Semantic Code Clone Detection Method for Distributed Enterprise Systems

被引:2
作者
Svacina, Jan [1 ]
Bushong, Vincent [1 ]
Das, Dipta [1 ]
Cerny, Tomas [1 ]
机构
[1] Baylor Univ, Comp Sci, One Bear Pl, Waco, TX 76798 USA
来源
PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND SERVICES SCIENCE (CLOSER) | 2022年
基金
美国国家科学基金会;
关键词
Source Code Analysis; Code Clone Detection; Semantic Clone; Enterprise Applications; Code Smells; SOFTWARE;
D O I
10.5220/0011032200003200
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Conventional approaches to code clone detection consider systems from elementary construct perspectives, making it difficult to detect semantic clones. This paper argues that semantic clone detection could be improved for enterprise systems since they typically use well-established architectures and standards. Semantic clone detection is crucial for enterprises where software's codebase grows and evolves and maintenance costs rise significantly. While researchers have proposed many code clone detection techniques, there is a lack of solutions targeted explicitly toward enterprise systems and even fewer solutions dedicated to semantic clones. Semantic clones exhibit the same behavior between clone pairs but differ in the syntactic structure. This paper proposes a novel approach to detect semantic clones for enterprise frameworks. The driving idea is to transform a particular enterprise application into a control-flow graph representation. Next, various proprietary similarity functions are applied to compare targeted enterprise metadata for each pair of the control-flow graph fragment. As a result, we achieve to detect semantic clones with high accuracy and reasonable time complexity.
引用
收藏
页码:27 / 37
页数:11
相关论文
共 36 条
[11]   Enhancing Quality of Code Clone Detection with Program Dependency Graph [J].
Higo, Yoshiki ;
Kusumoto, Shinji .
16TH WORKING CONFERENCE ON REVERSE ENGINEERING (WCRE 2009), 2009, :315-316
[12]  
JBoss, 2020, JAV JAV BYT ENG TOOL
[13]  
Jin A., 2014, DCOM TECHNICAL OVERV
[14]  
Kamiya T., 2001, TOKEN BASED CODE CLO
[15]  
Kamiya T, 2013, CONF PROC INT SYMP C, P227, DOI 10.1109/ICPC.2013.6613854
[16]  
Kapser C., 2003, TAXONOMY CLONES SOUR
[17]  
Koschke R., 2012, Dagstuhl Reports, V2, P21
[18]  
Larman Craig., 2003, Agile and Iterative Development: A Managers Guide
[19]  
Nance M.W., 2015, The Terrorists of Iraq: Inside the Strategy and Tactics of the Iraq Insurgency 2003-2014, V2nd
[20]  
Nasirloo H, 2018, 2018 4TH INTERNATIONAL CONFERENCE ON WEB RESEARCH (ICWR), P19, DOI 10.1109/ICWR.2018.8387232