Taming compiler fuzzers

Y Chen, A Groce, C Zhang, WK Wong, X Fern… - Proceedings of the 34th …, 2013 - dl.acm.org
Aggressive random testing tools (" fuzzers") are impressively effective at finding compiler
bugs. For example, a single test-case generator has resulted in more than 1,700 bugs …

funcgnn: A graph neural network approach to program similarity

A Nair, A Roy, K Meinke - Proceedings of the 14th ACM/IEEE …, 2020 - dl.acm.org
Background: Program similarity is a fundamental concept, central to the solution of software
engineering tasks such as software plagiarism, clone identification, code refactoring and …

An automated approach to assess the similarity of GitHub repositories

PT Nguyen, J Di Rocco, R Rubei, D Di Ruscio - Software Quality Journal, 2020 - Springer
Open source software (OSS) allows developers to study, change, and improve the code free
of charge. There are several high-quality software projects which deliver stable and well …

Code similarities beyond copy & paste

E Juergens, F Deissenboeck… - 2010 14th European …, 2010 - ieeexplore.ieee.org
Redundant source code hinders software maintenance, since updates have to be performed
in multiple places. This holds independent of whether redundancy was created by …

Early detection of smart ponzi scheme contracts based on behavior forest similarity

W Sun, G Xu, Z Yang, Z Chen - 2020 IEEE 20th International …, 2020 - ieeexplore.ieee.org
Smart contracts empowered by blockchains often manage digital assets in a distributed and
decentralized environment. People believe in smart contracts based on these new …

Frontiers of software clone management

R Koschke - 2008 Frontiers of Software Maintenance, 2008 - ieeexplore.ieee.org
Ad-hoc reuse through copy-and-paste occurs frequently in practice affecting the evolvability
of software. This paper summarizes the state of the art in software clone management …

Detecting Java software similarities by using different clustering techniques

A Capiluppi, D Di Ruscio, J Di Rocco… - Information and …, 2020 - Elsevier
Background Research on empirical software engineering has increasingly been conducted
by analysing and measuring vast amounts of software systems. Hundreds, thousands and …

An assessment of type-3 clones as detected by state-of-the-art tools

R Tiarks, R Koschke, R Falke - 2009 Ninth IEEE International …, 2009 - ieeexplore.ieee.org
Code reuse through copying and pasting leads to so-called software clones. These clones
can be roughly categorized into identical fragments (type-1 clones), fragments with …

Measuring source code similarity by finding similar subgraph with an incremental genetic algorithm

J Kim, HG Choi, H Yun, BR Moon - Proceedings of the Genetic and …, 2016 - dl.acm.org
Measuring similarity between source codes has lots of applications, such as code plagiarism
detection, code clone detection, and malware detection. A variety of methods for the …

Magic Markup: Maintaining Document-External Markup with an LLM

E Misback, Z Tatlock, SL Tanimoto - … Conference on the Art, Science, and …, 2024 - dl.acm.org
Text documents, including programs, typically have human-readable semantic structure.
Historically, programmatic access to these semantics has required explicit in-document …