Sourcerercc: Scaling code clone detection to big-code

H Sajnani, V Saini, J Svajlenko, CK Roy… - Proceedings of the 38th …, 2016 - dl.acm.org
Despite a decade of active research, there has been a marked lack in clone detection
techniques that scale to large repositories for detecting near-miss clones. In this paper, we …

{MVP}: Detecting vulnerabilities using {Patch-Enhanced} vulnerability signatures

Y Xiao, B Chen, C Yu, Z Xu, Z Yuan, F Li, B Liu… - 29th USENIX Security …, 2020 - usenix.org
Recurring vulnerabilities widely exist and remain undetected in real-world systems, which
are often resulted from reused code base or shared code logic. However, the potentially …

[HTML][HTML] A systematic mapping study of clone visualization

M Hammad, HA Basit, S Jarzabek, R Koschke - Computer Science Review, 2020 - Elsevier
Knowing code clones (similar code fragments) is helpful in software maintenance and re-
engineering. As clone detectors return huge numbers of clones, visualization techniques …

SCDetector: Software functional clone detection based on semantic tokens analysis

Y Wu, D Zou, S Dou, S Yang, W Yang… - Proceedings of the 35th …, 2020 - dl.acm.org
Code clone detection is to find out code fragments with similar functionalities, which has
been more and more important in software engineering. Many approaches have been …

Nil: large-scale detection of large-variance clones

T Nakagawa, Y Higo, S Kusumoto - Proceedings of the 29th ACM Joint …, 2021 - dl.acm.org
A code clone (in short, clone) is a code fragment that is identical or similar to other code
fragments in source code. Clones generated by a large number of changes to copy-and …

[PDF][PDF] EMS: History-Driven Mutation for Coverage-based Fuzzing.

C Lyu, S Ji, X Zhang, H Liang, B Zhao, K Lu, R Beyah - NDSS, 2022 - ndss-symposium.org
Mutation-based fuzzing is one of the most popular approaches to discover vulnerabilities in
a program. To alleviate the inefficiency of mutation-based fuzzing incurred by high …

TreeCen: Building tree graph for scalable semantic code clone detection

Y Hu, D Zou, J Peng, Y Wu, J Shan, H Jin - Proceedings of the 37th IEEE …, 2022 - dl.acm.org
Code clone detection is an important research problem that has attracted wide attention in
software engineering. Many methods have been proposed for detecting code clone, among …

Fine-grained code clone detection with block-based splitting of abstract syntax tree

T Hu, Z Xu, Y Fang, Y Wu, B Yuan, D Zou… - Proceedings of the 32nd …, 2023 - dl.acm.org
Code clone detection aims to find similar code fragments and gains increasing importance
in the field of software engineering. There are several types of techniques for detecting code …

Ossfp: Precise and scalable c/c++ third-party library detection using fingerprinting functions

J Wu, Z Xu, W Tang, L Zhang, Y Wu… - 2023 IEEE/ACM 45th …, 2023 - ieeexplore.ieee.org
Third-party libraries (TPLs) are frequently used in software to boost efficiency by avoiding
repeated developments. However, the massive using TPLs also brings security threats since …

Scalable code clone detection and search based on adaptive prefix filtering

MA Nishi, K Damevski - Journal of Systems and Software, 2018 - Elsevier
Code clone detection is a well-known software engineering problem that aims to detect all
the groups of code blocks or code fragments that are functionally equivalent in a code base …