Software forensics: extending authorship analysis techniques to computer programs
aut.researcher | MacDonell, Stephen Gerard | |
dc.contributor.author | MacDonell, SG | |
dc.contributor.author | Buckingham, D | |
dc.contributor.author | Gray, AR | |
dc.contributor.author | Sallis Philip, J | |
dc.date.accessioned | 2011-11-28T07:17:32Z | |
dc.date.available | 2011-11-28T07:17:32Z | |
dc.date.copyright | 2002 | |
dc.date.issued | 2002 | |
dc.description.abstract | Software forensics is the analysis of the syntactic, structural and semantic form of software in order to identify, characterise and discriminate between the authors of software products for some legal purpose. Determining software authorship may be important in several contexts: civil litigation involving allegations of software theft or plagiarism or apportioning liability for software failure; criminal litigation in relation to computer fraud or software attacks on computer systems using viruses and other similar means. Our focus is on forensic analysis of software source code, the structured English-like implementation of the algorithm selected to undertake the task at hand. We use a fictionalised version of a recent case to illustrate the potential of software forensics to provide evidence and also review in detail the judicial reception of such material. | |
dc.identifier.citation | Journal of Law and Information Science, vol.13(1), pp.34-69 - 34-69 | |
dc.identifier.issn | 0729-1485 | |
dc.identifier.uri | https://hdl.handle.net/10292/2836 | |
dc.publisher | University of Tazmania | |
dc.relation.uri | http://www.jlisjournal.org/BackEds/vol13_1.html#MacDonell | |
dc.rights | Copyright © the Author 2002. All rights reserved. Authors retain the right to place his/her publication version of the work on a personal website or institutional repository. The work was first published in (please see citation) and an electronic version of this article can be found online at: (Please see Publisher’s Version) | |
dc.rights.accessrights | OpenAccess | |
dc.subject | Computer security | |
dc.subject | Forensic sciences | |
dc.subject | Computer software | |
dc.subject | Evaluation | |
dc.title | Software forensics: extending authorship analysis techniques to computer programs | |
dc.type | Journal Article | |
pubs.organisational-data | /AUT | |
pubs.organisational-data | /AUT/Design & Creative Technologies | |
pubs.organisational-data | /AUT/Design & Creative Technologies/School of Computing & Mathematical Science | |
pubs.organisational-data | /AUT/PBRF Researchers | |
pubs.organisational-data | /AUT/PBRF Researchers/Design & Creative Technologies PBRF Researchers | |
pubs.organisational-data | /AUT/PBRF Researchers/Design & Creative Technologies PBRF Researchers/DCT C & M Computing | |
pubs.organisational-data | /AUT/PBRF Researchers/Other Directorates | |
pubs.organisational-data | /AUT/PBRF Researchers/Other Directorates/VC Office | |
pubs.organisational-data | /AUT/Vice Chancellor's Group |