2017 22nd IEEE International Conference on Emerging Technologies and Factory Automation (ETFA) 2017
DOI: 10.1109/etfa.2017.8247574
|View full text |Cite
|
Sign up to set email alerts
|

Exploring code clones in programmable logic controller software

Abstract: The reuse of code fragments by copying and pasting is widely practiced in software development and results in code clones. Cloning is considered an anti-pattern as it negatively affects program correctness and increases maintenance efforts. Programmable Logic Controller (PLC) software is no exception in the code clone discussion as reuse in development and maintenance is frequently achieved through copy, paste, and modification. Even though the presence of code clones may not necessary be a problem per se, it … Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
2
1

Relationship

2
5

Authors

Journals

citations
Cited by 11 publications
(9 citation statements)
references
References 34 publications
0
9
0
Order By: Relevance
“…The properties of the similarity metric splits clones into two groups [9]. Type 1-3 clones capture textual similarity while Type 4 clones capture semantic similarity [10], [14], [18], [9], [11], [19]. These types are increasingly challenging to detect, with Type 4 being the most complex one.…”
Section: A Clone Detectionmentioning
confidence: 99%
“…The properties of the similarity metric splits clones into two groups [9]. Type 1-3 clones capture textual similarity while Type 4 clones capture semantic similarity [10], [14], [18], [9], [11], [19]. These types are increasingly challenging to detect, with Type 4 being the most complex one.…”
Section: A Clone Detectionmentioning
confidence: 99%
“…Code Clone Detection. Tools and techniques of code clone detection can be classified as six categories [8]: textual approaches [10,23,27,34,37,51,56,58], lexical approaches [35,44,45,50,55,59], tree-based approaches [16,36,57], metric-based approaches [38,48,49], semantic approaches [18,19,22,24,43,54] and hybrid approaches [9,20,21,31,32,41,46,53]. In particular, we introduce several works closely related to our work.…”
Section: Related Workmentioning
confidence: 99%
“…For this purpose, Java source code is used as input and as we know that NICAD can detect type1, type2 and type3 clones so we can assume that these types of clones are identified. Thaller et al [33] describe the results from the analyses of code clones in real-world PLC software. These results show that normalized C/C++, ST source code is utilized and type1 and type2 clones are detected.…”
Section: A Textual Approachesmentioning
confidence: 99%
“…Simian is a clone detection tool based on textbased technique [47]. It uncovers exact (type 1) clones in all source codes but for several programming languages, it incorporates additional normalization features [33]. It relays on the comparison of text line with an ability for checking basic modification of code [76].…”
Section: G Clone Detection Toolsmentioning
confidence: 99%