Software clone detection: A systematic review
CONTEXT: Reusing software by means of copy and paste is a frequent activity in software
development. The duplicated code is known as a software clone and the activity is known as …
development. The duplicated code is known as a software clone and the activity is known as …
A survey of binary code similarity
Binary code similarityapproaches compare two or more pieces of binary code to identify their
similarities and differences. The ability to compare binary code enables many real-world …
similarities and differences. The ability to compare binary code enables many real-world …
Deep learning code fragments for code clone detection
Code clone detection is an important problem for software maintenance and evolution. Many
approaches consider either structure or identifiers, but none of the existing detection …
approaches consider either structure or identifiers, but none of the existing detection …
Asm2vec: Boosting static representation robustness for binary clone search against code obfuscation and compiler optimization
Reverse engineering is a manually intensive but necessary technique for understanding the
inner workings of new malware, finding vulnerabilities in existing systems, and detecting …
inner workings of new malware, finding vulnerabilities in existing systems, and detecting …
Oreo: Detection of clones in the twilight zone
Source code clones are categorized into four types of increasing difficulty of detection,
ranging from purely textual (Type-1) to purely semantic (Type-4). Most clone detectors …
ranging from purely textual (Type-1) to purely semantic (Type-4). Most clone detectors …
Bingo: Cross-architecture cross-os binary search
Binary code search has received much attention recently due to its impactful applications,
eg, plagiarism detection, malware detection and software vulnerability auditing. However …
eg, plagiarism detection, malware detection and software vulnerability auditing. However …
Neural detection of semantic code clones via tree-based convolution
Code clones are similar code fragments that share the same semantics but may differ
syntactically to various degrees. Detecting code clones helps reduce the cost of software …
syntactically to various degrees. Detecting code clones helps reduce the cost of software …
Trex: Learning execution semantics from micro-traces for binary similarity
Detecting semantically similar functions--a crucial analysis capability with broad real-world
security usages including vulnerability detection, malware lineage, and forensics--requires …
security usages including vulnerability detection, malware lineage, and forensics--requires …
Checking smart contracts with structural code embedding
Smart contracts have been increasingly used together with blockchains to automate
financial and business transactions. However, many bugs and vulnerabilities have been …
financial and business transactions. However, many bugs and vulnerabilities have been …
FaCoY: a code-to-code search engine
Code search is an unavoidable activity in software development. Various approaches and
techniques have been explored in the literature to support code search tasks. Most of these …
techniques have been explored in the literature to support code search tasks. Most of these …