Software clone detection: A systematic review
CONTEXT: Reusing software by means of copy and paste is a frequent activity in software
development. The duplicated code is known as a software clone and the activity is known as …
development. The duplicated code is known as a software clone and the activity is known as …
A systematic literature review on source code similarity measurement and clone detection: Techniques, applications, and challenges
M Zakeri-Nasrabadi, S Parsa, M Ramezani… - Journal of Systems and …, 2023 - Elsevier
Measuring and evaluating source code similarity is a fundamental software engineering
activity that embraces a broad range of applications, including but not limited to code …
activity that embraces a broad range of applications, including but not limited to code …
Deepwukong: Statically detecting software vulnerabilities using deep graph neural network
Static bug detection has shown its effectiveness in detecting well-defined memory errors, eg,
memory leaks, buffer overflows, and null dereference. However, modern software systems …
memory leaks, buffer overflows, and null dereference. However, modern software systems …
Deep learning code fragments for code clone detection
Code clone detection is an important problem for software maintenance and evolution. Many
approaches consider either structure or identifiers, but none of the existing detection …
approaches consider either structure or identifiers, but none of the existing detection …
Deepsim: deep learning code functional similarity
G Zhao, J Huang - Proceedings of the 2018 26th ACM joint meeting on …, 2018 - dl.acm.org
Measuring code similarity is fundamental for many software engineering tasks, eg, code
search, refactoring and reuse. However, most existing techniques focus on code syntactical …
search, refactoring and reuse. However, most existing techniques focus on code syntactical …
Neural machine translation inspired binary code similarity comparison beyond function pairs
Binary code analysis allows analyzing binary code without having access to the
corresponding source code. A binary, after disassembly, is expressed in an assembly …
corresponding source code. A binary, after disassembly, is expressed in an assembly …
Comparison and evaluation of code clone detection techniques and tools: A qualitative approach
Over the last decade many techniques and tools for software clone detection have been
proposed. In this paper, we provide a qualitative comparison and evaluation of the current …
proposed. In this paper, we provide a qualitative comparison and evaluation of the current …
Achieving accuracy and scalability simultaneously in detecting application clones on android markets
Besides traditional problems such as potential bugs,(smartphone) application clones on
Android markets bring new threats. That is, attackers clone the code from legitimate Android …
Android markets bring new threats. That is, attackers clone the code from legitimate Android …
Oreo: Detection of clones in the twilight zone
Source code clones are categorized into four types of increasing difficulty of detection,
ranging from purely textual (Type-1) to purely semantic (Type-4). Most clone detectors …
ranging from purely textual (Type-1) to purely semantic (Type-4). Most clone detectors …
Bingo: Cross-architecture cross-os binary search
Binary code search has received much attention recently due to its impactful applications,
eg, plagiarism detection, malware detection and software vulnerability auditing. However …
eg, plagiarism detection, malware detection and software vulnerability auditing. However …