Proceedings Eighth Working Conference on Reverse Engineering
DOI: 10.1109/wcre.2001.957835
|View full text |Cite
|
Sign up to set email alerts
|

Identifying similar code with program dependence graphs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
308
0
5

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 419 publications
(313 citation statements)
references
References 11 publications
0
308
0
5
Order By: Relevance
“…However, like trees, graph similarity suffers from a high computational complexity. Algorithms for graph comparison are mostly NP-complete (Liu et al 2006;Crussell et al 2012;Krinke 2001;Chae et al 2013). In clone and plagiarism detection, a few specific types of graphs are used, e.g.…”
Section: Code Similarity Measurementmentioning
confidence: 99%
See 1 more Smart Citation
“…However, like trees, graph similarity suffers from a high computational complexity. Algorithms for graph comparison are mostly NP-complete (Liu et al 2006;Crussell et al 2012;Krinke 2001;Chae et al 2013). In clone and plagiarism detection, a few specific types of graphs are used, e.g.…”
Section: Code Similarity Measurementmentioning
confidence: 99%
“…program dependence graphs (PDG), or control flow graphs (CFG). Examples of code similarity analysers using graph-based approaches are the ones invented by Krinke (2001), Komondoor and Horwitz (2001), Chae et al (2013) and Chen et al (2014). Although the tools demonstrate high precision and recall (Krinke 2001), they suffer scalability issues (Bellon et al 2007).…”
Section: Code Similarity Measurementmentioning
confidence: 99%
“…Marcus & Maletic (2001) used information retrieval techniques on source code to detect semantic similarities. Krinke (2001) proposed to use program dependence graphs (PDG) for abstracting source code. Higo et al (2011) extended this to an incremental approach.…”
Section: Related Workmentioning
confidence: 99%
“…For their information-flow control, they use a program dependence graph, a representation already known in the area of static program analysis [15,3,11]. In a succeeding work, Hammer evaluates his approach with some real-world examples and lists results of his performance measurements [12].…”
Section: Related Workmentioning
confidence: 99%