Notes:De-anonymizing Programmers via Code Stylometry

Essay Information

De-anonymizing Programmers via Code Stylometry
Aylin Caliskan-Islam, Richard Harang, Andrew Liu, Arvind Narayanan, Clare Voss,
Fabian Yamaguchi, and Rachel Greenstadt.
Usenix Security Symposium, 2015

Source code stylometry

  • Everyone learns coding on an individual basis, as a result code in a
    unique style, which makes de-annoymization possible.

  • Software engineering insights

    • programmer style changes while implementing sophisticated
      functionality
    • differences in coding style of programmers with different skill sets
  • Identify malicious programmers.

  • Scenario 1 : Who wrote this code?
    Alice analyzes a library with Malicious source code.
    Bob has a source code collection with known authors
    Bob will search his collection to find Alice’s adversary

  • Scenario 2 : Who wrote this code?
    Alice got an extension for her programming assignment.
    Bob, the teacher has everyone else’s code.
    Bob wants to see if Alice plagiarized.

这里写图片描述

Machine learning workflow

这里写图片描述

Abstract Syntax Trees (AST)

这里写图片描述

  • Stylemotry can be used in source code to identify the author of a program.
  • Extract layout and lexical features from source code.
    • Abstract syntax trees (AST) in code represent the structure of the program.
    • Preprocess source code to obtain AST.
    • Parse AST to extract coding style features.

Feature Extraction

### Code Stylometry Feature Set (CSFS)

Lexical features (Extract from source code)

这里写图片描述

Layout features (Extract from source code)

这里写图片描述

Syntactic features (Extract from ASTs)

这里写图片描述

Feature Selection

WEKA’s information gain criterion, which evaluates the difference between the entropy of the distribution of classes and the entropy of the conditional distribution of classes given a particular feature:
这里写图片描述
where A is the class corresponding to an author, H is Shannon entropy, and Mi is the ith feature of the dataset.

Intuitively, the information gain can be thought of as measuring the amount of information that the observation of the value of feature i gives about the class label associated with the example.

To reduce the total size and sparsity of the feature vector, we retained only those features that individually had non-zero information gain
这里写图片描述

Random Forest Classification

Method

  • Use random forest as the machine learning classifier
    • avoid over-fitting
    • multi-class classifier by nature
  • K-fold cross validation
  • Validate method on a different dataset

Future work

  • Multiple authorship detection
  • Multiple author identification
  • Anonymizing source code
    • obfuscation is not the answer
  • Stylometry in executable binaries
    • authorship attribution
基于径向基函数神经网络RBFNN的自适应滑模控制学习(Matlab代码实现)内容概要:本文介绍了基于径向基函数神经网络(RBFNN)的自适应滑模控制方法,并提供了相应的Matlab代码实现。该方法结合了RBF神经网络的非线性逼近能力和滑模控制的强鲁棒性,用于解决复杂系统的控制问题,尤其适用于存在不确定性和外部干扰的动态系统。文中详细阐述了控制算法的设计思路、RBFNN的结构与权重更新机制、滑模面的构建以及自适应律的推导过程,并通过Matlab仿真验证了所提方法的有效性和稳定性。此外,文档还列举了大量相关的科研方向和技术应用,涵盖智能优化算法、机器学习、电力系统、路径规划等多个领域,展示了该技术的广泛应用前景。; 适合人群:具备一定自动控制理论基础和Matlab编程能力的研究生、科研人员及工程技术人员,特别是从事智能控制、非线性系统控制及相关领域的研究人员; 使用场景及目标:①学习和掌握RBF神经网络与滑模控制相结合的自适应控制策略设计方法;②应用于电机控制、机器人轨迹跟踪、电力电子系统等存在模型不确定性或外界扰动的实际控制系统中,提升控制精度与鲁棒性; 阅读建议:建议读者结合提供的Matlab代码进行仿真实践,深入理解算法实现细节,同时可参考文中提及的相关技术方向拓展研究思路,注重理论分析与仿真验证相结合。
评论 1
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值