A Survey of Software Clone Detection From Security Perspective

被引:8
|
作者
Zhang, Haibo [1 ]
Sakurai, Kouichi [2 ]
机构
[1] Kyushu Univ, Grad Sch Informat Sci & Elect Engn, Dept Informat, Fukuoka 8190395, Japan
[2] Kyushu Univ, Fac Informat Sci & Elect Engn, Dept Informat, Fukuoka 8190395, Japan
来源
IEEE ACCESS | 2021年 / 9卷
基金
日本科学技术振兴机构;
关键词
Cloning; Software; Security; Tools; Task analysis; Maintenance engineering; Computer bugs; Code clone; security analysis; software clone; vulnerability detection; CODE CLONES; VULNERABILITIES; INTERNET; ATTACKS; SYSTEMS; NICAD;
D O I
10.1109/ACCESS.2021.3065872
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
For software engineering, if two code fragments are closely similar with minor modifications or even identical due to a copy-paste behavior, that is called software/code clone. Code clones can cause trouble in software maintenance and debugging process because identifying all copied compromised code fragments in other locations is time-consuming. Researchers have been working on code clone detection issues for a long time, and the discussion mainly focuses on software engineering management and system maintenance. Another considerable issue is that code cloning provides an easy way to attackers for malicious code injection. A thorough survey work of code clone identification/detection from the security perspective is indispensable for providing a comprehensive review of existing related works and proposing future potential research directions. This paper can satisfy above requirements. We review and introduce existing security-related works following three different classifications and various comparison criteria. We then discuss three further research directions, (i) deep learning-based code clone vulnerability detection, (ii) vulnerable code clone detection for 5G-Internet of Things devices, and (iii) real-time detection methods for more efficiently detecting clone attacks. These methods are more advanced and adaptive to technological development than current technologies, and still have enough research space for future studies.
引用
收藏
页码:48157 / 48173
页数:17
相关论文
共 50 条
  • [1] Survey on Software Clone Detection Research
    Min, Hou
    Ping, Zhang Li
    [J]. PROCEEDINGS OF THE 2019 3RD INTERNATIONAL CONFERENCE ON MANAGEMENT ENGINEERING, SOFTWARE ENGINEERING AND SERVICE SCIENCES (ICMSS 2019), 2019, : 9 - 16
  • [2] A survey of blockchain from security perspective
    Dipankar Dasgupta
    John M. Shrein
    Kishor Datta Gupta
    [J]. Journal of Banking and Financial Technology, 2019, 3 (1): : 1 - 17
  • [3] On the Structural Code Clone Detection Problem: A Survey and Software Metric Based Approach
    Kapdan, Mustafa
    Aktas, Mehmet
    Yigit, Melike
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2014, PT V, 2014, 8583 : 492 - +
  • [4] Evaluating clone detection techniques from a refactoring perspective
    Van Rysselberghe, F
    Demeyer, S
    [J]. 19TH INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING, PROCEEDINGS, 2004, : 336 - 339
  • [5] A survey on software-defined vehicular networks (SDVNs): a security perspective
    Kumar, Rohit
    Agrawal, Neha
    [J]. JOURNAL OF SUPERCOMPUTING, 2023, 79 (08): : 8368 - 8400
  • [6] A survey on software-defined vehicular networks (SDVNs): a security perspective
    Rohit Kumar
    Neha Agrawal
    [J]. The Journal of Supercomputing, 2023, 79 : 8368 - 8400
  • [7] Software clone detection: A systematic review
    Rattan, Dhavleesh
    Bhatia, Rajesh
    Singh, Maninder
    [J]. INFORMATION AND SOFTWARE TECHNOLOGY, 2013, 55 (07) : 1165 - 1199
  • [8] Maintaining software with a security perspective
    Jiwnani, K
    Zelkowitz, M
    [J]. INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE, PROCEEDINGS, 2002, : 194 - 203
  • [9] A survey and classification of the security anomaly detection mechanisms in software defined networks
    Jafarian, Tohid
    Masdari, Mohammad
    Ghaffari, Ali
    Majidzadeh, Kambiz
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2021, 24 (02): : 1235 - 1253
  • [10] A survey and classification of the security anomaly detection mechanisms in software defined networks
    Tohid Jafarian
    Mohammad Masdari
    Ali Ghaffari
    Kambiz Majidzadeh
    [J]. Cluster Computing, 2021, 24 : 1235 - 1253