SSA-HIAST: A Novel Framework for Code Clone Detection

被引:1
作者
Saini, Neha [1 ]
Singh, Sukhdip [1 ]
机构
[1] Deenbandhu Chhotu Ram Univ Sci & Technol, Murthal 131001, India
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2022年 / 71卷 / 02期
关键词
Code cloning; clone detection; hash inspired abstract syntax tree; rotations; hybrid framework; SEMANTIC CODE; INTERNET; SYSTEM;
D O I
10.32604/cmc.2022.022659
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the recent era of software development, reusing software is one of the major activities that is widely used to save time. To reuse software, the copy and paste method is used and this whole process is known as code cloning. This activity leads to problems like difficulty in debugging, increase in time to debug and manage software code. In the literature, various algorithms have been developed to find out the clones but it takes too much time as well as more space to figure out the clones. Unfortunately, most of them are not scalable. This problem has been targeted upon in this paper. In the proposed framework, authors have proposed a new method of identifying clones that takes lesser time to find out clones as compared with many popular code clone detection algorithms. The proposed framework has also addressed one of the key issues in code clone detection i.e., detection of near-miss (Type-3) and semantic clones (Type-4) with significant accuracy of 95.52% and 92.80% respectively. The present study is divided into two phases, the first method converts any code into an intermediate representation form i.e., Hash inspired abstract syntax trees. In the second phase, these abstract syntax trees are passed to a novel approach "Similarity-based self-adjusting hash inspired abstract syntax tree" algorithm that helps in knowing the similarity level of codes. The proposed method has shown a lot of improvement over the existing code clones identification methods.
引用
收藏
页码:2999 / 3017
页数:19
相关论文
共 39 条
  • [1] Akram Junaid, 2018, P SEKE 2018 30 INT C, P354
  • [2] Anil I. G., 2014, INT J P2P NETW TREND, V4, P33
  • [3] Chen D., 2005, ACM Transactions on Modeling and Computer Simulation, V15, P316, DOI 10.1145/1113316.1113318
  • [4] Cuomo A., 2012, 2012 Proceedings of the 6th International Workshop on Software Clones (IWSC 2012), P8, DOI 10.1109/IWSC.2012.6227879
  • [5] Histograms of oriented gradients for human detection
    Dalal, N
    Triggs, B
    [J]. 2005 IEEE COMPUTER SOCIETY CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION, VOL 1, PROCEEDINGS, 2005, : 886 - 893
  • [6] Dumais S. T., 1994, Second Text REtrieval Conference (TREC-2) (NIST-SP 500-215), P105
  • [7] Current trends in source code analysis, plagiarism detection and issues of analysis big datasets
    Duracik, Michal
    Krsak, Emil
    Hrkut, Patrik
    [J]. 12TH INTERNATIONAL SCIENTIFIC CONFERENCE OF YOUNG SCIENTISTS ON SUSTAINABLE, MODERN AND SAFE TRANSPORT, 2017, 192 : 136 - 141
  • [8] Gabel M, 2008, ICSE'08 PROCEEDINGS OF THE THIRTIETH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, P321, DOI 10.1145/1368088.1368132
  • [9] Gionis A, 1999, PROCEEDINGS OF THE TWENTY-FIFTH INTERNATIONAL CONFERENCE ON VERY LARGE DATA BASES, P518
  • [10] Jiang LX, 2007, PROC INT CONF SOFTW, P96