Filters








4 Hits in 1.3 sec

A HYBRID TECHNIQUE FOR SOFTWARE CLONE DETECTION BY USING TOKEN BASED AND LINE BASED APPROACH

2018 International Journal of Advanced Research in Computer Science  
In this research paper, authors designed a new methodology which is termed as "A Hybrid Technique for software code clone detection by using Token Based and Line Based Approach" (HTSCCDUToL i A) whose  ...  Type 1, Type 2 and Type 3 clones etc. This newly designed methodology working is based on two different types of software cloning approaches viz. Line based Approach and Token Based Approach.  ...  Heejo Lee and Hakjoo Oh, "A Scalable Approach for Vulnerable Code Clone Discovery", IEEE Symposium on Security & Privacy", Korea University, 2017, Korea. [2] Sukhpreet Kaur and Manpreet Kaur," Code Clone  ... 
doi:10.26483/ijarcs.v9i2.5568 fatcat:vakhsih2u5cnrpouij3e7iyaza

A Survey of Software Clone Detection from Security Perspective

Haibo Zhang, Kouichi Sakurai
2021 IEEE Access  
Maxine Garcia from Edanz Group (https://en-author-services.edanz.com/ac) for editing a draft of this manuscript.  ...  Yujie Gu and all the reviewers for their helpful advice on this manuscript. We thank Dr.  ...  [43] proposed a scalable approach called VUDDY for code clone vulnerability detection.  ... 
doi:10.1109/access.2021.3065872 fatcat:fh6ysdrcqvawpay6s767i3na2u

Recent Advancements in Code Clone Detection – Techniques and Tools

Qurat Ul Ain, Wasi Haider Butt, Muhamad Waseem Anwar, Farooque Azam, Bilal Maqbool
2019 IEEE Access  
If a bug is identified in one segment of code, all the similar segments need to be checked for the same bug.  ...  Therefore, in this paper, we comprehensively inspect the latest tools and techniques utilized for the detection of code clones.  ...  [28] present Vuddy, a scalable approach for vulnerable code clone discovery.  ... 
doi:10.1109/access.2019.2918202 fatcat:yffzco4o6jdgllswhd6m6j444e

TRACER: Finding Patches for Open Source Software Vulnerabilities [article]

Congying Xu, Bihuan Chen, Chenhao Lu, Kaifeng Huang, Xin Peng, Yang Liu
2021 arXiv   pre-print
Then, inspired by our study, we propose the first automated approach, named TRACER, to find patches for an OSS vulnerability from multiple sources.  ...  Our extensive evaluation has indicated that i) TRACER finds patches for up to 273.8% more CVEs than existing heuristic-based approaches while achieving a significantly higher F1-score by up to 116.8%;  ...  Oh, “Vuddy: A scalable approach 29th ACM SIGSOFT International Symposium on Software Testing and for vulnerable code clone discovery,” in Proceedings of the IEEE Analysis, 2020  ... 
arXiv:2112.02240v1 fatcat:cdvmcmzrgjhxjlpmrahle3eoa4