Software clone detection: A systematic review

D Rattan, R Bhatia, M Singh - Information and Software Technology, 2013 - Elsevier
CONTEXT: Reusing software by means of copy and paste is a frequent activity in software
development. The duplicated code is known as a software clone and the activity is known as …

A systematic literature review on source code similarity measurement and clone detection: Techniques, applications, and challenges

M Zakeri-Nasrabadi, S Parsa, M Ramezani… - Journal of Systems and …, 2023 - Elsevier
Measuring and evaluating source code similarity is a fundamental software engineering
activity that embraces a broad range of applications, including but not limited to code …

Deepwukong: Statically detecting software vulnerabilities using deep graph neural network

X Cheng, H Wang, J Hua, G Xu, Y Sui - ACM Transactions on Software …, 2021 - dl.acm.org
Static bug detection has shown its effectiveness in detecting well-defined memory errors, eg,
memory leaks, buffer overflows, and null dereference. However, modern software systems …

Deep learning code fragments for code clone detection

M White, M Tufano, C Vendome… - Proceedings of the 31st …, 2016 - dl.acm.org
Code clone detection is an important problem for software maintenance and evolution. Many
approaches consider either structure or identifiers, but none of the existing detection …

Deepsim: deep learning code functional similarity

G Zhao, J Huang - Proceedings of the 2018 26th ACM joint meeting on …, 2018 - dl.acm.org
Measuring code similarity is fundamental for many software engineering tasks, eg, code
search, refactoring and reuse. However, most existing techniques focus on code syntactical …

Neural machine translation inspired binary code similarity comparison beyond function pairs

F Zuo, X Li, P Young, L Luo, Q Zeng… - arXiv preprint arXiv …, 2018 - arxiv.org
Binary code analysis allows analyzing binary code without having access to the
corresponding source code. A binary, after disassembly, is expressed in an assembly …

Comparison and evaluation of code clone detection techniques and tools: A qualitative approach

CK Roy, JR Cordy, R Koschke - Science of computer programming, 2009 - Elsevier
Over the last decade many techniques and tools for software clone detection have been
proposed. In this paper, we provide a qualitative comparison and evaluation of the current …

Achieving accuracy and scalability simultaneously in detecting application clones on android markets

K Chen, P Liu, Y Zhang - … of the 36th International Conference on …, 2014 - dl.acm.org
Besides traditional problems such as potential bugs,(smartphone) application clones on
Android markets bring new threats. That is, attackers clone the code from legitimate Android …

Oreo: Detection of clones in the twilight zone

V Saini, F Farmahinifarahani, Y Lu, P Baldi… - Proceedings of the …, 2018 - dl.acm.org
Source code clones are categorized into four types of increasing difficulty of detection,
ranging from purely textual (Type-1) to purely semantic (Type-4). Most clone detectors …

Bingo: Cross-architecture cross-os binary search

M Chandramohan, Y Xue, Z Xu, Y Liu, CY Cho… - Proceedings of the …, 2016 - dl.acm.org
Binary code search has received much attention recently due to its impactful applications,
eg, plagiarism detection, malware detection and software vulnerability auditing. However …