Survey on Software code clone detection

Main Article Content

Yasir Mohammed Khazaal
Asma’a Y. Hammo

Abstract

Software code clones refer to the same part of code that appears in different places. Software clones (with or without edits) may occur during the software development for the same requirements. This copy and paste may be done on different levels (file, class, and method). Despite this process reduces the time and effort required to build the software but on the other hand, it may increase the cost and effort required to maintain the software. Also, may lead to bugs propagation when the bug occurs in the original copy of code. For this reason, many tools for code clone detection are implemented in the last 20 years to detect different kinds of clones (kind1, kind 2, kind 3, and kind 4) using different methods for different programming languages (Java, C, C++…etc).


This paper explains: what are software clones, their kinds, and the methods used to detect them. It contains also a list of researches in this field till Jan 2022.


img.jpg


Article Details

How to Cite
Khazaal, Y. M. ., & Hammo, A. Y. . (2022). Survey on Software code clone detection. Technium: Romanian Journal of Applied Sciences and Technology, 4(3), 28–36. https://doi.org/10.47577/technium.v4i3.6361
Section
Articles

References

- A. Kumar, R. Yadav and K. Kumar: A systematic review of semantic clone detection techniques in software systems.IOP Conference Series Materials Science and Engineering, January 2021,1022:012074 2021.

- M. Sudhamani and L. Rangarajan: Code clone detection based on order and content of control statements, in Proc. 2nd Int. Conf. Contemp. Comput. Inform. (IC3I), 2016, pp. 59–64.

- A. N. Runwal and A. D. Waghmare: Code clone detection based on logical similarity: A review, International Journal of Advanced Research in Computer and Communication Engineering, ISSN 2278-1021 ,(September 2017 ).

- Roopam and G. Singh: To enhance the code clone detection algorithm by using hybrid approach for detection of code clones, International Conference on Intelligent Computing and Control Systems (ICICCS), 2017, pp. 192-198, doi: 10.1109/ICCONS.2017.8250708.

- L. Li, H. Feng, W. Zhuang, N. Meng, and B. Ryder: Cclearner: A deep learning-based clone detection approach,in Proc. IEEE Int. Conf. Softw. Maintenance Evol. (ICSME), Sep. 2017, pp. 249–260.

- Y. Semura, N. Yoshida, E. Choi, and K. Inoue : CCFinderSW: Clone detection tool with flexible multilingual tokenization, in Proc. 24th Asia–Pacific Softw. Eng. Conf. (APSEC), 2017, pp. 654–659.

- S. Kim, S. Woo, H. Lee, and H. Oh: VUDDY: A scalable approach for vulnerable code clone discovery, in Proc. IEEE Symp. Secur. Privacy (SP), May 2017, pp. 595–614.

- M. Wang, P. Wang, and Y. Xu : CCSharp: An efficient three-phase code clone detector using modified PDGs, in Proc. 24th Asia–Pacific Softw. Eng. Conf. (APSEC), 2017, pp. 100–109.

- A. Sheneamer, S. Roy, and J. Kalita: A detection framework for semantic code clones and obfuscated code, Expert Syst. Appl., vol. 97, pp. 405–420, May 2018.

- C. Ragkhitwetsagul and J. Krinke: Using compilation/decompilation to enhance clone detection, in Proc. IEEE 11th Int. Workshop Softw. Clone (IWSC), vol. 11, Feb. 2017, pp. 8–14.

- F. Lyu, Y. Lin, J. Yang, and J. Zhou: Suidroid: An efficient hardeningresilient approach to Android app clone detection, in Proc. IEEE Trustcom/BigDataSE/ISPA, Aug. 2016, pp. 511–518.

- N.Saini, S.Singh ,and Suman: Code clones: Detection and management, Procedia Computer Science 132:718-727,( January 2018).

- P. Wang, J. Svajlenko, Y. Wu, Y. Xu, and C. K. Roy: CCAligner: A token-based large-gap clone detector, in Proc. 40th Int. Conf. Softw. Eng., 2018, pp. 1066–1077.

- C. Ragkhitwetsagul, J. Krinke, and B. Marnette: A picture is worth a thousand words: Code clone detection based on image similarity, in Proc. IEEE 12th Int. Workshop Softw. Clones (IWSC), Mar. 2018, pp. 44–50.

- J. Akram, Z. Shi, M. Mumtaz, and P. Luo: DroidCC: A scalable clone detection approach for Android applications to detect similarity at a source code level, in Proc. IEEE 42nd Annu. Comput. Softw. Appl. Conf. (COMPSAC), Jul. 2018, pp. 100–105.

- M. Sudhamani and L. Rangarajan: Code clone detection based on order and content of control statements, in Proc. 2nd Int. Conf. Contemp. Comput. Inform. (IC3I), 2016, pp. 59–64.

- C. Fang, Z. Liu, Y. Shi, J. Huang, and Q. Shi: Functional code clone detection with syntax and semantics fusion learning, in ISSTA ’20: 29th ACM SIGSOFT International Symposium on Software Testing and Analysis, S. Khurshid and C. S. Pasareanu, Eds.NewYorkNYUnitedStates:ACM,2020, pp.516–527.

- Y. Golubev and T Bryksin: On the Nature of Code Cloning in Open-Source Java Projects, in IEEE 15th International Workshop on Software Clones (IWSC),2021.

- Y. Golubev, V. Poletansky, N. Povarov, and T. Bryksin: Multi-threshold token-based code clone detection,IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER), 2021, pp. 496-500, doi: 10.1109/SANER50967.2021.00053.

M. Kaur, S. Kaur, and B. Sohal: Review on Software Cloning and Clone Detection, International Journal of Control Theory and Applications 9(41):463-472,( December 2016).

- T. Kamiya, S. Kusumoto, and K. Inoue: Ccfinder: a multilinguistic token-based code clone detection system for large scale source code, Software Engineering, IEEE Transactions on, vol.28, no.7, pp.654–670, (Jul2002).

- E. Kodhai, S. Kanmani, A. Kamatchi, R. Radhika, and B. V. Saranya: Detection of type-1 and type-2 code clones using textual analysis and metrics, International Conference on Recent Trends in Information, Telecommunication and Computing, March 2010, pp. 241–243.

- P. Batta and M. Himanshi: Hybrid technique for software code clone detection. INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY , ISSN: 2277–3061,(April 2012).

- P.Charland, B. Fung and M.R. Farhadi: Clone Search for malicious code correlation. 2014, Retrieved from https://dmas.lab.mcgill.ca/fung/pub/CFF12ist.pdf .

- A. Sheneamer and J. Kalita: Code clone detection using coarse and finegrained hybrid approaches, in Proc. IEEE 7th Int. Conf. Intell. Comput. Inf. Syst. (ICICIS), Dec. 2015, pp. 472–480.

- S. Chodarev, E. Pietriková, and J. Kollár: Haskell clone detection using pattern comparing algorithm, in Proc. 13th Int. Conf. Eng. Mod. Electr. Syst. (EMES), Jun. 2015, pp. 1–4.

- Y. Yuki, Y. Higo, S. Kusumoto: A technique to detect multi-grained code clones. In Conference: IEEE 11th International Workshop on Software Clones (IWSC). 2017.

Similar Articles

<< < 4 5 6 7 8 9 10 11 12 13 > >> 

You may also start an advanced similarity search for this article.