[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1808901.1808913acmconferencesArticle/Chapter ViewAbstractPublication PagesicseConference Proceedingsconference-collections
research-article

Clone detection by exploiting assembler

Published: 08 May 2010 Publication History

Abstract

In this position paper, we describe work-in-progress in detecting source code clones by means of analyzing and comparing the assembler that is produced when the source code is compiled.

References

[1]
Baker, B. S. and Manber, U. Deducing similarities in Java source from bytecodes. Proc. USENIX Annual Technical Conference. New Orleans, Louisiana, June 15--19, 1998.
[2]
De Sutter, B., De Bus B., De Bosschere, K. Link Time Binary Rewriting Techniques for Program Compaction. ACM Transactions on Programming Languages and Systems, 27(5) September 2005
[3]
Kapser, C. J and Godfrey, M. W. Supporting the Analysis of Clones in Software Systems: A Case Study. Journal of Software Maintenance and Evolution: Research and Practice. 18(2), March 2006.
[4]
Norman, M. Clone Detection applied to Java Bytecode. http://www.wcs.carleton.ca/~deugo/comp5900/papers/MNcomp5900Paper.pdf 10 December 2008
[5]
SWAG: Software Architecture Group. CLICS clone detection tool. http://www.swag.uwaterloo.ca/clics
[6]
SWAG: Software Architecture Group. JCD Java Clone Detector. http://www.swag.uwaterloo.ca/jcd
[7]
SWAG: Software Architecture Group. ACD C, C++, Assembler Clone Detector. http://www.swag.uwaterloo.ca/acd
[8]
Syntskyy, N., Holt, R. C., Davis, I. J. Browsing Software Architecture with LSEdit. Proc. of Intl. Workshop on Program Comprehension. 15 May 2005.

Cited By

View all
  • (2014)The vision of software clone management: Past, present, and future (Keynote paper)2014 Software Evolution Week - IEEE Conference on Software Maintenance, Reengineering, and Reverse Engineering (CSMR-WCRE)10.1109/CSMR-WCRE.2014.6747168(18-33)Online publication date: Mar-2014
  • (2014)CD-FormScience of Computer Programming10.1016/j.scico.2013.11.02295:P4(390-405)Online publication date: 1-Dec-2014
  • (2013)The limits of clone model standardizationProceedings of the 7th International Workshop on Software Clones10.5555/2662708.2662711(10-11)Online publication date: 19-May-2013
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
IWSC '10: Proceedings of the 4th International Workshop on Software Clones
May 2010
105 pages
ISBN:9781605589800
DOI:10.1145/1808901
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 08 May 2010

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. C
  2. C++
  3. Java
  4. assembler
  5. clone detection
  6. software

Qualifiers

  • Research-article

Conference

ICSE '10
Sponsor:

Upcoming Conference

ICSE 2025

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 27 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2014)The vision of software clone management: Past, present, and future (Keynote paper)2014 Software Evolution Week - IEEE Conference on Software Maintenance, Reengineering, and Reverse Engineering (CSMR-WCRE)10.1109/CSMR-WCRE.2014.6747168(18-33)Online publication date: Mar-2014
  • (2014)CD-FormScience of Computer Programming10.1016/j.scico.2013.11.02295:P4(390-405)Online publication date: 1-Dec-2014
  • (2013)The limits of clone model standardizationProceedings of the 7th International Workshop on Software Clones10.5555/2662708.2662711(10-11)Online publication date: 19-May-2013
  • (2013)The limits of clone model standardization2013 7th International Workshop on Software Clones (IWSC)10.1109/IWSC.2013.6613034(10-11)Online publication date: May-2013
  • (2012)A novel approach based on formal methods for clone detectionProceedings of the 6th International Workshop on Software Clones10.5555/2664398.2664400(8-14)Online publication date: 4-Jun-2012
  • (2012)A novel approach based on formal methods for clone detection2012 6th International Workshop on Software Clones (IWSC)10.1109/IWSC.2012.6227879(8-14)Online publication date: Jul-2012
  • (2011)Clone detection through process algebras and Java bytecodeProceedings of the 5th International Workshop on Software Clones10.1145/1985404.1985422(73-74)Online publication date: 23-May-2011
  • (2011)Scalable clone detection using description logicProceedings of the 5th International Workshop on Software Clones10.1145/1985404.1985413(47-53)Online publication date: 23-May-2011
  • (2011)Reasoning about Global ClonesProceedings of the 2011 IEEE 35th Annual Computer Software and Applications Conference10.1109/COMPSAC.2011.69(486-491)Online publication date: 18-Jul-2011
  • (2010)Fourth International Workshop on Software Clones (IWSC)Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering - Volume 210.1145/1810295.1810431(465-466)Online publication date: 1-May-2010
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media