-
4
-
-
0039528117
-
A program for identifying duplicated code
-
B. Baker. A program for identifying duplicated code. Computing Science and Statistics, pages 49-49, 1993.
-
(1993)
Computing Science and Statistics
, pp. 49
-
-
Baker, B.1
-
5
-
-
0029222025
-
On finding duplication and near-duplication in large software systems
-
IEEE 1995
-
B. S. Baker. On finding duplication and near-duplication in large software systems. In Reverse Engineering, 1995., pages 86-95. IEEE, 1995.
-
(1995)
Reverse Engineering
, pp. 86-95
-
-
Baker, B.S.1
-
6
-
-
0032311601
-
Clone detection using abstract syntax trees
-
I. Baxter, A. Yahin, L. Moura, M. Sant'Anna, and L. Bier. Clone detection using abstract syntax trees. In icsm, pages 368-377, 1998.
-
(1998)
Icsm
, pp. 368-377
-
-
Baxter, I.1
Yahin, A.2
Moura, L.3
Sant'Anna, M.4
Bier, L.5
-
9
-
-
84865590234
-
Attack of the clones: Detecting cloned applications on android markets
-
J. Crussell, C. Gibler, and H. Chen. Attack of the clones: Detecting cloned applications on android markets. Computer Security-ESORICS 2012, pages 37-54, 2012.
-
(2012)
Computer Security-ESORICS 2012
, pp. 37-54
-
-
Crussell, J.1
Gibler, C.2
Chen, H.3
-
10
-
-
84978244413
-
Scalable semantics-based detection of similar android applications
-
J. Crussell, C. Gibler, and H. Chen. Scalable semantics-based detection of similar android applications. In ESORICS, 2013.
-
(2013)
ESORICS
-
-
Crussell, J.1
Gibler, C.2
Chen, H.3
-
11
-
-
84994193210
-
-
Dangle Dangle
-
Dangle. Dangle. http: //android. d. cn, 2013.
-
(2013)
-
-
-
12
-
-
0023385308
-
The program dependence graph and its use in optimization
-
J. Ferrante, K. J. Ottenstein, and J. D. Warren. The program dependence graph and its use in optimization. ACM Transactions on Programming Languages and Systems (TOPLAS), 9 (3): 319-349, 1987.
-
(1987)
ACM Transactions on Programming Languages and Systems (TOPLAS)
, vol.9
, Issue.3
, pp. 319-349
-
-
Ferrante, J.1
Ottenstein, K.J.2
Warren, J.D.3
-
14
-
-
78650078104
-
Scalable and systematic detection of buggy inconsistencies in source code
-
ACM
-
M. Gabel, J. Yang, Y. Yu, M. Goldszmidt, and Z. Su. Scalable and systematic detection of buggy inconsistencies in source code. In ACM Sigplan Notices, volume 45, pages 175-190. ACM, 2010.
-
(2010)
ACM Sigplan Notices
, vol.45
, pp. 175-190
-
-
Gabel, M.1
Yang, J.2
Yu, Y.3
Goldszmidt, M.4
Su, Z.5
-
15
-
-
84881131952
-
Adrob: Examining the landscape and impact of android application plagiarism
-
C. Gibler, R. Stevens, J. Crussell, H. Chen, H. Zang, and H. Choi. Adrob: Examining the landscape and impact of android application plagiarism. In MobiSys, 2013.
-
(2013)
MobiSys
-
-
Gibler, C.1
Stevens, R.2
Crussell, J.3
Chen, H.4
Zang, H.5
Choi, H.6
-
16
-
-
84880748643
-
-
Google. Google play. https: //play. google. com/store, 2013.
-
(2013)
Google Play
-
-
-
17
-
-
84888999727
-
Juxtapp: A scalable system for detecting code reuse among android applications
-
S. Hanna, L. Huang, E. Wu, S. Li, C. Chen, and D. Song. Juxtapp: A scalable system for detecting code reuse among android applications. In Proceedings of the 9th Conference on Detection of Intrusions and Malware & Vulnerability Assessment, 2012.
-
(2012)
Proceedings of the 9th Conference on Detection of Intrusions and Malware & Vulnerability Assessment
-
-
Hanna, S.1
Huang, L.2
Wu, E.3
Li, S.4
Chen, C.5
Song, D.6
-
18
-
-
84976825385
-
Algorithms for the longest common subsequence problem
-
D. S. Hirschberg. Algorithms for the longest common subsequence problem. Journal of the ACM (JACM), 24 (4): 664-675, 1977.
-
(1977)
Journal of the ACM (JACM)
, vol.24
, Issue.4
, pp. 664-675
-
-
Hirschberg, D.S.1
-
19
-
-
79959902968
-
Value-based program characterization and its application to software plagiarism detection
-
ACM
-
Y.-C. Jhi, X. Wang, X. Jia, S. Zhu, P. Liu, and D. Wu. Value-based program characterization and its application to software plagiarism detection. In Proceedings of the 33rd International Conference on Software Engineering, pages 756-765. ACM, 2011.
-
(2011)
Proceedings of the 33rd International Conference on Software Engineering
, pp. 756-765
-
-
Jhi, Y.-C.1
Wang, X.2
Jia, X.3
Zhu, S.4
Liu, P.5
Wu, D.6
-
20
-
-
34548767669
-
Deckard: Scalable and accurate tree-based detection of code clones
-
IEEE Computer Society
-
L. Jiang, G. Misherghi, Z. Su, and S. Glondu. Deckard: Scalable and accurate tree-based detection of code clones. In Proceedings of the 29th international conference on Software Engineering, pages 96-105. IEEE Computer Society, 2007.
-
(2007)
Proceedings of the 29th International Conference on Software Engineering
, pp. 96-105
-
-
Jiang, L.1
Misherghi, G.2
Su, Z.3
Glondu, S.4
-
21
-
-
73449090740
-
Do code clones matter?
-
IEEE Computer Society
-
E. Juergens, F. Deissenboeck, B. Hummel, and S. Wagner. Do code clones matter? In Proceedings of the 31st International Conference on Software Engineering, pages 485-495. IEEE Computer Society, 2009.
-
(2009)
Proceedings of the 31st International Conference on Software Engineering
, pp. 485-495
-
-
Juergens, E.1
Deissenboeck, F.2
Hummel, B.3
Wagner, S.4
-
22
-
-
0036648690
-
Ccfinder: A multilinguistic token-based code clone detection system for large scale source code
-
T. Kamiya, S. Kusumoto, and K. Inoue. Ccfinder: a multilinguistic token-based code clone detection system for large scale source code. Software Engineering, IEEE Transactions on, 28 (7): 654-670, 2002.
-
(2002)
Software Engineering, IEEE Transactions on
, vol.28
, Issue.7
, pp. 654-670
-
-
Kamiya, T.1
Kusumoto, S.2
Inoue, K.3
-
23
-
-
79959862704
-
Mecc: Memory comparison-based clone detector
-
IEEE
-
H. Kim, Y. Jung, S. Kim, and K. Yi. Mecc: memory comparison-based clone detector. In Software Engineering (ICSE), 2011 33rd International Conference on, pages 301-310. IEEE, 2011.
-
(2011)
Software Engineering (ICSE), 2011 33rd International Conference on
, pp. 301-310
-
-
Kim, H.1
Jung, Y.2
Kim, S.3
Yi, K.4
-
24
-
-
84994068934
-
A program plagiarism evaluation system
-
Y.-C. Kim and J. Choi. A program plagiarism evaluation system. ICCSA, pages 221-223, 2005.
-
(2005)
ICCSA
, pp. 221-223
-
-
Kim, Y.-C.1
Choi, J.2
-
25
-
-
84890052317
-
Using slicing to identify duplication in source code
-
R. Komondoor and S. Horwitz. Using slicing to identify duplication in source code. Static Analysis, pages 40-56, 2001.
-
(2001)
Static Analysis
, pp. 40-56
-
-
Komondoor, R.1
Horwitz, S.2
-
26
-
-
78751519375
-
Instant code clone search
-
ACM
-
M.-W. Lee, J.-W. Roh, S.-w. Hwang, and S. Kim. Instant code clone search. In Proceedings of the eighteenth ACM SIGSOFT international symposium on Foundations of software engineering, pages 167-176. ACM, 2010.
-
(2010)
Proceedings of the Eighteenth ACM SIGSOFT International Symposium on Foundations of Software Engineering
, pp. 167-176
-
-
Lee, M.-W.1
Roh, J.-W.2
Hwang, S.-W.3
Kim, S.4
-
28
-
-
84910009447
-
Cp-miner: A tool for finding copy-paste and related bugs in operating system code
-
Z. Li, S. Lu, S. Myagmar, and Y. Zhou. Cp-miner: A tool for finding copy-paste and related bugs in operating system code. In Proceedings of the 6th conference on Symposium on Opearting Systems Design & Implementation, volume 6, pages 20-20, 2004.
-
(2004)
Proceedings of the 6th Conference on Symposium on Opearting Systems Design & Implementation
, vol.6
, pp. 20
-
-
Li, Z.1
Lu, S.2
Myagmar, S.3
Zhou, Y.4
-
29
-
-
33645819206
-
Cp-miner: Finding copy-paste and related bugs in large-scale software code
-
Z. Li, S. Lu, S. Myagmar, and Y. Zhou. Cp-miner: Finding copy-paste and related bugs in large-scale software code. IEEE Transactions on Software Engineering, pages 176-192, 2006.
-
(2006)
IEEE Transactions on Software Engineering
, pp. 176-192
-
-
Li, Z.1
Lu, S.2
Myagmar, S.3
Zhou, Y.4
-
30
-
-
67649306203
-
A method for detecting the theft of Java programs through analysis of the control flow information
-
H.-I. Lim, H. Park, S. Choi, and T. Han. A method for detecting the theft of Java programs through analysis of the control flow information. Information and Software Technology, 51 (9): 1338-1350, 2009.
-
(2009)
Information and Software Technology
, vol.51
, Issue.9
, pp. 1338-1350
-
-
Lim, H.-I.1
Park, H.2
Choi, S.3
Han, T.4
-
31
-
-
33749559863
-
Gplag: Detection of software plagiarism by program dependence graph analysis
-
C. Liu, C. Chen, J. Han, and P. Yu. Gplag: detection of software plagiarism by program dependence graph analysis. In SIGKDD, pages 872-881, 2006.
-
(2006)
SIGKDD
, pp. 872-881
-
-
Liu, C.1
Chen, C.2
Han, J.3
Yu, P.4
-
32
-
-
84864228835
-
Detecting similar software applications
-
IEEE
-
C. McMillan, M. Grechanik, and D. Poshyvanyk. Detecting similar software applications. In Software Engineering (ICSE), 2012 34th International Conference on, pages 364-374. IEEE, 2012.
-
(2012)
Software Engineering (ICSE), 2012 34th International Conference on
, pp. 364-374
-
-
McMillan, C.1
Grechanik, M.2
Poshyvanyk, D.3
-
33
-
-
35048854764
-
Detecting software theft via whole program path birthmarks
-
G. Myles and C. Collberg. Detecting software theft via whole program path birthmarks. Information security, pages 404-415, 2004.
-
(2004)
Information Security
, pp. 404-415
-
-
Myles, G.1
Collberg, C.2
-
35
-
-
85081771834
-
Retargeting android applications to Java bytecode
-
ACM
-
D. Octeau, S. Jha, and P. McDaniel. Retargeting android applications to Java bytecode. In FSE, page 6. ACM, 2012.
-
(2012)
FSE
, pp. 6
-
-
Octeau, D.1
Jha, S.2
McDaniel, P.3
-
36
-
-
84994160971
-
-
Opera. Opera software. http: //apps. opera. com, 2013.
-
(2013)
Opera Software
-
-
-
38
-
-
78649770545
-
Detection of recurring software vulnerabilities
-
ACM
-
N. H. Pham, T. T. Nguyen, H. A. Nguyen, and T. N. Nguyen. Detection of recurring software vulnerabilities. In Proceedings of the IEEE/ACM international conference on Automated software engineering, pages 447-456. ACM, 2010.
-
(2010)
Proceedings of the IEEE/ACM International Conference on Automated Software Engineering
, pp. 447-456
-
-
Pham, N.H.1
Nguyen, T.T.2
Nguyen, H.A.3
Nguyen, T.N.4
-
44
-
-
26444481301
-
Design and evaluation of birthmarks for detecting theft of Java programs
-
H. Tamada, M. Nakamura, A. Monden, and K.-I. Matsumoto. Design and evaluation of birthmarks for detecting theft of Java programs. In Proc. IASTED International Conference on Software Engineering (IASTED SE 2004), pages 569-575, 2004.
-
(2004)
Proc. IASTED International Conference on Software Engineering (IASTED SE)
, pp. 569-575
-
-
Tamada, H.1
Nakamura, M.2
Monden, A.3
Matsumoto, K.-I.4
-
45
-
-
74049126356
-
Design and evaluation of dynamic software birthmarks based on api calls
-
H. Tamada, K. Okamoto, M. Nakamura, A. Monden, and K. Ichi Matsumoto. Design and evaluation of dynamic software birthmarks based on api calls. Info. Science Technical Report NAIST-IS-TR2007011, ISSN, pages 0919-9527, 2007.
-
(2007)
Info. Science Technical Report NAIST-IS-TR2007011
-
-
Tamada, H.1
Okamoto, K.2
Nakamura, M.3
Monden, A.4
Ichi Matsumoto, K.5
-
46
-
-
38349021089
-
Dynamic software birthmarks to detect the theft of windows applications
-
H. Tamada, K. Okamoto, M. Nakamura, A. Monden, and K.-I. Matsumoto. Dynamic software birthmarks to detect the theft of windows applications. In International Symposium on Future Software Technology, volume 2004, 2004.
-
(2004)
International Symposium on Future Software Technology
, vol.2004
-
-
Tamada, H.1
Okamoto, K.2
Nakamura, M.3
Monden, A.4
Matsumoto, K.-I.5
-
47
-
-
10444242292
-
Static analysis of students' Java programs
-
Australian Computer Society, Inc
-
N. Truong, P. Roe, and P. Bancroft. Static analysis of students' Java programs. In Proceedings of the Sixth Australasian Conference on Computing Education-Volume 30, pages 317-325. Australian Computer Society, Inc., 2004.
-
(2004)
Proceedings of the Sixth Australasian Conference on Computing Education
, vol.30
, pp. 317-325
-
-
Truong, N.1
Roe, P.2
Bancroft, P.3
-
48
-
-
74049163233
-
Behavior based software theft detection
-
ACM
-
X. Wang, Y.-C. Jhi, S. Zhu, and P. Liu. Behavior based software theft detection. In Proceedings of the 16th ACM conference on Computer and communications security, pages 280-290. ACM, 2009.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security
, pp. 280-290
-
-
Wang, X.1
Jhi, Y.-C.2
Zhu, S.3
Liu, P.4
-
49
-
-
84994118607
-
-
Wikipedia. Structured programming. http: //en. wikipedia.org/wiki/Structured programming, 2012.
-
(2012)
Structured Programming
-
-
-
50
-
-
0026185673
-
Identifying syntactic differences between two programs
-
W. Yang. Identifying syntactic differences between two programs. Software: Practice and Experience, 21 (7): 739-755, 2006.
-
(2006)
Software: Practice and Experience
, vol.21
, Issue.7
, pp. 739-755
-
-
Yang, W.1
-
51
-
-
84865283994
-
A first step towards algorithm plagiarism detection
-
ACM
-
F. Zhang, Y.-C. Jhi, D. Wu, P. Liu, and S. Zhu. A first step towards algorithm plagiarism detection. In Proceedings of the 2012 International Symposium on Software Testing and Analysis, pages 111-121. ACM, 2012.
-
(2012)
Proceedings of the 2012 International Symposium on Software Testing and Analysis
, pp. 111-121
-
-
Zhang, F.1
Jhi, Y.-C.2
Wu, D.3
Liu, P.4
Zhu, S.5
-
52
-
-
84874828789
-
Fast, scalable detection of piggybacked mobile applications
-
ACM
-
W. Zhou, Y. Zhou, M. Grace, X. Jiang, and S. Zou. Fast, scalable detection of piggybacked mobile applications. In CODASPY, pages 185-196. ACM, 2013.
-
(2013)
CODASPY
, pp. 185-196
-
-
Zhou, W.1
Zhou, Y.2
Grace, M.3
Jiang, X.4
Zou, S.5
-
53
-
-
85137132511
-
Detecting repackaged smartphone applications in third-party android marketplaces
-
ACM
-
W. Zhou, Y. Zhou, X. Jiang, and P. Ning. Detecting repackaged smartphone applications in third-party android marketplaces. In CODASPY, pages 317-326. ACM, 2012.
-
(2012)
CODASPY
, pp. 317-326
-
-
Zhou, W.1
Zhou, Y.2
Jiang, X.3
Ning, P.4
|