2014
DOI: 10.1016/j.scico.2013.11.022
|View full text |Cite
|
Sign up to set email alerts
|

CD-Form: A clone detector based on formal methods

Abstract: h i g h l i g h t s• We propose the use of formal methods (Calculus of Communicating Systems) for detection of software clones.• We introduce a technique for translating Java bytecode to process algebra representation.• We present an optimized implementation able to deal with real-world software projects.• We provide a comparison with a state-of-the-art tool, obtaining comparable results. a r t i c l e i n f o a b s t r a c tThis paper presents the design and implementation of CD-Form (Clone Detector based on … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
3
3
1

Relationship

2
5

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 25 publications
0
5
0
Order By: Relevance
“…They divided the bytecode into three dimensions of instruction, method call and type, and matched the bytecode content by employing a semantic search on the bytecode ontology. CD-Form, proposed by Cuomo et al [16], converted the Java bytecode to the calculus of communicating systems format, and detected code clones on the method level.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…They divided the bytecode into three dimensions of instruction, method call and type, and matched the bytecode content by employing a semantic search on the bytecode ontology. CD-Form, proposed by Cuomo et al [16], converted the Java bytecode to the calculus of communicating systems format, and detected code clones on the method level.…”
Section: Related Workmentioning
confidence: 99%
“…The Jaccard similarity coefficient function is adopted to calculate the similarity value in SeByte [14], [15]. In [16], an equivalence-based algorithm is employed to detect code clones. Meanwhile, Koschke et al [11] used the extended algorithm to consider the sequences missed by the basic algorithm.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Approaches in code clone detection generally fall into six categories according to the underlying technique: text-based [25], token-based [26], tree-based [27], graphbased [28], metrics-based [29], and hybrid [30]. Some code clone detection techniques have considered the bytecode as the primary artifact [31]- [33], to detect Type 3 and 4 clones.…”
Section: Related Workmentioning
confidence: 99%
“…This approach to program verification is also sometimes called implementation verification. Behavioral equivalence can be used also for other purposes, like, for example, for clone detection [Cuomo et al 2013]. …”
Section: Preliminariesmentioning
confidence: 99%