共 50 条
- [1] Detecting and Analyzing Code Clones in HDL 2017 IEEE 11TH INTERNATIONAL WORKSHOP ON SOFTWARE CLONES (IWSC), 2017, : 1 - 7
- [2] BinClone: Detecting Code Clones in Malware 2014 EIGHTH INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND RELIABILITY, 2014, : 78 - 87
- [3] BinSign: Fingerprinting Binary Functions to Support Automated Analysis of Code Executables ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, SEC 2017, 2017, 502 : 341 - 355
- [4] Detecting Integer Overflow in Windows Binary Executables based on Symbolic Execution 2016 17TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD), 2016, : 385 - 390
- [5] Clone-Slicer: Detecting Domain Specific Binary Code Clones through Program Slicing FEAST'18: PROCEEDINGS OF THE 2018 WORKSHOP ON FORMING AN ECOSYSTEM AROUND SOFTWARE TRANSFORMATION, 2018, : 27 - 33
- [6] A BINARY CODE FOR DETECTING SUPERPOSITION ELECTRONICS & COMMUNICATIONS IN JAPAN, 1968, 51 (07): : 179 - &
- [7] Code Clone Graph Metrics for Detecting Diffused Code Clones APSEC 09: SIXTEENTH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE, PROCEEDINGS, 2009, : 373 - 380
- [8] Detecting Code Clones with Gaps by Function Applications PROCEEDINGS OF THE 2017 ACM SIGPLAN WORKSHOP ON PARTIAL EVALUATION AND PROGRAM MANIPULATION (PEPM'17), 2017, : 12 - 22
- [9] srcClone: Detecting Code Clones via Decompositional Slicing 2020 IEEE/ACM 28TH INTERNATIONAL CONFERENCE ON PROGRAM COMPREHENSION, ICPC, 2020, : 274 - 284
- [10] Selecting a Set of Appropriate Metrics for Detecting Code Clones 2014 SEVENTH INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING (IC3), 2014, : 484 - 488