Results 231 to 240 of about 7,941 (270)
Some of the next articles are maybe not open access.
Program Slice Based Vulnerable Code Clone Detection
2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2020Vulnerabilities in software will not only lead to security problems of the software itself, but also cause the spread of vulnerabilities through code clones. It is important to detect and locate vulnerabilities among the source code to facilitate the fix.
Liu Shirun+6 more
openaire +2 more sources
Unifying clones with a generative programming technique: a case study
Journal of Software Maintenance and Evolution: Research and Practice, 2006AbstractSoftware clones—similar program structures repeated in variant forms—increase the risk of update anomalies, blow up the program size and complexity, possibly contributing to high maintenance costs. Yet, programs are often polluted by clones. In this paper, we present a case study of cloning in the Java Buffer library, JDK 1.5.
Jarzabek, S., Li, S.
openaire +1 more source
Semantic Code Clones in Logic Programs
2013In this paper, we study what is a semantic code clone pair in a logic program. Unlike our earlier work, that focused on simple syntactic equivalence for defining clones, we propose a more general approximation based on operational semantics and transformation rules.
Celine Dandois, Wim Vanhoof
openaire +2 more sources
Frankencode: Creating Diverse Programs Using Code Clones
2016 IEEE 23rd International Conference on Software Analysis, Evolution, and Reengineering (SANER), 2016In this paper, we present an approach to detectingnovel cyber attacks though a form of program diversification, similar to the use of n-version programming forfault tolerant systems. Building on extensive previousand ongoing work by others on the use of code clonesin a wide variety of areas, our Functionally EquivalentVariants using Information ...
Mary Southern+7 more
openaire +2 more sources
Clones in Logic Programs and How to Detect Them
2012In this paper, we propose a theoretical framework that allows us to capture, by program analysis, the notion of code clone in the context of logic programming. Informally, two code fragments are considered as cloned if they implement the same functionality.
Wim Vanhoof, Celine Dandois
openaire +3 more sources
Clone detection through srcClone: A program slicing based approach
Journal of Systems and Software, 2022Abstract Software clone detection is an often used approach to understand and maintain software systems. One category of clones that is challenging to detect but very useful is semantic clones, which are similar in semantics but differ in syntax significantly. Semantic clone detectors have trouble scaling to larger systems and sometimes struggle with
Matthew Stephan, Hakam W. Alomari
openaire +2 more sources
Rearranging the order of program statements for code clone detection
2017 IEEE 11th International Workshop on Software Clones (IWSC), 2017A code clone is a code fragment identical or similar to another code fragment in source code. Some of code clones are considered as a factor of bug replications and make it more difficult to maintain software. Various code clone detection tools have been proposed so far.
Shinji Kusumoto+2 more
openaire +2 more sources
Learning navigation Teleo-Reactive Programs using behavioural cloning [PDF]
Programming a robot to perform tasks in dynamic environments is a complex process. Teleo-Reactive Programs (TRPs) have proved to be an effective framework to continuously perform a set of actions to achieve particular goals and react in the presence of unexpected events, however, their definition is a difficult and time-consuming process. In this paper,
Blanca A. Vargas, Eduardo F. Morales
openaire +1 more source
Clone selection programming and its application to symbolic regression
Expert Systems with Applications, 2009A new idea 'clone selection programming (CSP)' is introduced in this paper. The proposed methodology is used for deriving new algorithms in the area of evolutionary computing aimed at solving a wide range of problems. In CSP, antibodies represent candidate solutions, which are encoded according to the structure of antibody.
W. N. Chau+2 more
openaire +2 more sources
Mapping Similarity Detectors of Code Clone to Academic Integrity in Programming
2021 IEEE World Conference on Engineering Education (EDUNINE), 2021When dealing with academic integrity in programming, code similarity detectors are often used to raise suspicion of student programs with undue similarity. However, it appears that only detectors designed for that purpose are discussed in computing education publications, although similarity detectors for other purposes might also be beneficial, both ...
Simon+2 more
openaire +2 more sources