Proceedings of the 2nd ACM SIGPLAN International Workshop on Machine Learning and Programming Languages 2018
DOI: 10.1145/3211346.3211347
|View full text |Cite
|
Sign up to set email alerts
|

Clone-hunter: accelerated bound checks elimination via binary code clone detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
6
1
1

Relationship

2
6

Authors

Journals

citations
Cited by 18 publications
(7 citation statements)
references
References 30 publications
0
7
0
Order By: Relevance
“…[30], [14] use machine learning techniques to identify the similarity of code patterns to facilitate discovery of vulnerabilities. Clone-Hunter [32] and Clone-Slicer [32] aim to detect code clones in program binaries for accelerated bounds check removal. Nurit et.…”
Section: Discussionmentioning
confidence: 99%
“…[30], [14] use machine learning techniques to identify the similarity of code patterns to facilitate discovery of vulnerabilities. Clone-Hunter [32] and Clone-Slicer [32] aim to detect code clones in program binaries for accelerated bounds check removal. Nurit et.…”
Section: Discussionmentioning
confidence: 99%
“…Code Clone Detection. Tools and techniques of code clone detection can be classified as six categories [8]: textual approaches [10,23,27,34,37,51,56,58], lexical approaches [35,44,45,50,55,59], tree-based approaches [16,36,57], metric-based approaches [38,48,49], semantic approaches [18,19,22,24,43,54] and hybrid approaches [9,20,21,31,32,41,46,53]. In particular, we introduce several works closely related to our work.…”
Section: Related Workmentioning
confidence: 99%
“…Results indicate that type1, type2 and type3 clones are identified. Xue et al [31] describe a novel framework, clone hunter that integrates machine learning based binary CCD to speed up the elimination of redundant array bound checks in binary executables. They utilize assembly code as source code and Feature vectors as an intermediate format.…”
Section: A Textual Approachesmentioning
confidence: 99%