Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Codeplan: Repository-level coding using llms and planning
Software engineering activities such as package migration, fixing error reports from static
analysis or testing, and adding type annotations or other specifications to a codebase …
analysis or testing, and adding type annotations or other specifications to a codebase …
Deepsim: deep learning code functional similarity
Measuring code similarity is fundamental for many software engineering tasks, eg, code
search, refactoring and reuse. However, most existing techniques focus on code syntactical …
search, refactoring and reuse. However, most existing techniques focus on code syntactical …
{Under-Constrained} symbolic execution: Correctness checking for real code
Software bugs are a well-known source of security vulnerabilities. One technique for finding
bugs, symbolic execution, considers all possible inputs to a program but suffers from …
bugs, symbolic execution, considers all possible inputs to a program but suffers from …
Semantics-based obfuscation-resilient binary code similarity comparison with applications to software plagiarism detection
Existing code similarity comparison methods, whether source or binary code based, are
mostly not resilient to obfuscations. In the case of software plagiarism, emerging obfuscation …
mostly not resilient to obfuscations. In the case of software plagiarism, emerging obfuscation …
Ironclad apps:{End-to-End} security via automated {Full-System} verification
An Ironclad App lets a user securely transmit her data to a remote machine with the
guarantee that every instruction executed on that machine adheres to a formal abstract …
guarantee that every instruction executed on that machine adheres to a formal abstract …
Similarity of binaries through re-optimization
We present a scalable approach for establishing similarity between stripped binaries (with
no debug information). The main challenge in binary similarity, is to establish similarity even …
no debug information). The main challenge in binary similarity, is to establish similarity even …
Semantics-based obfuscation-resilient binary code similarity comparison with applications to software and algorithm plagiarism detection
Existing code similarity comparison methods, whether source or binary code based, are
mostly not resilient to obfuscations. Identifying similar or identical code fragments among …
mostly not resilient to obfuscations. Identifying similar or identical code fragments among …
Revisiting binary code similarity analysis using interpretable feature engineering and lessons learned
Binary code similarity analysis (BCSA) is widely used for diverse security applications,
including plagiarism detection, software license violation detection, and vulnerability …
including plagiarism detection, software license violation detection, and vulnerability …
Automating regression verification
Regression verification is an approach complementing regression testing with formal
verification. The goal is to formally prove that two versions of a program behave either …
verification. The goal is to formally prove that two versions of a program behave either …
Semantic program repair using a reference implementation
Automated program repair has been studied via the use of techniques involving search,
semantic analysis and artificial intelligence. Most of these techniques rely on tests as the …
semantic analysis and artificial intelligence. Most of these techniques rely on tests as the …