[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1109/ICPC.2008.41guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

NICAD: Accurate Detection of Near-Miss Intentional Clones Using Flexible Pretty-Printing and Code Normalization

Published: 10 June 2008 Publication History

Abstract

This paper examines the effectiveness of a new language-specific parser-based but lightweight clone detection approach. Exploiting a novel application of a source transformation system, the method accurately finds near-miss clones using an efficient text line comparison technique. The transformation system assists the methodin three ways. First, using agile parsing it provides user-specified flexible pretty-printing to remove noise, standardize formatting and break program statements into parts such that potential changes can be detected as simple linewise text differences. Second, it provides efficient flexible extraction of potential clones to be compared using island grammars and agile parsing to select granularities and enumerate potential clones. Third, using transformation rules it provides flexible code normalization to allow for local editing differences between similar code segments and filtering out of uninteresting parts of potential clones. In this paper we introduce the theory and practice of the framework and demonstrate its use in finding function clones in C code. Early experiments indicate that the method is capable of finding near-miss clones with high precision and recall, and with reasonable performance.

Cited By

View all
  • (2024)Foliage: Nourishing Evolving Software by Characterizing and Clustering Field BugsProceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis10.1145/3650212.3680363(1325-1337)Online publication date: 11-Sep-2024
  • (2024)Detecting Automatic Software Plagiarism via Token Sequence NormalizationProceedings of the IEEE/ACM 46th International Conference on Software Engineering10.1145/3597503.3639192(1-13)Online publication date: 20-May-2024
  • (2023)V1SCANProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620603(6541-6556)Online publication date: 9-Aug-2023
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
ICPC '08: Proceedings of the 2008 The 16th IEEE International Conference on Program Comprehension
June 2008
280 pages
ISBN:9780769531762

Publisher

IEEE Computer Society

United States

Publication History

Published: 10 June 2008

Author Tags

  1. Clone Detection
  2. Flexible Code Filtering
  3. Flexible Code Normalization
  4. Flexible Pretty-Printing
  5. Near-Miss Intentional Clones

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 16 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Foliage: Nourishing Evolving Software by Characterizing and Clustering Field BugsProceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis10.1145/3650212.3680363(1325-1337)Online publication date: 11-Sep-2024
  • (2024)Detecting Automatic Software Plagiarism via Token Sequence NormalizationProceedings of the IEEE/ACM 46th International Conference on Software Engineering10.1145/3597503.3639192(1-13)Online publication date: 20-May-2024
  • (2023)V1SCANProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620603(6541-6556)Online publication date: 9-Aug-2023
  • (2023)Gitor: Scalable Code Clone Detection by Building Global Sample GraphProceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering10.1145/3611643.3616371(784-795)Online publication date: 30-Nov-2023
  • (2023)C³: Code Clone-Based Identification of Duplicated ComponentsProceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering10.1145/3611643.3613883(1832-1843)Online publication date: 30-Nov-2023
  • (2023)Exploring the Impact of Code Clones on Deep Learning SoftwareACM Transactions on Software Engineering and Methodology10.1145/360718132:6(1-34)Online publication date: 3-Jul-2023
  • (2023)An Accurate Identifier Renaming Prediction and Suggestion ApproachACM Transactions on Software Engineering and Methodology10.1145/360310932:6(1-51)Online publication date: 29-Sep-2023
  • (2023)A systematic literature review on source code similarity measurement and clone detectionJournal of Systems and Software10.1016/j.jss.2023.111796204:COnline publication date: 20-Sep-2023
  • (2023)HGIVulInformation and Software Technology10.1016/j.infsof.2023.107219160:COnline publication date: 1-Aug-2023
  • (2022)Predicting Buggy Code Clones through Machine LearningProceedings of the 32nd Annual International Conference on Computer Science and Software Engineering10.5555/3566055.3566070(130-139)Online publication date: 15-Nov-2022
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media