\/\/www.semdesigns.com\/products\/ obfuscators\/CObfuscator.html.  Semantic designs inc. C source code obfuscator. http:\/\/www.semdesigns.com\/products\/ obfuscators\/CObfuscator.html."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1985.231893"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/832303.836911"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/850947.853341"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/1247360.1247401"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70542-0_8"},{"volume-title":"IEEE 8th International Symposium on Fault Tolerant Computing (FTCS-8)","year":"1978","author":"Chen L.","key":"e_1_3_2_1_9_1"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/996841.996856"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/292540.292569"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/964001.964016"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368132"},{"key":"e_1_3_2_1_15_1","unstructured":"GrammaTech. Codesurfer. http:\/\/www.grammatech.com.  GrammaTech. Codesurfer. http:\/\/www.grammatech.com."},{"key":"e_1_3_2_1_16_1","unstructured":"GrammaTech Inc. Dependence graphs and program slicing. Technical report. White Paper.  GrammaTech Inc. Dependence graphs and program slicing. Technical report. White Paper."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985899"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.30"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1019480"},{"volume-title":"Inc.","year":"2005","author":"Kleinberg J.","key":"e_1_3_2_1_20_1"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/647170.718283"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/832308.837142"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150522"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSC.2007.7"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1111542.1111566"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"G. Myles and C. Collberg. Detecting software theft via whole program path birthmarks. Information Security 3225\/2004: 404-415 2004.  G. Myles and C. Collberg. Detecting software theft via whole program path birthmarks. Information Security 3225\/2004:404-415 2004.","DOI":"10.1007\/978-3-540-30144-8_34"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1066677.1066753"},{"volume-title":"Proceedings of the NDSS 2005","year":"2005","author":"Newsome J.","key":"e_1_3_2_1_28_1"},{"key":"e_1_3_2_1_29_1","unstructured":"L. Prechelt G. Malpohl and M. Phlippsen. JPlag: Finding plagiarisms among a set of programs. Technical report 2000.  L. Prechelt G. Malpohl and M. Phlippsen. JPlag: Finding plagiarisms among a set of programs. Technical report 2000."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572272.1572287"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/872757.872770"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1321631.1321672"},{"volume-title":"In Proc. IASTED International Conference on Software Engineering","year":"2004","author":"Tamada H.","key":"e_1_3_2_1_33_1"},{"volume-title":"Int. Symp. on Future Software Technology","year":"2004","author":"Tamada H.","key":"e_1_3_2_1_34_1"},{"key":"e_1_3_2_1_35_1","volume-title":"Proceedings of the second workshop on Australasian information security, Data Mining and Web Intelligence, and Software Internationalisation -","volume":"32","author":"Thomborson C.","year":"2004"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653696"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2009.24"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.5555\/800078.802557"}],"event":{"name":"ISSTA '12: International Symposium on Software Testing and Analysis","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","SIGPLAN ACM Special Interest Group on Programming Languages"],"location":"Minneapolis MN USA","acronym":"ISSTA '12"},"container-title":["Proceedings of the 2012 International Symposium on Software Testing and Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2338965.2336767","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2338965.2336767","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:21:08Z","timestamp":1750238468000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2338965.2336767"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,7,15]]},"references-count":37,"alternative-id":["10.1145\/2338965.2336767","10.1145\/2338965"],"URL":"https:\/\/doi.org\/10.1145\/2338965.2336767","relation":{},"subject":[],"published":{"date-parts":[[2012,7,15]]},"assertion":[{"value":"2012-07-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}