Computer Science ›› 2017, Vol. 44 ›› Issue (4): 12-15.doi: 10.11896/j.issn.1002-137X.2017.04.003

Previous Articles     Next Articles

Efficient Clone Detection Technique for Functionally Similar Programs

DONG Jia-xing and XU Chang   

  • Online:2018-11-13 Published:2018-11-13

Abstract: Clone detection techniques are widely used for but not limited to maliciously modified software detection,code recognition and reconstruction,etc.However,it is difficult to precisely detect code clones in functionally similar programs since they have their own unique features.Existing clone detection techniques have high false positive rates when applied to functionally similar programs.In this paper,we proposed a novel clone detection approach.After analyzing the features of functionally similar programs,we improved the clone detection technique’s performance.The experimental results show that our technique can effectively control the false positive rate when conducting the clone detection.

Key words: Program analysis,Clone detection,Technique transplantation

[1] ROY C K,CORDY J R,KOSCHKE R.Comparison and evaluation of code clone detection techniques and tools:A qualitative approach[J].Science of Computer Programming,2009,74(7):470-495.
[2] GU T X,CAO C,XU C,et al.Low-disruptive dynamic updating of Java applications[J].Information and Software Technology,2014,56(9):1086-1098.
[3] CHEN K,LIU P,ZHANG Y J.Achieving accuracy and scala-bility simultaneously in detecting application clones on Android markets[C]∥Proceedings of the 36th International Conference on Software Engineering.2014:175-186.
[4] KAMIYA T,KUSUMOTO S,INOUE K.CCFinder:a multilinguistic token-based code clone detection system for large scale source code[J].IEEE Transactions on Software Engineering,2002,28(7):654-670.
[5] LI Z M,LU S,MYAGMAR S,ZHOU Y Y.CP-Miner:finding copy-paste and related bugs in large-scale software code[J].IEEE Transactions on Software Engineering,2006,32(3):176-192.
[6] HITESH S,VAIBHAV S,CRISTINA L.A parallel and effi-cient approach to large scale clone detection[J].Journal of Software:Evolution and Process,2015,27(6):402-429.
[7] JIANG L X,MISHERGHI G,SU Z D,et al.DECKARD:Scalable and accurate tree-based detection of code clones[C]∥Proceedings of the 29th International Conference on Software Engineering.2007:96-105.
[8] RAINER K.Large-scale inter-system clone detection using suffix trees and hashing[J].Journal of Software:Evolution and Process,2014,26(8):747-769.
[9] LIU C,CHEN C,HAN J W.GPLAG:detection of software plagiarism by program dependence graph analysis[C]∥Proceedings of the 12th ACM SIGKDD International Conference on Know-ledge Discovery and Data Mining.2006:872-881.
[10] QIU J,SU X H,MA P J.Library functions identification in binary code by using graph isomorphism testings[C]∥IEEE 22nd International Conference onSoftware Analysis,Evolution and Reengineering.2015:261-270.
[11] KAUR M,LAL M.Code clone detection using function basedsimilarities and metrics[J].International Journal of Emerging Research in Management and Technology,2015,4(7):156-159.

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!