Benchmarks for software clone detection: A ten-year retrospective

CK Roy, JR Cordy - 2018 IEEE 25th International Conference …, 2018 - ieeexplore.ieee.org
There have been a great many methods and tools proposed for software clone detection.
While some work has been done on assessing and comparing performance of these tools …

Phishing kits source code similarity distribution: A case study

E Merlo, M Margier, GV Jourdan… - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
Attackers (“phishers”) typically deploy source code in some host website to impersonate a
brand or in general a situation in which a user is expected to provide some personal …

A case study of TTCN-3 test scripts clone analysis in an industrial telecommunication setting

T Lavoie, M Mérineau, E Merlo, P Potvin - Information and Software …, 2017 - Elsevier
Context: This paper presents a novel experiment focused on detecting and analyzing clones
in test suites written in TTCN-3, a standard telecommunication test script language, for …

Active clones: Source code clones at runtime

M Khan, K Schneider, C Roy - Electronic Communications of the EASST, 2014 - eceasst.org
Code cloning is a common programming practice, and there have been aconsiderable
amount of research that investigated the implications of code clones onsoftware …

Analysis and maintainability of complex industry test code using clone detection

WOA Hasanain - 2020 - repository.library.carleton.ca
Many companies, including Ericsson, experience increased software verification costs. Agile
cross-functional teams find it easy to make new additions of test cases for every change and …

[PDF][PDF] Robust Parsing of Cloned Token Sequences

R Koschke, O Riemann - Electronic Communications of the EASST, 2014 - eceasst.org
Token-based clone detection techniques are known for their scalability, high recall, and
robustness against syntax errors and incomplete code. They, however, may yield clones that …

Leveraging Software Clones for Software Comprehension: Techniques and Practice

TM Lavoie - 2015 - publications.polymtl.ca
Le corps de cette thèse est centré sur deux aspects de la détection de clones logiciels: la
détection et l'application. En détection, la contribution principale de cette thèse est un …

[PDF][PDF] Eighth International Workshop on Software Clones (IWSC 2014)

OJL Riemann, R Koschke - Electronic Communications of the EASST, 2014 - core.ac.uk
Token-based clone detection techniques are known for their scalability, high recall, and
robustness against syntax errors and incomplete code. They, however, may yield clones that …