Large-Scale and Language-Oblivious Code Authorship Identification

Large-Scale and Language-Oblivious Code Authorship Identification

Large-Scale and Language-Oblivious Code Authorship Identification Mohammed Abuhamad Inha University, Incheon, South Korea Tamer AbuHmed Inha University, Incheon, South Korea Aziz Mohaisen University of Central Florida, Orlando, USA DaeHun Nyang Inha University, Incheon, South Korea CCS '18: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security Pages 101-114. Toronto, Canada — October 15 - 19, 2018 ISBN: 978-1-4503-5693-0 doi>10.1145/3243734.3243738 link: https://dl.acm.org/citation.cfm?id=3243738 Abstract: Efficient extraction of code authorship attributes is key for successful identification. However, the extraction of such attributes is very challenging, due to various programming language specifics, the limited number of available code samples per author, and the average code lines per file, among others. To this end, this work proposes a Deep Learning-based Code Authorship Identification System (DL-CAIS) for code authorship attribution that facilitates large-scale, language-oblivious, and obfuscation-resilient code authorship identification. The deep learning architecture adopted in this work includes TF-IDF-based deep representation using multiple Recurrent Neural Network (RNN) layers and fully-connected layers dedicated to authorship attribution learning. The deep representation then feeds into a random forest classifier for scalability to de-anonymize the author. Comprehensive experiments are conducted to evaluate DL-CAIS over the entire Google Code Jam (GCJ) dataset across all years (from 2008 to 2016) and over real-world code samples from 1987 public repositories on GitHub. The results of our work show the high accuracy despite requiring a smaller number of files per author. Namely, we achieve an accuracy of 96% when experimenting with 1,600 authors for GCJ, and 94.38% for the real-world dataset for 745 C programmers. Our system also allows us to identify 8,903 authors, the largest-scale dataset used by far, with an accuracy of 92.3%. Moreover, our technique is resilient to language-specifics, and thus it can identify authors of four programming languages (e.g. C, C++, Java, and Python), and authors writing in mixed languages (e.g. Java/C++, Python/C++). Finally, our system is resistant to sophisticated obfuscation (e.g. using C Tigress) with an accuracy of 93.42% for a set of 120 authors. DL-CAIS: Deep Learning-based Code Authorship Identification System Mohammed Abuhamad Tamer AbuHmed Aziz Mohaisen DaeHun Nyang University of Central Florida Inha University University of Central Florida Inha University [email protected] [email protected] [email protected] [email protected] Abstract—Code authorship identification is useful in many Data preprocessing Deep representations for authorship attribution Classification 1 2 3 4 ℎ5 ℎ6 software forensics contexts. Successful code authorship identifi- 푥0 ℎ0 ℎ0 ℎ0 ℎ0 0 0 푦0 cation relies on efficient extraction of authorship attributes. This 1 2 3 4 ℎ5 ℎ6 work proposes DL-CAIS, a Deep Learning-based Code Author- 푥1 ℎ1 ℎ1 ℎ1 ℎ1 1 1 푦1 Code 1 2 3 4 5 6 ship Identification System, for large-scale, language-oblivious, and ℎ ℎ ℎ ℎ2 ℎ2 instances 푥 2 2 2 ℎ2 files 2 …. …. obfuscation-resilient code authorship identification. The proposed …. system includes learning TF-IDF-based deep representations of 푦푛 1 2 3 4 ℎ5 ℎ6 code authorship attributions using recurrent neural network. The 푥푛 ℎ푛 ℎ푛 ℎ푛 ℎ푛 푛 푛 deep representations are used to construct a random forest clas- RNN-1 RNN-2 RNN-3 sifier for scalable and robust de-anonymization of programmers. TF-IDF representations 3 RNN layers (LSTM-GRU) 3 Fully-connected layers RFC with 300 trees We evaluate DL-CAIS using the entire Google Code Jam (GCJ) Fig. 1: A high-level illustration of the Deep Learning-based dataset across all years (from 2008 to 2016) and using public real- Code Authorship Identification System (DL-CAIS). world code repositories from GitHub. The results show that the proposed system achieves an accuracy of 92.3% for identifying 8,903 authors for GCJ and 94.38% for the real-world dataset for 745 C programmers. Moreover, the results show that DL-CAIS is right infringement [2], and code integrity investigations [3]. resilient to language-specifics, temporal effects, and obfuscation. The problem of code author identification is challeng- ing, and faces several obstacles that prevent the develop- I. INTRODUCTION ment of practical identification mechanisms. First, program- ming “style” of programmers continuously evolves over time. Source code authorship identification is the process of code Second, the programming style of programmers varies from writer identification by associating a programmer to a given language to another. Third, while it is sometimes possible to code based on the programmer’s distinctive stylometric fea- obtain the source code of programs, sometimes it is not, and tures. Authorship identification for textual documents is a well- the source code is occasionally obfuscated by automatic tools, established field that has attracted big attention. Identifying preventing their recognition. programmers of source code can be more difficult and different from authorship identification of natural language text. This This work contributes to code authorship identification basic difficulties are driven from the inherent inflexibility of in multiple directions as follows: First, we design a feature the written code expressions established by the syntax rules learning architecture using recurrent neural network (RNN) to of compilers. Recently, a growing attention has been given enable the extraction of high quality and distinctive code au- to provide robust and scalable authorship identification for thorship attributes. The deep representations of code authorship software. Being able to identify code authors is both a risk attributes are learned by feeding code samples presented by the and a desirable feature. On the one hand, code authorship TF-IDF (Term Frequency-Inverse Document Frequency) to the identification poses a privacy risk for programmers who wish RNN architecture. Thus, our approach does not require a prior to remain anonymous, including contributors to open-source knowledge of any specific programming language. Second, projects, activists, and programmers who conduct program- we experimentally conduct a large scale code authorship ming activities on the side. On the other hand, code authorship identification and demonstrate that our technique can handle identification is useful for software forensics and security an- a large number of programmers (8,903 programmers) while alysts, especially for identifying malicious code programmers. maintaining a high accuracy (92.3%). Third, we show that Moreover, authorship identification of source code is helpful our approach is oblivious to language specifics when using a with plagiarism detection [1], authorship disputes [4], copy- dataset of authors writing in multiple languages. We based our assessment on an analysis over four individual programming languages (namely, C++, C, Java, and Python). Fourth, we Permission to freely reproduce all or part of this paper for noncommercial investigate the effect of obfuscation methods on the authorship purposes is granted provided that copies bear this notice and the full citation on the first page. Reproduction for commercial purposes is strictly prohibited identification and show that our approach is resilient to both without the prior written consent of the Internet Society, the first-named author simple off-the-shelf obfuscators, such as Stunnix, and more (for reproduction of an entire paper only), and the author’s employer if the sophisticated obfuscators, such as Tigress. Finally, we examine paper was prepared within the scope of employment. our approach on real-world datasets and achieve 95.21% and NDSS ’16, 21-24 February 2016, San Diego, CA, USA Copyright 2016 Internet Society, ISBN 1-891562-41-X 94.38% of accuracy for datasets of 142 C++ programmers and http://dx.doi.org/10.14722/ndss.2016.23xxx 745 C programmers, respectively. 100 100 100 100 LSTM-RFC LSTM-RFC LSTM-RFC LSTM-RFC 100 100 100 99 99 99 99 LSTM-RFC LSTM-RFC LSTM-RFC GRU-RFC GRU-RFC GRU-RFC GRU-RFC 99 99 98 98 98 98 GRU-RFC 99 GRU-RFC GRU-RFC 97 97 97 97 98 98 98 96 96 96 96 97 97 97 95 95 95 95 94 94 94 94 96 96 96 Accuracy (%) Accuracy Accuracy (%) Accuracy Accuracy (%) Accuracy 93 93 93 (%) Accuracy 93 95 95 95 92 92 92 92 94 94 94 91 91 91 91 Accuracy (%) Accuracy Accuracy (%) Accuracy 90 90 90 90 93 93 (%) Accuracy 93 150 450 750 1K 3K 5K 7K 9K 150 300 450 600 750 900 1K 2K 2K 150 450 750 1K 2K 3K 150 300 450 566 Number of authors (Programmers) Number of authors (Programmers) Number of authors (Programmers) Number of authors (Programmers) 92 92 92 91 91 91 90 90 90 (a) C++ (b) Java (c) Python (d) C 100 250 500 626 100 250 500 855 100 250 500 1.0K 1.5K 1.9K Fig. 2: Accuracy of authorship identification of programmers Number of authors (Programmers) Number of authors (Programmers) Number of authors (Programmers) with seven sample code files per programmer in C++. Java, (a) C/C++ (b) Java/C++ (c) Python/C++ Python, and C languages. Fig. 3: The accuracy of the authorship identification of pro- grammers with sample codes of two programming languages. 100 100 TABLE I: The accuracy of authorship identification using LSTM-RFC LSTM-RFC 99 GRU-RFC 99 GRU-RFC models trained on data from 2014 and tested on data from 98 98 97 97 2015 and 2016 96 96 95 95 # Authors LSTM-RFC GRU-RFC 94 94 Accuracy (%) Accuracy Accuracy (%) Accuracy 93 93 C++ 292 97.65 96.43 92 92 91 91 Python 44 100 100 90 90 20 50 80 100 120 20 50 80 100 120 Java 50 100 100 Number of authors (Programmers) Number of authors (Programmers) (a) C++ obfuscated (b) C code obfuscated II.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    4 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us