A Survey of Software Clone Detection From Security Perspective

被引:8
|
作者
Zhang, Haibo [1 ]
Sakurai, Kouichi [2 ]
机构
[1] Kyushu Univ, Grad Sch Informat Sci & Elect Engn, Dept Informat, Fukuoka 8190395, Japan
[2] Kyushu Univ, Fac Informat Sci & Elect Engn, Dept Informat, Fukuoka 8190395, Japan
来源
IEEE ACCESS | 2021年 / 9卷
基金
日本科学技术振兴机构;
关键词
Cloning; Software; Security; Tools; Task analysis; Maintenance engineering; Computer bugs; Code clone; security analysis; software clone; vulnerability detection; CODE CLONES; VULNERABILITIES; INTERNET; ATTACKS; SYSTEMS; NICAD;
D O I
10.1109/ACCESS.2021.3065872
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
For software engineering, if two code fragments are closely similar with minor modifications or even identical due to a copy-paste behavior, that is called software/code clone. Code clones can cause trouble in software maintenance and debugging process because identifying all copied compromised code fragments in other locations is time-consuming. Researchers have been working on code clone detection issues for a long time, and the discussion mainly focuses on software engineering management and system maintenance. Another considerable issue is that code cloning provides an easy way to attackers for malicious code injection. A thorough survey work of code clone identification/detection from the security perspective is indispensable for providing a comprehensive review of existing related works and proposing future potential research directions. This paper can satisfy above requirements. We review and introduce existing security-related works following three different classifications and various comparison criteria. We then discuss three further research directions, (i) deep learning-based code clone vulnerability detection, (ii) vulnerable code clone detection for 5G-Internet of Things devices, and (iii) real-time detection methods for more efficiently detecting clone attacks. These methods are more advanced and adaptive to technological development than current technologies, and still have enough research space for future studies.
引用
收藏
页码:48157 / 48173
页数:17
相关论文
共 50 条
  • [21] A Survey of Security in Software Defined Networks
    Scott-Hayward, Sandra
    Natarajan, Sriram
    Sezer, Sakir
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (01): : 623 - 654
  • [22] Security of Neural Networks from Hardware Perspective: A Survey and Beyond
    Xu, Qian
    Arafin, Md Tanvir
    Qu, Gang
    [J]. 2021 26TH ASIA AND SOUTH PACIFIC DESIGN AUTOMATION CONFERENCE (ASP-DAC), 2021, : 449 - 454
  • [23] Security of Neural Networks from Hardware Perspective: A Survey and beyond
    Xu, Qian
    Arafin, Md Tanvir
    Qu, Gang
    [J]. Proceedings of the Asia and South Pacific Design Automation Conference, ASP-DAC, 2021, : 449 - 454
  • [24] Using Clone Detection to Identify Bugs in Concurrent Software
    Jalbert, Kevin
    Bradbury, Jeremy S.
    [J]. 2010 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE, 2010,
  • [25] Reconstruction of successful software evolution using clone detection
    Van Rysselberghe, F
    Demeyer, S
    [J]. SIXTH INTERNATIONAL WORKSHOP ON PRINCIPLES OF SOFTWARE EVOLUTION, PROCEEDINGS, 2003, : 126 - 130
  • [26] ClemanX: Incremental Clone Detection Tool for Evolving Software
    Nguyen, Tung Thanh
    Nguyen, Hoan Anh
    Pham, Nam H.
    Al-Kofahi, Jafar M.
    Nguyen, Tien N.
    [J]. 2009 31ST INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, COMPANION VOLUME, 2009, : 437 - 438
  • [27] Semantic Clone Detection via Probabilistic Software Modeling
    Thaller, Hannes
    Linsbauer, Lukas
    Egyed, Alexander
    [J]. FUNDAMENTAL APPROACHES TO SOFTWARE ENGINEERING, FASE 2022, 2022, 13241 : 288 - 309
  • [28] Hardware/software security co-verification and vulnerability detection: An information flow perspective
    Qin, Maoyuan
    Zhu, Jiacheng
    Mao, Baolei
    Hu, Wei
    [J]. Integration, 2024, 94
  • [29] SOFTWARE PIRACY AND SOFTWARE SECURITY IN BUSINESS SCHOOLS - AN ETHICAL PERSPECTIVE
    IM, JH
    VANEPPS, PD
    [J]. DATA BASE, 1991, 22 (03): : 15 - 21
  • [30] Hardware/software security co-verification and vulnerability detection: An information flow perspective
    Qin, Maoyuan
    Zhu, Jiacheng
    Mao, Baolei
    Hu, Wei
    [J]. INTEGRATION-THE VLSI JOURNAL, 2024, 94