Code Clone Detection on Specialized PDGs with Heuristic

被引:36
|
作者
Higo, Yoshiki [1 ]
Kusumoto, Shinji [1 ]
机构
[1] Osaka Univ, Grad Sch Informat Sci & Technol, Suita, Osaka, Japan
关键词
code clone; program dependency graph;
D O I
10.1109/CSMR.2011.12
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
PDG-based code clone detection is suitable for detecting non-contiguous code clones while other detection techniques, line-, token-, or AST-based techniques are not. However, PDG-based detection has lower performance for detecting contiguous code clones than the other techniques. Moreover, PDG-based detection is time consuming, so that application to actual software systems is not feasible. The present paper proposes PDG specializations and detection heuristics for enhancing PDG-based code clone detection. The experiment in this paper shows that the proposed methods are effective for PDG-based code clone detection by applying them to 4 open source systems.
引用
收藏
页码:75 / 84
页数:10
相关论文
共 50 条
  • [41] SHINOBI: A Tool for Automatic Code Clone Detection in the IDE
    Kawaguchi, Shinji
    Yamashina, Takanobu
    Uwano, Hidetake
    Fushida, Kyhohei
    Kamei, Yasutaka
    Nagura, Masataka
    Iida, Hajimu
    16TH WORKING CONFERENCE ON REVERSE ENGINEERING (WCRE 2009), 2009, : 313 - +
  • [42] Rearranging the Order of Program Statements for Code Clone Detection
    Sabi, Yusuke
    Higo, Yoshiki
    Kusumoto, Shinji
    2017 IEEE 11TH INTERNATIONAL WORKSHOP ON SOFTWARE CLONES (IWSC), 2017, : 15 - 21
  • [43] Clone detection in source code by frequent itemset techniques
    Wahler, V
    Seipel, D
    Von Gudenberg, JW
    Fischer, G
    FOURTH IEEE INTERNATIONAL WORKSHOP ON SOURCE CODE ANALYSIS AND MANIPULATION, PROCEEDINGS, 2004, : 128 - 135
  • [44] Type-2 Code Clone Detection for Dockerfiles
    Tsuru, Tomoaki
    Nakagawa, Tasuku
    Matsumoto, Shinsuke
    Higo, Yoshiki
    Kusumoto, Shinji
    2021 IEEE 15TH INTERNATIONAL WORKSHOP ON SOFTWARE CLONES, IWSC 2021, 2021, : 1 - 7
  • [45] Cross-Language Code Similarity and Applications in Clone Detection and Code Search
    Mathew, George Varghese
    ProQuest Dissertations and Theses Global, 2022,
  • [46] Obfuscated code is identifiable by a token-based code clone detection technique
    Akram, Junaid
    Vasan, Danish
    Luo, Ping
    INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2022, 19 (3-4) : 254 - 273
  • [47] Finding repeated strings in code repositories and its applications to code-clone detection
    Yamagata, Yoriyuki
    Herve, Fabien
    Fujiwara, Yuji
    Inoue, Katsuro
    2021 28TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC 2021), 2021, : 497 - 502
  • [48] VGRAPH: A Robust Vulnerable Code Clone Detection System Using Code Property Triplets
    Bowman, Benjamin
    Huang, H. Howie
    2020 5TH IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P 2020), 2020, : 53 - 69
  • [49] The fluency heuristic: A highly specialized tartle heuristic?
    Marewski, Julian
    Schooler, Lael
    INTERNATIONAL JOURNAL OF PSYCHOLOGY, 2008, 43 (3-4) : 198 - 198
  • [50] Fast Code Clone Detection Based on Weighted Recursive Autoencoders
    Zeng, Jie
    Ben, Kerong
    Li, Xiaowei
    Zhang, Xian
    IEEE ACCESS, 2019, 7 : 125062 - 125078