A Survey of Software Clone Detection From Security Perspective

被引:8
|
作者
Zhang, Haibo [1 ]
Sakurai, Kouichi [2 ]
机构
[1] Kyushu Univ, Grad Sch Informat Sci & Elect Engn, Dept Informat, Fukuoka 8190395, Japan
[2] Kyushu Univ, Fac Informat Sci & Elect Engn, Dept Informat, Fukuoka 8190395, Japan
来源
IEEE ACCESS | 2021年 / 9卷
基金
日本科学技术振兴机构;
关键词
Cloning; Software; Security; Tools; Task analysis; Maintenance engineering; Computer bugs; Code clone; security analysis; software clone; vulnerability detection; CODE CLONES; VULNERABILITIES; INTERNET; ATTACKS; SYSTEMS; NICAD;
D O I
10.1109/ACCESS.2021.3065872
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
For software engineering, if two code fragments are closely similar with minor modifications or even identical due to a copy-paste behavior, that is called software/code clone. Code clones can cause trouble in software maintenance and debugging process because identifying all copied compromised code fragments in other locations is time-consuming. Researchers have been working on code clone detection issues for a long time, and the discussion mainly focuses on software engineering management and system maintenance. Another considerable issue is that code cloning provides an easy way to attackers for malicious code injection. A thorough survey work of code clone identification/detection from the security perspective is indispensable for providing a comprehensive review of existing related works and proposing future potential research directions. This paper can satisfy above requirements. We review and introduce existing security-related works following three different classifications and various comparison criteria. We then discuss three further research directions, (i) deep learning-based code clone vulnerability detection, (ii) vulnerable code clone detection for 5G-Internet of Things devices, and (iii) real-time detection methods for more efficiently detecting clone attacks. These methods are more advanced and adaptive to technological development than current technologies, and still have enough research space for future studies.
引用
收藏
页码:48157 / 48173
页数:17
相关论文
共 50 条
  • [11] Survey of security supervision on blockchain from the perspective of technology
    Wang, Yu
    Gou, Gaopeng
    Liu, Chang
    Cui, Mingxin
    Li, Zhen
    Xiong, Gang
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 60
  • [12] Historical perspective of code clone refactorings in evolving software
    Kanwal, Jaweria
    Maqbool, Onaiza
    Basit, Hamid Abdul
    Sindhu, Muddassar Azam
    Inoue, Katsuro
    [J]. PLOS ONE, 2022, 17 (12):
  • [13] Software Clone Detection Using Clustering Approach
    Joshi, Bikash
    Budhathoki, Puskar
    Woon, Wei Lee
    Svetinovic, Davor
    [J]. NEURAL INFORMATION PROCESSING, PT II, 2015, 9490 : 520 - 527
  • [14] Hardware and Software Co-Verification from Security Perspective
    Chen, Kejun
    Deng, Qingxu
    Hou, Yumin
    Jin, Yier
    Guo, Xiaolong
    [J]. 2019 20TH INTERNATIONAL WORKSHOP ON MICROPROCESSOR/SOC TEST, SECURITY AND VERIFICATION (MTV 2019), 2019, : 50 - 55
  • [15] Clone Detection in Reuse of Software Technical Documentation
    Koznov, Dmitrij
    Luciv, Dmitry
    Basit, Hamid Abdul
    Lieh, Ouh Eng
    Smirnov, Mikhail
    [J]. PERSPECTIVES OF SYSTEM INFORMATICS, PSI 2015, 2016, 9609 : 170 - 185
  • [16] Scalable and Incremental Clone Detection for Evolving Software
    Nguyen, Tung Thanh
    Nguyen, Hoan Anh
    Al-Kofahi, Jafar M.
    Pham, Nam H.
    Nguyen, Tien N.
    [J]. 2009 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE, CONFERENCE PROCEEDINGS, 2009, : 491 - 494
  • [17] A software engineering perspective for services security
    Jun, H
    [J]. GRID AND COOPERATIVE COMPUTING GCC 2004 WORKSHOPS, PROCEEDINGS, 2004, 3252 : 366 - 373
  • [18] A Study of Software Clone Detection Techniques for Better Software Maintenance and Reliability
    Ralhan, Chavi
    Malik, Navneet
    [J]. 2021 INTERNATIONAL CONFERENCE ON COMPUTING SCIENCES (ICCS 2021), 2021, : 249 - 253
  • [19] Security in Software Defined Networks: A Survey
    Ahmad, Ijaz
    Namal, Suneth
    Ylianttila, Mika
    Gurtov, Andrei
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04): : 2317 - 2346
  • [20] Security of Software Defined Networks: A survey
    Alsmadr, Izzat
    Xu, Dianxiang
    [J]. COMPUTERS & SECURITY, 2015, 53 : 79 - 108