Taming compiler fuzzers
Aggressive random testing tools (" fuzzers") are impressively effective at finding compiler
bugs. For example, a single test-case generator has resulted in more than 1,700 bugs …
bugs. For example, a single test-case generator has resulted in more than 1,700 bugs …
funcgnn: A graph neural network approach to program similarity
Background: Program similarity is a fundamental concept, central to the solution of software
engineering tasks such as software plagiarism, clone identification, code refactoring and …
engineering tasks such as software plagiarism, clone identification, code refactoring and …
An automated approach to assess the similarity of GitHub repositories
Open source software (OSS) allows developers to study, change, and improve the code free
of charge. There are several high-quality software projects which deliver stable and well …
of charge. There are several high-quality software projects which deliver stable and well …
Code similarities beyond copy & paste
Redundant source code hinders software maintenance, since updates have to be performed
in multiple places. This holds independent of whether redundancy was created by …
in multiple places. This holds independent of whether redundancy was created by …
Early detection of smart ponzi scheme contracts based on behavior forest similarity
Smart contracts empowered by blockchains often manage digital assets in a distributed and
decentralized environment. People believe in smart contracts based on these new …
decentralized environment. People believe in smart contracts based on these new …
Frontiers of software clone management
R Koschke - 2008 Frontiers of Software Maintenance, 2008 - ieeexplore.ieee.org
Ad-hoc reuse through copy-and-paste occurs frequently in practice affecting the evolvability
of software. This paper summarizes the state of the art in software clone management …
of software. This paper summarizes the state of the art in software clone management …
Detecting Java software similarities by using different clustering techniques
Background Research on empirical software engineering has increasingly been conducted
by analysing and measuring vast amounts of software systems. Hundreds, thousands and …
by analysing and measuring vast amounts of software systems. Hundreds, thousands and …
An assessment of type-3 clones as detected by state-of-the-art tools
R Tiarks, R Koschke, R Falke - 2009 Ninth IEEE International …, 2009 - ieeexplore.ieee.org
Code reuse through copying and pasting leads to so-called software clones. These clones
can be roughly categorized into identical fragments (type-1 clones), fragments with …
can be roughly categorized into identical fragments (type-1 clones), fragments with …
Measuring source code similarity by finding similar subgraph with an incremental genetic algorithm
Measuring similarity between source codes has lots of applications, such as code plagiarism
detection, code clone detection, and malware detection. A variety of methods for the …
detection, code clone detection, and malware detection. A variety of methods for the …
Magic Markup: Maintaining Document-External Markup with an LLM
Text documents, including programs, typically have human-readable semantic structure.
Historically, programmatic access to these semantics has required explicit in-document …
Historically, programmatic access to these semantics has required explicit in-document …