JSidentify-V2: Leveraging Dynamic Memory Fingerprinting for Mini-Game Plagiarism Detection

📅 2025-08-03
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
Traditional static analysis fails to detect code plagiarism in mini-game platforms due to sophisticated obfuscation techniques—such as dynamic decryption and key-dependent logic—that undermine syntactic and structural similarity. Method: This paper proposes a robust detection framework based on dynamic memory fingerprints. It employs runtime instrumentation to capture stable memory-access behaviors, integrates static pre-analysis with adaptive hot-object slicing, and constructs obfuscation-resilient memory dependency graphs as behavioral fingerprints. Plagiarism across obfuscated variants is then identified via graph similarity analysis. Contribution/Results: The proposed four-stage pipeline is evaluated on a large-scale dataset of 1,200 mini-games. It achieves accurate detection of code reuse under eight prevalent obfuscation strategies, significantly overcoming the limitations of static analysis in highly obfuscated scenarios.

Technology Category

Application Category

📝 Abstract
The explosive growth of mini-game platforms has led to widespread code plagiarism, where malicious users access popular games' source code and republish them with modifications. While existing static analysis tools can detect simple obfuscation techniques like variable renaming and dead code injection, they fail against sophisticated deep obfuscation methods such as encrypted code with local or cloud-based decryption keys that completely destroy code structure and render traditional Abstract Syntax Tree analysis ineffective. To address these challenges, we present JSidentify-V2, a novel dynamic analysis framework that detects mini-game plagiarism by capturing memory invariants during program execution. Our key insight is that while obfuscation can severely distort static code characteristics, runtime memory behavior patterns remain relatively stable. JSidentify-V2 employs a four-stage pipeline: (1) static pre-analysis and instrumentation to identify potential memory invariants, (2) adaptive hot object slicing to maximize execution coverage of critical code segments, (3) Memory Dependency Graph construction to represent behavioral fingerprints resilient to obfuscation, and (4) graph-based similarity analysis for plagiarism detection. We evaluate JSidentify-V2 against eight obfuscation methods on a comprehensive dataset of 1,200 mini-games ...
Problem

Research questions and friction points this paper is trying to address.

Detect mini-game plagiarism using dynamic memory fingerprinting
Overcome limitations of static analysis in deep obfuscation scenarios
Identify stable runtime memory patterns despite code distortion
Innovation

Methods, ideas, or system contributions that make the work stand out.

Dynamic memory fingerprinting for plagiarism detection
Memory Dependency Graph for obfuscation resilience
Graph-based similarity analysis for code comparison
Z
Zhihao Li
Tencent Inc. Shenzhen, China
Chaozheng Wang
Chaozheng Wang
The Chinese University of Hong Kong
software engineeringartificial intelligence
Zongjie Li
Zongjie Li
HKUST
Large Language Model for Code
X
Xinyong Peng
Tencent Inc. Shenzhen, China
Q
Qun Xia
Tencent Inc. Shenzhen, China
H
Haochuan Lu
Tencent Inc. Shenzhen, China
T
Ting Xiong
Tencent Inc. Shenzhen, China
Shuzheng Gao
Shuzheng Gao
The Chinese University of Hong Kong
Code IntelligenceSoftware EngineeringLarge Language Models
C
Cuiyun Gao
The Chinese University of Hong Kong Hong Kong, China
S
Shuai Wang
The Hong Kong University of Science and Technology Hong Kong, China
Y
Yuetang Deng
Tencent Inc. Shenzhen, China
H
Huafeng Ma
Tencent Inc. Shenzhen, China