2020
DOI: 10.48550/arxiv.2006.15682
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

A Survey on the Evaluation of Clone Detection Performance and Benchmarking

Jeffrey Svajlenko,
Chanchal K. Roy
Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 138 publications
(317 reference statements)
0
3
0
Order By: Relevance
“…Roy et al [6] focused on clone detection techniques and tools, providing a concise but comprehensive survey and a hypothetical evaluation based on editing scenarios. Recently, this work was extended by Svajlenko and Roy [13] to include more clone detection tools. Amro [14] summarized most of the malware detection techniques used by Android and iOS, and he presented a brief description of each technique.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Roy et al [6] focused on clone detection techniques and tools, providing a concise but comprehensive survey and a hypothetical evaluation based on editing scenarios. Recently, this work was extended by Svajlenko and Roy [13] to include more clone detection tools. Amro [14] summarized most of the malware detection techniques used by Android and iOS, and he presented a brief description of each technique.…”
Section: Related Workmentioning
confidence: 99%
“…Most attempts have focused on a small number of obfuscators [1,11,12,[14][15][16]. Others narrowed their research to specific types of obfuscators, such as plagiarism/cloning [6,13,17], network protocols [10], or JavaScript [1]. The rest summarized some of the obfuscation transformations with no mention of tools [14].…”
Section: Related Workmentioning
confidence: 99%
“…An important case of code similarity detection is the detection of code clones, i.e., code snippets with identical functionality. Code clones are commonly divided into four types [52], with Type IV being the hardest to detect. Type I-III clones refer to gradually increasing differences in the implementation (e.g., changed names of tokens, order of operations, insertion of dead code).…”
Section: Introductionmentioning
confidence: 99%