IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Source Code Authorship Analysis For Supporting the Cybercrime Investigation Process

Source Code Authorship Analysis For Supporting the Cybercrime Investigation Process
View Sample PDF
Author(s): Georgia Frantzeskou (University of the Aegean, Greece), Stephen G. MacDonell (Auckland University of Technology, New Zealand)and Efstathios Stamatatos (University of the Aegean, Greece)
Copyright: 2010
Pages: 26
Source title: Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions
Source Author(s)/Editor(s): Chang-Tsun Li (University of Warwick, UK)
DOI: 10.4018/978-1-60566-836-9.ch020

Purchase

View Source Code Authorship Analysis For Supporting the Cybercrime Investigation Process on the publisher's website for pricing and purchasing information.

Abstract

Nowadays, in a wide variety of situations, source code authorship identification has become an issue of major concern. Such situations include authorship disputes, proof of authorship in court, cyber attacks in the form of viruses, trojan horses, logic bombs, fraud, and credit card cloning. Source code author identification deals with the task of identifying the most likely author of a computer program, given a set of predefined author candidates. We present a new approach, called the SCAP (Source Code Author Profiles) approach, based on byte-level n-grams in order to represent a source code author’s style. Experiments on data sets of different programming-language (Java,C++ and Common Lisp) and varying difficulty (6 to 30 candidate authors) demonstrate the effectiveness of the proposed approach. A comparison with a previous source code authorship identification study based on more complicated information shows that the SCAP approach is language independent and that n-gram author profiles are better able to capture the idiosyncrasies of the source code authors. It is also demonstrated that the effectiveness of the proposed model is not affected by the absence of comments in the source code, a condition usually met in cyber-crime cases.

Related Content

Hossam Nabil Elshenraki. © 2024. 23 pages.
Ibtesam Mohammed Alawadhi. © 2024. 9 pages.
Akashdeep Bhardwaj. © 2024. 33 pages.
John Blake. © 2024. 12 pages.
Wasswa Shafik. © 2024. 36 pages.
Amar Yasser El-Bably. © 2024. 12 pages.
Sameer Saharan, Shailja Singh, Ajay Kumar Bhandari, Bhuvnesh Yadav. © 2024. 23 pages.
Body Bottom