Scalable Program Clone Search through Spectral Analysis
Abstract
Supplementary Material
- Download
- 70.14 MB
References
Index Terms
- Scalable Program Clone Search through Spectral Analysis
Recommendations
IDE-based real-time focused search for near-miss clones
SAC '12: Proceedings of the 27th Annual ACM Symposium on Applied ComputingCode clone is a well-known code smell that needs to be detected and managed during the software development process. However, the existing clone detectors have one or more of the three shortcomings: (a) limitation in detecting Type-3 clones, (b) they ...
Scalable code clone search for malware analysis
Reverse engineering is the primary step to analyze a piece of malware. After having disassembled a malware binary, a reverse engineer needs to spend extensive effort analyzing the resulting assembly code, and then documenting it through comments in the ...
Towards a Big Data Curated Benchmark of Inter-project Code Clones
ICSME '14: Proceedings of the 2014 IEEE International Conference on Software Maintenance and EvolutionRecently, new applications of code clone detection and search have emerged that rely upon clones detected across thousands of software systems. Big data clone detection and search algorithms have been proposed as an embedded part of these new ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
- General Chair:
- Satish Chandra,
- Program Chairs:
- Kelly Blincoe,
- Paolo Tonella
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Badges
Author Tags
Qualifiers
- Research-article
Funding Sources
- ANR
- EU Horizon 2020
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 135Total Downloads
- Downloads (Last 12 months)134
- Downloads (Last 6 weeks)4
Other Metrics
Citations
Cited By
View allView Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in