2019
DOI: 10.1109/access.2019.2898411
|View full text |Cite
|
Sign up to set email alerts
|

Detecting Java Code Clones Based on Bytecode Sequence Alignment

Abstract: When the source code is copied and pasted or modified, there will be a lot of identical or similar code snippets in the software system, which are called code clones. Because code clones are believed to result in undesirable maintainability of software, numerous approaches and techniques have been proposed for code clone detection. However, most of them are based on the source code, while only a few employ the bytecode to detect code clones. In this paper, we introduce an approach based on Java bytecode, which… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 17 publications
(13 citation statements)
references
References 23 publications
0
8
0
Order By: Relevance
“…Yu et al present an approach that detects clones in Java using the Smith-Waterman algorithm on Java bytecode [39]. This approach is only suitable for languages that are translated into Java bytecode.…”
Section: Intra Variant Clone Detection (Classic Clone Detection)mentioning
confidence: 99%
“…Yu et al present an approach that detects clones in Java using the Smith-Waterman algorithm on Java bytecode [39]. This approach is only suitable for languages that are translated into Java bytecode.…”
Section: Intra Variant Clone Detection (Classic Clone Detection)mentioning
confidence: 99%
“…Compared to works on source code level, many works manipulate bytecode, such as libraries categorization [30], software product line extraction [31], code clone [32] and code diversity [33], etc. Mens et al [34] hold the view that the technique for bytecode transformation is compatible with the definition of refactoring, and refactoring can be very useful at an even more implementation dependent level than programming languages, such as refactoring of bytecode, or even refactoring of executable code.…”
Section: B Bytecode Refactoring Vs Source Code Refactoringmentioning
confidence: 99%
“…The Smith-Waterman algorithm is parameter sensitive, specifically, for the following parameters: p, q, W 1 . Previous work [20], [21] set these three parameters to static fixed values, which caused the Smith-Waterman algorithm to lose similar regions between sequences in some cases. We explain this with the following example.…”
Section: ) Dynamic Parameter Acquisition Strategymentioning
confidence: 99%
“…Sheneamer and Kalita [21] applied the Smith-Waterman algorithm to align Java bytecode sequences for detecting Java code clones. Nevertheless, similar to the work of Murakami et al, DJ Yu et al used the original Smith-Waterman algorithm and set algorithm parameters to static fixed values.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation