Feasibility of Deception in Code Attribution

Feasibility of Deception in Code Attribution
Author :
Publisher :
Total Pages : 0
Release :
ISBN-10 : OCLC:1410951744
ISBN-13 :
Rating : 4/5 (44 Downloads)

Book Synopsis Feasibility of Deception in Code Attribution by : Alina Matyukhina

Download or read book Feasibility of Deception in Code Attribution written by Alina Matyukhina and published by . This book was released on 2019 with total page 0 pages. Available in PDF, EPUB and Kindle. Book excerpt: Code authorship attribution is the process used to identify the probable author of given code, based on unique characteristics that reflect an author’s programming style. Inspired by social studies in the attribution of literary works, in the past two decades researchers have examined the effectiveness of code attribution in the computer software domain, including computer security. Authorship attribution techniques have found a broad application in code plagiarism detection, biometric research, forensics, and malware analysis. Studies show that analysis of software might effectively unveil the digital identity of a programmer, reflected through variables and structures, programming language, employed development tools, their settings and, more importantly, how and what these tools are being used to do. Authorship attribution has been a prosperous area of research when an assumption can be made that the author of an unknown program has been honest in their writing style and does not try to modify it. In this thesis, we investigate the feasibility of deception of source code attribution techniques. We begin by exploring how data characteristics and feature selection influence both the accuracy and performance of attribution methods. Within this context, it is necessary to understand whether the results obtained by previous studies depend on the data source, quality, and context or the type of features used. It gives us the opportunity to dive deeper into the process of code authorship attribution to be able to understand its potential weaknesses. To evaluate current code attribution systems, we present an adversarial model defined by the adversary’s goals, knowledge, and capabilities; for each group, we categorize them by the possible variations. Modeling the role of attackers figures prominently in enhancing the cybersecurity defense. We believe that having a solid understanding of the possible attacks can help in the research and deployment of reliable code authorship attribution systems. We present an author imitation attack that deceives current authorship attribution systems by imitating a coding style of a targeted developer. We investigate the attack’s feasibility on open-source software repositories. To subvert an author imitation attack and to help in protecting the developer’s privacy, we introduce an author obfuscation method and novel coding style transformations. The idea of author obfuscation is to allow authors to preserve the readability of their source code while removing identifying stylistic features that can be leveraged for code attribution. Code obfuscation, common in software development, typically aims to disguise the appearance of the code making it difficult to understand and reverse engineer. In contrast, the proposed author obfuscation hides the original author’s style by leaving the source code visible, readable and understandable. In summary, this thesis presents original research work that not only advances the knowledge in code authorship attribution field but also contributes to the overall safety of our digital world by providing author obfuscation methods to protect the privacy of the developers.


Feasibility of Deception in Code Attribution Related Books

Feasibility of Deception in Code Attribution
Language: en
Pages: 0
Authors: Alina Matyukhina
Categories:
Type: BOOK - Published: 2019 - Publisher:

DOWNLOAD EBOOK

Code authorship attribution is the process used to identify the probable author of given code, based on unique characteristics that reflect an author’s progra
Elements of Deterrence
Language: en
Pages: 489
Authors: Erik Gartzke
Categories: Political Science
Type: BOOK - Published: 2024 - Publisher: Oxford University Press

DOWNLOAD EBOOK

Global politics in the twenty-first century is complicated by dense economic interdependence, rapid technological innovation, and fierce security competition. H
Cyber Denial, Deception and Counter Deception
Language: en
Pages: 263
Authors: Kristin E. Heckman
Categories: Computers
Type: BOOK - Published: 2015-11-13 - Publisher: Springer

DOWNLOAD EBOOK

This book presents the first reference exposition of the Cyber-Deception Chain: a flexible planning and execution framework for creating tactical, operational,
Against Essentialism
Language: en
Pages: 416
Authors: Stephan Fuchs
Categories: Social Science
Type: BOOK - Published: 2009-07 - Publisher: Harvard University Press

DOWNLOAD EBOOK

Against Essentialism presents a sociological theory of culture. This interdisciplinary and foundational work deals with basic issues common to current debates i
The Critical Connection
Language: en
Pages: 384
Authors: Elaine M. Ancekewicz
Categories: Literary Criticism
Type: BOOK - Published: 2002 - Publisher: University Press of the South, Incorporated

DOWNLOAD EBOOK

Ancekewicz examines problems in the understanding of history raised by the text of the Essays of Michel de Montaigne. The analysis focuses on textual practice a