Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleOctober 2024
Code Clone Configuration as a Multi-Objective Search Problem
ESEM '24: Proceedings of the 18th ACM/IEEE International Symposium on Empirical Software Engineering and MeasurementPages 503–509https://doi.org/10.1145/3674805.3690757Clone detection is an automated process for finding duplicated code within a project’s code base or between online sources. Nowadays, the code cloning community advocates that developers must be aware of the clones they may have in their code bases. In ...
- research-articleNovember 2023
Gitor: Scalable Code Clone Detection by Building Global Sample Graph
ESEC/FSE 2023: Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software EngineeringPages 784–795https://doi.org/10.1145/3611643.3616371Code clone detection is about finding out similar code fragments, which has drawn much attention in software engineering since it is important for software maintenance and evolution. Researchers have proposed many techniques and tools for source code ...
- research-articleJuly 2023
Fine-Grained Code Clone Detection with Block-Based Splitting of Abstract Syntax Tree
ISSTA 2023: Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and AnalysisPages 89–100https://doi.org/10.1145/3597926.3598040Code clone detection aims to find similar code fragments and gains increasing importance in the field of software engineering. There are several types of techniques for detecting code clones. Text-based or token-based code clone detectors are scalable ...
- research-articleAugust 2021
NIL: large-scale detection of large-variance clones
ESEC/FSE 2021: Proceedings of the 29th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software EngineeringPages 830–841https://doi.org/10.1145/3468264.3468564A code clone (in short, clone) is a code fragment that is identical or similar to other code fragments in source code. Clones generated by a large number of changes to copy-and-pasted code fragments are called large-variance (modifications are scattered)...
- research-articleMay 2019
An Exploratory Study on Detection of Cloned Code in Information Systems
SBSI '19: Proceedings of the XV Brazilian Symposium on Information SystemsArticle No.: 67, Pages 1–8https://doi.org/10.1145/3330204.3330277Code clones are source code parts that are identical or have some degree of similarity to another part of the code. Cloning arises for a variety of reasons, including copy and paste and the reuse of ad-hoc code by programmers. Detection of information ...
-
- research-articleJanuary 2019
Survey on Software Clone Detection Research
ICMSS 2019: Proceedings of the 2019 3rd International Conference on Management Engineering, Software Engineering and Service SciencesPages 9–16https://doi.org/10.1145/3312662.3312707In order to improve the efficiency of software development, developers often copy-paste code. It is found that the clone code may affect the quality of the software system, especially the maintenance and comprehension of the software, so it is necessary ...
- research-articleDecember 2018
Effective Clone Detection Model Based on Compressed Sensing in Clustered WSNs
CSAI '18: Proceedings of the 2018 2nd International Conference on Computer Science and Artificial IntelligencePages 468–473https://doi.org/10.1145/3297156.3297226Wireless sensor networks deployed in open environments are vulnerable to clone attacks. For this clone attack, a clone detection method based on compressed sensing in a cluster network is proposed. It combines the local and global detection of nodes. ...
- research-articleFebruary 2024
Code Clones: Detection and Management
Procedia Computer Science (PROCS), Volume 132, Issue CPages 718–727https://doi.org/10.1016/j.procs.2018.05.080AbstractIn a software system, similar or identical fragments of code are known as code clones. Instead of implementing a new code from scratch, most of the developers prefer copy–paste programming in which they use existing code fragments. So, the primary ...
DéjàVu: a map of code duplicates on GitHub
Proceedings of the ACM on Programming Languages (PACMPL), Volume 1, Issue OOPSLAArticle No.: 84, Pages 1–28https://doi.org/10.1145/3133908Previous studies have shown that there is a non-trivial amount of duplication in source code. This paper analyzes a corpus of 4.5 million non-fork projects hosted on GitHub representing over 428 million files written in Java, C++, Python, and ...
- research-articleJuly 2016
Semantic modelling of Android malware for effective malware comprehension, detection, and classification
ISSTA 2016: Proceedings of the 25th International Symposium on Software Testing and AnalysisPages 306–317https://doi.org/10.1145/2931037.2931043Malware has posed a major threat to the Android ecosystem. Existing malware detection tools mainly rely on signature- or feature- based approaches, failing to provide detailed information beyond the mere detection. In this work, we propose a precise ...
- research-articleNovember 2014
How should we measure functional sameness from program source code? an exploratory study on Java methods
FSE 2014: Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software EngineeringPages 294–305https://doi.org/10.1145/2635868.2635886Program source code is one of the main targets of software engineering research. A wide variety of research has been conducted on source code, and many studies have leveraged structural, vocabulary, and method signature similarities to measure the ...
- ArticleOctober 2014
Toward Fast and Deterministic Clone Detection for Large Anonymous RFID Systems
MASS '14: Proceedings of the 2014 IEEE 11th International Conference on Mobile Ad Hoc and Sensor SystemsPages 416–424https://doi.org/10.1109/MASS.2014.12Cloning attacks seriously impede the security of Radio-Frequency Identification (RFID) applications. In this paper, we tackle deterministic clone detection for anonymous RFID systems without tag identifiers (IDs) as a priori. Existing clone detection ...
- ArticleSeptember 2014
Model Clone Detector Evaluation Using Mutation Analysis
ICSME '14: Proceedings of the 2014 IEEE International Conference on Software Maintenance and EvolutionPages 633–638https://doi.org/10.1109/ICSME.2014.113Model Clone Detection is a growing area within the field of software model maintenance. New model clone detection techniques and tools for different types of models are being created, however, there is no clear way of objectively and quantitatively ...
- ArticleMay 2014
Incremental origin analysis of source code files
MSR 2014: Proceedings of the 11th Working Conference on Mining Software RepositoriesPages 42–51https://doi.org/10.1145/2597073.2597111The history of software systems tracked by version control systems is often incomplete because many file movements are not recorded. However, static code analyses that mine the file history, such as change frequency or code churn, produce precise ...
- research-articleAugust 2013
Searching for better configurations: a rigorous approach to clone evaluation
ESEC/FSE 2013: Proceedings of the 2013 9th Joint Meeting on Foundations of Software EngineeringPages 455–465https://doi.org/10.1145/2491411.2491420Clone detection finds application in many software engineering activities such as comprehension and refactoring. However, the confounding configuration choice problem poses a widely-acknowledged threat to the validity of previous empirical analyses. We ...
- ArticleOctober 2010
From Whence It Came: Detecting Source Code Clones by Analyzing Assembler
WCRE '10: Proceedings of the 2010 17th Working Conference on Reverse EngineeringPages 242–246https://doi.org/10.1109/WCRE.2010.35To date, most clone detection techniques have concentrated on various forms of source code analysis, often by analyzing token streams. In this paper, we introduce a complementary technique of analyzing generated assembler for clones. This approach is ...
- ArticleMarch 2010
Detection of Type-1 and Type-2 Code Clones Using Textual Analysis and Metrics
ITC '10: Proceedings of the 2010 International Conference on Recent Trends in Information, Telecommunication and ComputingPages 241–243https://doi.org/10.1109/ITC.2010.55Clone Detection has considerably evolved over the last decade, leading to approaches with better results but with increasing complexity. Most of the existing approaches are limited to finding program fragments similar in their syntax or semantics, while ...
- articleJuly 2009
Clone Detection in Sensor Networks with Ad Hoc and Grid Topologies
International Journal of Distributed Sensor Networks (IJDSN-H), Volume 5, Issue 3Pages 209–223https://doi.org/10.1080/15501320701863460In cloning attacks, an adversary captures a sensor node, reprograms it, makes multiple copies, and inserts these copies, into the network. Cloned nodes subvert sensor network processing from within. In a companion paper [2], we show how to detect and ...
- ArticleJune 2008
NICAD: Accurate Detection of Near-Miss Intentional Clones Using Flexible Pretty-Printing and Code Normalization
ICPC '08: Proceedings of the 2008 The 16th IEEE International Conference on Program ComprehensionPages 172–181https://doi.org/10.1109/ICPC.2008.41This paper examines the effectiveness of a new language-specific parser-based but lightweight clone detection approach. Exploiting a novel application of a source transformation system, the method accurately finds near-miss clones using an efficient ...
- ArticleMay 2008
Multidimensional Correlation of Software Source Code
SADFE '08: Proceedings of the 2008 Third International Workshop on Systematic Approaches to Digital Forensic EngineeringPages 144–156https://doi.org/10.1109/SADFE.2008.9Standard ways of calculating the similarity of different computer programs are needed in computer science. Such measurements can be useful in many different areas such as clone detection, refactoring, compiler optimization, and run-time optimization. ...