Software clone detection: A systematic review

D Rattan, R Bhatia, M Singh - Information and Software Technology, 2013 - Elsevier
CONTEXT: Reusing software by means of copy and paste is a frequent activity in software
development. The duplicated code is known as a software clone and the activity is known as …

Vuddy: A scalable approach for vulnerable code clone discovery

S Kim, S Woo, H Lee, H Oh - 2017 IEEE symposium on security …, 2017 - ieeexplore.ieee.org
The ecosystem of open source software (OSS) has been growing considerably in size. In
addition, code clones-code fragments that are copied and pasted within or between software …

Siamese: scalable and incremental code clone search via multiple code representations

C Ragkhitwetsagul, J Krinke - Empirical Software Engineering, 2019 - Springer
This paper presents a novel code clone search technique that is accurate, incremental, and
scalable to hundreds of million lines of code. Our technique incorporates multiple code …

TreeCen: Building tree graph for scalable semantic code clone detection

Y Hu, D Zou, J Peng, Y Wu, J Shan, H Jin - Proceedings of the 37th IEEE …, 2022 - dl.acm.org
Code clone detection is an important research problem that has attracted wide attention in
software engineering. Many methods have been proposed for detecting code clone, among …

SAGA: efficient and large-scale detection of near-miss clones with GPU acceleration

G Li, Y Wu, CK Roy, J Sun, X Peng… - 2020 IEEE 27th …, 2020 - ieeexplore.ieee.org
Clone detection on large code repository is necessary for many big code analysis tasks. The
goal is to provide rich information on identical and similar code across projects. Detecting …

Systematic mapping study of metrics based clone detection techniques

D Rattan, J Kaur - Proceedings of the international conference on …, 2016 - dl.acm.org
A code clone is a code fragment that is similar or identical to other code fragments in the
source code. Code clones generally occurs in large systems and affects the system …

Automated type-3 clone oracle using levenshtein metric

T Lavoie, E Merlo - Proceedings of the 5th international workshop on …, 2011 - dl.acm.org
Clone detection techniques quality and performance evaluation require a system along with
its clone oracle, that is a reference database of all accepted clones in the investigated …

Machine Learning is All You Need: A Simple Token-based Approach for Effective Code Clone Detection

S Feng, W Suo, Y Wu, D Zou, Y Liu, H Jin - Proceedings of the IEEE …, 2024 - dl.acm.org
As software engineering advances and the code demand rises, the prevalence of code
clones has increased. This phenomenon poses risks like vulnerability propagation …

Benefits of open source software in defense environments

D Russo - Proceedings of 4th International Conference in …, 2016 - Springer
Even though the use of Open Source Software (OSS) might seem paradoxical in Defense
environments, this has been proven to be wrong. The use of OSS does not harm security; on …

A guided tour of the legal implications of software cloning

P Ciancarini, D Russo, A Sillitti, G Succi - Proceedings of the 38th …, 2016 - dl.acm.org
Software Cloning is the typical example where an interdisciplinary approach may bring
additional elements into the community's discussion. In fact, little research has been done in …