2017 IEEE/ACM 14th International Conference on Mining Software Repositories (MSR) 2017
DOI: 10.1109/msr.2017.19
|View full text |Cite
|
Sign up to set email alerts
|

Source File Set Search for Clone-and-Own Reuse Analysis

Abstract: Clone-and-own approach is a natural way of source code reuse for software developers. To assess how known bugs and security vulnerabilities of a cloned component affect an application, developers and security analysts need to identify an original version of the component and understand how the cloned component is different from the original one. Although developers may record the original version information in a version control system and/or directory names, such information is often either unavailable or inc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
18
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
3
2
1

Relationship

2
4

Authors

Journals

citations
Cited by 25 publications
(18 citation statements)
references
References 44 publications
0
18
0
Order By: Relevance
“…where S (p, l) is an aggregated file similarity value of a product version p and a library version l [8]. In Reuse(P, L), each product version p ∈ P is corresponding to only one version of library l whose source files are the most similar to the product source code.…”
Section: Extraction Of Library Update Historymentioning
confidence: 99%
See 3 more Smart Citations
“…where S (p, l) is an aggregated file similarity value of a product version p and a library version l [8]. In Reuse(P, L), each product version p ∈ P is corresponding to only one version of library l whose source files are the most similar to the product source code.…”
Section: Extraction Of Library Update Historymentioning
confidence: 99%
“…Copyright c 2018 The Institute of Electronics, Information and Communication Engineers th = 0.9 to ignore lower similarity values. The threshold accurately identifies source files in a product that are reused from a library [8].…”
Section: Extraction Of Library Update Historymentioning
confidence: 99%
See 2 more Smart Citations
“…The authors also present other variations of real-time clone search system using multi-level indexing (Keivanloo et al, 2011a,b), and abstract programming solutions . Ishio et al (2017) present a scalable approach for detecting clone-and-own software packages using b-bit minwise hashing technique. Then, an aggregated file similarity is applied to rank the returned search components.…”
Section: Code Clone Searchmentioning
confidence: 99%