Code Clone Detection on Specialized PDGs with Heuristic

被引:37
作者
Higo, Yoshiki [1 ]
Kusumoto, Shinji [1 ]
机构
[1] Osaka Univ, Grad Sch Informat Sci & Technol, Suita, Osaka, Japan
来源
2011 15TH EUROPEAN CONFERENCE ON SOFTWARE MAINTENANCE AND REENGINEERING (CSMR) | 2011年
关键词
code clone; program dependency graph;
D O I
10.1109/CSMR.2011.12
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
PDG-based code clone detection is suitable for detecting non-contiguous code clones while other detection techniques, line-, token-, or AST-based techniques are not. However, PDG-based detection has lower performance for detecting contiguous code clones than the other techniques. Moreover, PDG-based detection is time consuming, so that application to actual software systems is not feasible. The present paper proposes PDG specializations and detection heuristics for enhancing PDG-based code clone detection. The experiment in this paper shows that the proposed methods are effective for PDG-based code clone detection by applying them to 4 open source systems.
引用
收藏
页码:75 / 84
页数:10
相关论文
共 50 条
  • [41] ENHANCING A HYBRID PRE-PROCESSING AND TRANSFORMATION PROCESS FOR CODE CLONE DETECTION IN. NET APPLICATION
    Mubarak-Ali, Al-Fahim
    Sulaiman, Shahida
    JURNAL TEKNOLOGI, 2015, 77 (09):
  • [42] Clone-Writer: An effective editor for developing code by using code clones
    Hammad, Muhammad
    Babur, Onder
    Basit, Hamid Abdul
    van den Brand, Mark
    SOFTWARE IMPACTS, 2022, 13
  • [43] Clone-advisor: recommending code tokens and clone methods with deep learning and information retrieval
    Hammad, Muhammad
    Babur, Onder
    Basit, Hamid Abdul
    van den Brand, Mark
    PEERJ COMPUTER SCIENCE, 2021, 7 : 1 - 39
  • [44] On the Effect of Minimum Support and Maximum Gap for Code Clone Detection - An Approach Using Apriori-based Algorithm -
    Udagawa, Yoshihisa
    THIRD INTERNATIONAL CONFERENCE ON ADVANCES AND TRENDS IN SOFTWARE ENGINEERING (SOFTENG 2017), 2017, : 66 - 73
  • [45] Clone-based code method usage pattern mining
    Xue, Zhipeng
    Zhang, Yuanhang
    Xu, Rulin
    30TH IEEE/ACM INTERNATIONAL CONFERENCE ON PROGRAM COMPREHENSION (ICPC 2022), 2022, : 543 - 547
  • [46] CLORIFI: software vulnerability discovery using code clone verification
    Li, Hongzhe
    Kwon, Hyuckmin
    Kwon, Jonghoon
    Lee, Heejo
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2016, 28 (06) : 1900 - 1917
  • [47] Gemini: Maintenance support environment based on code clone analysis
    Ueda, Y
    Kamiya, T
    Kusumoto, S
    Inoue, K
    EIGHTH IEEE SYMPOSIUM ON SOFTWARE METRICS, PROCEEDINGS, 2002, : 67 - 76
  • [48] Using Self Organized Mapping to Seek Refactorable Code Clone
    Meng Fanqi
    2014 FOURTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT), 2014, : 851 - 855
  • [49] Clone-Based and Interactive Recommendation for Modifying Pasted Code
    Lin, Yun
    Peng, Xin
    Xing, Zhenchang
    Zheng, Diwen
    Zhao, Wenyun
    2015 10TH JOINT MEETING OF THE EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND THE ACM SIGSOFT SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING (ESEC/FSE 2015) PROCEEDINGS, 2015, : 520 - 531
  • [50] A Method for Constructing a Clone Code Case Library Based on Bugs
    Zhai Ye
    Zhao Yuwu
    Liu Dong Sheng
    PROCEEDINGS OF 2019 IEEE 3RD INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC 2019), 2019, : 2480 - 2486