Token-based code clone detector for Dart language

Main Article Content

Yasir Mohammed Khazaal
Asma’a Y. Hammo

Abstract

Reusing the code in multiple locations is called in software engineering Code Clone. Detection of a clone is important to reduce the maintenance time and size of code. There are four techniques to detect the code clone: text-based, token-based, AST(Abstract Syntax Tree) based, and PDG(Program Dependence Graph) based.


In this paper, we propose and implement the token-based method for code clone detection in the Dart language. The proposed method is evaluated by injecting clones to Dart programs. Results show that the proposed method detects all the injected codes.


fig1.jpg


Article Details

How to Cite
Khazaal, Y. M. ., & Hammo, A. Y. (2022). Token-based code clone detector for Dart language. Technium: Romanian Journal of Applied Sciences and Technology, 4(5), 77–82. https://doi.org/10.47577/technium.v4i5.6732
Section
Articles

References

L. LI, H. FENG, W. ZHUANG, N. MENG, AND B. RYDER: Cclearner: A deep learning-based clone detection approach.In: Proc. IEEE Int. Conf. Softw. Maintenance Evol. (ICSME), Sep. 2017, pp. 249–260.

Y. SEMURA, N. YOSHIDA, E. CHOI, AND K. INOUE : CCFinderSW: Clone detection tool with flexible multilingual tokenization.In: Proc. 24th Asia–Pacific Softw. Eng. Conf. (APSEC), 2017, pp. 654–659.

P. WANG, J. SVAJLENKO, Y. WU, Y. XU, AND C. K. ROY: CCAligner: A token-based large-gap clone detector.In: Proc. 40th Int. Conf. Softw. Eng., 2018, pp. 1066–1077.

Y. GOLUBEV, V. POLETANSKY, N. POVAROV, AND T. BRYKSIN: Multi-threshold token-based code clone detection.IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER), 2021, pp. 496-500, doi: 10.1109/SANER50967.2021.00053.

T. KAMIYA, S. KUSUMOTO, AND K. INOUE: Ccfinder: a multilinguistic token-based code clone detection system for large scale source code. Software Engineering, IEEE Transactions on, vol.28, no.7, pp.654–670, (Jul2002).

P.CHARLAND, B. FUNG AND M.R. FARHADI: Clone Search for malicious code correlation. 2014, Retrieved from https://dmas.lab.mcgill.ca/fung/pub/CFF12ist.pdf .

A. SHENEAMER AND J. KALITA: Code clone detection using coarse and finegrained hybrid approaches. In: Proc. IEEE 7th Int. Conf. Intell. Comput. Inf. Syst. (ICICIS), Dec. 2015, pp. 472–480.

J. SVAJLENKO AND C. K. ROY:The Mutation and Injection Framework: Evaluating Clone Detection Tools with Mutation Analysis.In: IEEE Transactions on Software Engineering, vol. 47, no. 5, pp. 1060-1087, doi: 10.1109/TSE.2019.2912962. (2021)

M .KAUR , S. KAUR, AND B. SOHAL :Review on Software Cloning and Clone Detection. International Journal of Control Theory and Applications, pp. 463-472. (2016)

Dart Programming Language Specification 6th edition draft Version 2.15-dev’’,(2022).

C.K ROY AND J. R. CORDY : A Survey on Software Clone Detection Research.Technical Report No. 2007-541, School of Computing Queen’s University at Kingston Ontario, Canada. arXiv:2107.04712 [cs.SE]. (2007).

Similar Articles

<< < 25 26 27 28 29 30 31 32 33 34 > >> 

You may also start an advanced similarity search for this article.