ABSTRACT
In online programming classes, it is tricky to uphold academic honesty in the assessment process. A common approach, plagiarism detection, is not accurate for novice programmers and ineffective for detecting contract cheaters. We present a new approach, cheating detection with keystroke dynamics in programming classes, and evaluated the approach.
Supplemental Material
- Steven Burrows and Seyed MM Tahaghoghi. 2007. Source code authorship attribution using n-grams. In Proceedings of the Twelth Australasian Document Computing Symposium, Melbourne, Australia, RMIT University. Citeseer, 32--39.Google Scholar
- Aylin Caliskan-Islam, Richard Harang, Andrew Liu, Arvind Narayanan, Clare Voss, Fabian Yamaguchi, and Rachel Greenstadt. 2015. De-anonymizing programmers via code stylometry. In 24th USENIX Security Symposium (USENIX Security), Washington, DC.Google ScholarDigital Library
- Daniele Gunetti and Claudia Picardi. 2005. Keystroke analysis of free text. ACM Transactions on Information and System Security (TISSEC) 8, 3 (2005), 312--347.Google ScholarDigital Library
- Lingxiao Jiang, Ghassan Misherghi, Zhendong Su, and Stephane Glondu. 2007. Deckard: Scalable and accurate tree-based detection of code clones. In Proceedings of the 29th international conference on Software Engineering. IEEE Computer Society, 96--105.Google ScholarDigital Library
- Marcus Karnan, Muthuramalingam Akila, and Nishara Krishnaraj. 2011. Biometric personal authentication using keystroke dynamics: A review. Applied soft computing 11, 2 (2011), 1565--1573.Google Scholar
- Donald L McCabe. 2005. Cheating among college and university students: A North American perspective. International Journal for Educational Integrity 1, 1 (2005).Google ScholarCross Ref
- Merylin Monaro, Chiara Galante, Riccardo Spolaor, Qian Qian Li, Luciano Gamberini, Mauro Conti, and Giuseppe Sartori. 2018. Covert lie detection using keyboard dynamics. Scientific reports 8, 1 (2018), 1976.Google Scholar
- Terence Sim and Rajkumar Janakiraman. 2007. Are digraphs good for free-text keystroke dynamics?. In Computer Vision and Pattern Recognition, 2007. CVPR'07. IEEE Conference on. IEEE, 1--6.Google ScholarCross Ref
Index Terms
- Detecting Contract Cheaters in Online Programming Classes with Keystroke Dynamics
Recommendations
Unconstrained keystroke dynamics authentication with shared secret
Among all the existing biometric modalities, authentication systems based on keystroke dynamics present interesting advantages. These solutions are well accepted by users and cheap as no additional sensor is required for authenticating the user before ...
Keystroke dynamics-based user authentication service for cloud computing
User authentication is a crucial requirement for cloud service providers to prove that the outsourced data and services are safe from imposters. Keystroke dynamics is a promising behavioral biometrics for strengthening user authentication, however, ...
User authentication method based on keystroke dynamics and mouse dynamics using HDA
AbstractBiometric authentication has advantages over traditional authentication based on passwords or pin number (PIN) in that it is based on the user's inherent characteristics which is not easily stolen or lost. Keystroke dynamics and mouse dynamics are ...
Comments