The JK System to Detect Plagiarism

Authors

  • Khair Eddin M. Sabri Computer Science Department, University of Jordan, Amman, Jordan
  • Jubair J. Al-Jaafer Computer Information System Department, University of Jordan, Amman, Jordan

Keywords:

Entropy, Plagiarism, Reverse Engineering, Software Engineering, Java Programs

Abstract

In this research a system, referred to as Jubair-Khaireddin (JK), has been developed to assess the degree of similarity between two programs even though they look superficially dissimilar. The JK system has the capability to detect deliberate attempts of plagiarism. Reverse engineering technique is used to bring each suspected program back to its initial specification stage. This operation enables us to extract the structure of the program which is an important factor in detecting plagiarism. This can be achieved through the extraction of the Static Execution Tree (SET) for each program. The SET is then transformed into Terminating Binary Sequence (TBS). The TBSs generated from the tested programs are compared in order to get similar branches. Reengineering technique is then applied on these similar branches in order to compute its entropy (information content). The entropy is computed to prove or disprove the existence of similarities between programs. The JK system has been tested on different Java programs with different modifications, and proved successful in detecting almost all cases including those of partially plagiarised programs.

Downloads

Download data is not yet available.

References

[1] P. Clough, “Plagiarism in Natural and Programming Languages: An overview of current tools and technologies”. Internal report, Department of Computer Science, University of Sheffield, 2000 http://www.dcs.shef.ac.uk/~cloughie/papers/Plagiarism.pdf
[2] S. Grier, “A tool that detects plagiarism in Pascal programs”, ACM SIGCSM Bulletin, Vol. 13, No. 1, 1981, pp. 15-20.
[3] J.L. Donaldson, L. Ann-Marie, and P.H. Sposato, “A plagiarism detection system”, ACM SIGCSE Bulletin, Vol. 13, No. 1, 1981, pp.21-25.
[4] L.J. Edward, “Metrics based plagarism monitoring”,The Journal of Computing in Small Colleges, Vol. 16, No. 4, 2001, pp. 253-261.
[5] S.D. Stephens, “Using metrics to detect plagiarism” (Student paper). The Journal of Computing in Small Colleges, Vol. 16, No. 3, 2001, pp.191-196.
[6] A. Aiken, “Measure of software similarity”, URL http://www.cs.berkeley.edu/-aiken/moss.html.
[7] M.J. Wise, “YAP3: Improved Detection of similarities in computer program and other Texts”, ACM SIGCSE, 1996, pp. 130-134.
[8] L. Prechelt, G. Malpohl and M. Phillippsen, “JPlag: Finding Plagiarisms among a Set of Programs”, Technical Report, 2000 http://www.ipd.uka.de/~prechelt/Biblio/Biblio/jplagTR.pdf
[9] D. Gitchell and N. Tran, “Sim: A Utility for Detecting Similarity in Computer Programs”, ACM SIGCSE Technical Symposium, Vol. 31,No.1, 1999, pp. 266-270.
[10] K.L. Verco and M.J. Wise, “Software for Detecting Suspected Plagiarism: Comparing Structure and Attribute-Counting Systems”, Proceedings of First Australian Conference on Computer Science Education, Sydney, Australia, July 3-5 1996, pp. 81-88.
[11] H.T. Jankowitz, “Detecting plagiarism in student Pascal programs”, Computer Journal, Vol. 31, No 1, 1988, pp 1-8.
[12] B. Baker and U. Manber, “Deducing similarities in java sources from bytecode”, Proceeding of USENIX Annual Technical Conference, New Orleans, 1998, pp. 179-190.
[13] P. Cunningham and A. Alexander, “Using CBR techniques to detect plagiarism in computing assignments”, Proceedings of the First European Workshop on Case-Based Reasoning EWCBR-93, Kaiserslauten, Germany, 1993, 178-183.
[14] C. Daly and J. Horgan, “Patterns of Plagiarism”, Proceedings of the 36th SIGCSE technical symposium on Computer science education, 2005, pp. 383-387.
[15] P. Vamplew and J. Dermoudy, “An anti-plagiarism editor for software development courses”, Proceedings of the 7th Australian conference on Computing education, Australia, 2005, pp. 83-90.
[16] L.S. Shooman, Software Engineering Design, Reliability and Management, McGraw-Hill Book Company, 1983.
[17] J. Davis and R. LeBlanc, "A Study of the Applicability of Complexity Measures", IEEE transactions on Software Engineering, Vol. 14, No. 9, 1988, pp. 1366-1372.
[18] E.S. Page and L.B. Wilson, Information Representation and Manipulation in a Computer. Cambridge University press, 1973.

Downloads

Published

2006-10-02

Issue

Section

Original Articles

How to Cite

[1]
“The JK System to Detect Plagiarism”, JCS&T, vol. 6, no. 02, pp. p. 66–72, Oct. 2006, Accessed: Feb. 07, 2026. [Online]. Available: https://journal.info.unlp.edu.ar/JCST/article/view/816

Similar Articles

1-10 of 190

You may also start an advanced similarity search for this article.