메뉴 건너뛰기




Volumn , Issue , 2009, Pages 117-127

Detecting code clones in binary executables

Author keywords

[No Author keywords available]

Indexed keywords

BINS; CLONING; CODES (SYMBOLS); SOFTWARE TESTING; TREES (MATHEMATICS); WINDOWS OPERATING SYSTEM;

EID: 85008263762     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1572272.1572287     Document Type: Conference Paper
Times cited : (151)

References (27)
  • 2
    • 85008252938 scopus 로고    scopus 로고
    • JPlag. http://www.jplag.de.
    • JPlag
  • 3
    • 85008247398 scopus 로고    scopus 로고
    • E2LSH: Exact Euclidean locality-sensitive hashing
    • A. Andoni and P. Indyk. E2LSH: Exact Euclidean locality-sensitive hashing. Web: http://www.mit.edu/~andoni/LSH/, 2004.
    • (2004) Web
    • Andoni, A.1    Indyk, P.2
  • 4
    • 37549058056 scopus 로고    scopus 로고
    • Near-optimal hashing algorithms for approximate nearest neighbor in high dimensions
    • A. Andoni and P. Indyk. Near-optimal hashing algorithms for approximate nearest neighbor in high dimensions. Commun. ACM, 51(1):117-122, 2008.
    • (2008) Commun. ACM , vol.51 , Issue.1 , pp. 117-122
    • Andoni, A.1    Indyk, P.2
  • 5
    • 0013238532 scopus 로고    scopus 로고
    • Parameterized duplication in strings: Algorithms and an application to software maintenance
    • B. S. Baker. Parameterized duplication in strings: Algorithms and an application to software maintenance. SIAM J. Comput., 26(5):1343-1362, 1997.
    • (1997) SIAM J. Comput , vol.26 , Issue.5 , pp. 1343-1362
    • Baker, B.S.1
  • 6
    • 32344438117 scopus 로고    scopus 로고
    • Detecting higher-level similarity patterns in programs
    • H. A. Basit and S. Jarzabek. Detecting higher-level similarity patterns in programs. In ESEC/FSE-13, pages 156-165, 2005.
    • (2005) ESEC/FSE-13 , pp. 156-165
    • Basit, H.A.1    Jarzabek, S.2
  • 7
    • 4544229973 scopus 로고    scopus 로고
    • DMS R: Program transformations for practical scalable software evolution
    • I. D. Baxter, C. Pidgeon, and M. Mehlich. DMS R: Program transformations for practical scalable software evolution. In ICSE, pages 625-634, 2004.
    • (2004) ICSE , pp. 625-634
    • Baxter, I.D.1    Pidgeon, C.2    Mehlich, M.3
  • 8
    • 33746406796 scopus 로고    scopus 로고
    • Detecting self-mutating malware using control ow graph matching
    • D. Bruschi, L. Martignoni, and M. Monga. Detecting self-mutating malware using control ow graph matching. In DIMVA, pages 129-143, 2006.
    • (2006) DIMVA , pp. 129-143
    • Bruschi, D.1    Martignoni, L.2    Monga, M.3
  • 12
    • 57349194546 scopus 로고    scopus 로고
    • Scalable detection of semantic clones
    • M. Gabel, L. Jiang, and Z. Su. Scalable detection of semantic clones. In ICSE, pages 321-330, 2008.
    • (2008) ICSE , pp. 321-330
    • Gabel, M.1    Jiang, L.2    Su, Z.3
  • 13
    • 0001944742 scopus 로고    scopus 로고
    • Similarity search in high dimensions via hashing
    • San Francisco, CA, USA, Morgan Kaufmann Publishers Inc
    • A. Gionis, P. Indyk, and R. Motwani. Similarity search in high dimensions via hashing. In Very Large Data Bases, pages 518-529, San Francisco, CA, USA, 1999. Morgan Kaufmann Publishers Inc.
    • (1999) Very Large Data Bases , pp. 518-529
    • Gionis, A.1    Indyk, P.2    Motwani, R.3
  • 15
    • 0031644241 scopus 로고    scopus 로고
    • Approximate nearest neighbors: Towards removing the curse of dimensionality
    • ACM
    • P. Indyk and R. Motwani. Approximate nearest neighbors: towards removing the curse of dimensionality. In ACM Symposium on Theory of Computing, pages 604-613. ACM, 1998.
    • (1998) ACM Symposium on Theory of Computing , pp. 604-613
    • Indyk, P.1    Motwani, R.2
  • 16
    • 34548767669 scopus 로고    scopus 로고
    • Deckard: Scalable and accurate tree-based detection of code clones
    • L. Jiang, G. Misherghi, Z. Su, and S. Glondu. Deckard: Scalable and accurate tree-based detection of code clones. In ICSE, pages 96-105, 2007.
    • (2007) ICSE , pp. 96-105
    • Jiang, L.1    Misherghi, G.2    Su, Z.3    Glondu, S.4
  • 17
    • 0036648690 scopus 로고    scopus 로고
    • CCFinder: A multilinguistic token-based code clone detection system for large scale source code
    • T. Kamiya, S. Kusumoto, and K. Inoue. CCFinder: a multilinguistic token-based code clone detection system for large scale source code. IEEE Trans. Softw. Eng., 28(7):654-670, 2002.
    • (2002) IEEE Trans. Softw. Eng , vol.28 , Issue.7 , pp. 654-670
    • Kamiya, T.1    Kusumoto, S.2    Inoue, K.3
  • 18
    • 84890052317 scopus 로고    scopus 로고
    • Using slicing to identify duplication in source code
    • London, UK, Springer-Verlag
    • R. Komondoor and S. Horwitz. Using slicing to identify duplication in source code. In Symposium on Static Analysis, pages 40-56, London, UK, 2001. Springer-Verlag.
    • (2001) Symposium on Static Analysis , pp. 40-56
    • Komondoor, R.1    Horwitz, S.2
  • 19
    • 33746389292 scopus 로고    scopus 로고
    • Polymorphic worm detection using structural information of executables
    • Springer-Verlag
    • C. Kruegel, D. Mutz, W. Robertson, and G. Vigna. Polymorphic worm detection using structural information of executables. In Recent Adv. in Intrusion Detection, pages 207-226. Springer-Verlag, 2005.
    • (2005) Recent Adv. in Intrusion Detection , pp. 207-226
    • Kruegel, C.1    Mutz, D.2    Robertson, W.3    Vigna, G.4
  • 20
    • 84910009447 scopus 로고    scopus 로고
    • CP-Miner: A tool for finding copy-paste and related bugs in operating system code
    • Z. Li, S. Lu, S. Myagmar, and Y. Zhou. CP-Miner: a tool for finding copy-paste and related bugs in operating system code. In OSDI, pages 20-20, 2004.
    • (2004) OSDI , pp. 20
    • Li, Z.1    Lu, S.2    Myagmar, S.3    Zhou, Y.4
  • 21
    • 1142267351 scopus 로고    scopus 로고
    • Winnowing: Local algorithms for document fingerprinting
    • S. Schleimer, D. S. Wilkerson, and A. Aiken. Winnowing: Local algorithms for document fingerprinting. In Management of Data, pages 76-85, 2003.
    • (2003) Management of Data , pp. 76-85
    • Schleimer, S.1    Wilkerson, D.S.2    Aiken, A.3
  • 22
    • 32844461721 scopus 로고    scopus 로고
    • A source-to-source architecture for user-defined optimizations
    • 2789 of Lecture Notes in Computer Science, Springer Verlag, Aug
    • M. Schordan and D. Quinlan. A source-to-source architecture for user-defined optimizations. In Joint Modular Languages Conference, volume 2789 of Lecture Notes in Computer Science, pages 214-223. Springer Verlag, Aug. 2003.
    • (2003) Joint Modular Languages Conference , pp. 214-223
    • Schordan, M.1    Quinlan, D.2
  • 23
    • 77953978582 scopus 로고    scopus 로고
    • A dynamic birthmark for Java
    • New York, NY, USA, ACM
    • D. Schuler, V. Dallmeier, and C. Lindig. A dynamic birthmark for Java. In ASE07, pages 274-283, New York, NY, USA, 2007. ACM.
    • (2007) ASE07 , pp. 274-283
    • Schuler, D.1    Dallmeier, V.2    Lindig, C.3
  • 24
    • 23844480424 scopus 로고    scopus 로고
    • Finding binary clones with opstrings and function digests
    • A. Schulman. Finding binary clones with opstrings and function digests. Doctor Dobb's J, 30(9):64-70, 2005.
    • (2005) Doctor Dobb's J , vol.30 , Issue.9 , pp. 64-70
    • Schulman, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.