A Token-based Illicit Copy Detection Method Using Complexity for a Program Exercise

The conducts to copy using other person's source codes and submit as reports are regarded as a problem for program exercises of programming subjects in universities or colleges. An automatic detection algorithm to detect illicit copies is required in these educational organizations. In previous...

Full description

Saved in:
Bibliographic Details
Published in2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications pp. 575 - 580
Main Authors Iwamoto, Mai, Oshima, Shunsuke, Nakashima, Takuo
Format Conference Proceeding
LanguageEnglish
Japanese
Published IEEE 01.10.2013
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:The conducts to copy using other person's source codes and submit as reports are regarded as a problem for program exercises of programming subjects in universities or colleges. An automatic detection algorithm to detect illicit copies is required in these educational organizations. In previous researches, these methods based on the detection standard of the token length have been proposed. These methods use the threshold simply using the character length. In these cases, miss detections occur in the case of the simple program such as the sequence of the print statement or the case that token sequences appear in the middle of a statement. This paper proposes the detection method using the program complexity and the complete token sequence. As the results of experiments, our method can improve the recall R adopting the complexity as the detection standard and the precision P adopting the complete token sequence for exercise programs submitted by students.
DOI:10.1109/BWCCA.2013.100