Software clone detection: A systematic review

D Rattan, R Bhatia, M Singh - Information and Software Technology, 2013 - Elsevier
CONTEXT: Reusing software by means of copy and paste is a frequent activity in software
development. The duplicated code is known as a software clone and the activity is known as …

A survey of binary code similarity

IU Haq, J Caballero - Acm computing surveys (csur), 2021 - dl.acm.org
Binary code similarityapproaches compare two or more pieces of binary code to identify their
similarities and differences. The ability to compare binary code enables many real-world …

Deep learning code fragments for code clone detection

M White, M Tufano, C Vendome… - Proceedings of the 31st …, 2016 - dl.acm.org
Code clone detection is an important problem for software maintenance and evolution. Many
approaches consider either structure or identifiers, but none of the existing detection …

Asm2vec: Boosting static representation robustness for binary clone search against code obfuscation and compiler optimization

SHH Ding, BCM Fung… - 2019 ieee symposium on …, 2019 - ieeexplore.ieee.org
Reverse engineering is a manually intensive but necessary technique for understanding the
inner workings of new malware, finding vulnerabilities in existing systems, and detecting …

Oreo: Detection of clones in the twilight zone

V Saini, F Farmahinifarahani, Y Lu, P Baldi… - Proceedings of the …, 2018 - dl.acm.org
Source code clones are categorized into four types of increasing difficulty of detection,
ranging from purely textual (Type-1) to purely semantic (Type-4). Most clone detectors …

Bingo: Cross-architecture cross-os binary search

M Chandramohan, Y Xue, Z Xu, Y Liu, CY Cho… - Proceedings of the …, 2016 - dl.acm.org
Binary code search has received much attention recently due to its impactful applications,
eg, plagiarism detection, malware detection and software vulnerability auditing. However …

Neural detection of semantic code clones via tree-based convolution

H Yu, W Lam, L Chen, G Li, T **e… - 2019 IEEE/ACM 27th …, 2019 - ieeexplore.ieee.org
Code clones are similar code fragments that share the same semantics but may differ
syntactically to various degrees. Detecting code clones helps reduce the cost of software …

Trex: Learning execution semantics from micro-traces for binary similarity

K Pei, Z Xuan, J Yang, S Jana, B Ray - arxiv preprint arxiv:2012.08680, 2020 - arxiv.org
Detecting semantically similar functions--a crucial analysis capability with broad real-world
security usages including vulnerability detection, malware lineage, and forensics--requires …

Checking smart contracts with structural code embedding

Z Gao, L Jiang, X **a, D Lo… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Smart contracts have been increasingly used together with blockchains to automate
financial and business transactions. However, many bugs and vulnerabilities have been …

FaCoY: a code-to-code search engine

K Kim, D Kim, TF Bissyandé, E Choi, L Li… - Proceedings of the 40th …, 2018 - dl.acm.org
Code search is an unavoidable activity in software development. Various approaches and
techniques have been explored in the literature to support code search tasks. Most of these …