A Novel Vulnerable Code Clone Detector Based on Context Enhancement and Patch Validation
نویسندگان
چکیده
With the rapid growth of open-source software, code cloning has become increasingly prevalent. If there are security vulnerabilities in a cloned segment, those may spread related software to potentially lead incidents. The existing methods vulnerable detection performed on condition that source is converted into an intermediate representation. However, these do not fully consider rich semantic knowledge and patch information available for codes, which can induce high false positive rate (FPR). To address this problem, paper proposes clone method based fingerprints, named Context-enhanced Patch-validation-based Vulnerable Detector (CPVDetector). A fingerprint database built functions, snippets, patches derived from preprocessed code. target be detected firstly transformed function-level fingerprints. fails at coarse granularity, detector then applied finer line-level granularity. When matching successful between segments, will proceed verify context codes. Finally, CPVDetector fingerprints corresponding codes further reduce FPR. Based generally accepted classification clones, identify Type 1 2 clones coarse-grained level offers significantly improved sensitivity 3 4 fine-grained level. Experimental results show proposed achieve accuracy with fast speed, FPR as low 2.35%, less than one-third other methods. In view its competitive performance efficiency, large-scale scenarios.
منابع مشابه
A Novel Patch-Based Digital Signature
In this paper a new patch-based digital signature (DS) is proposed. The proposed approach similar to steganography methods hides the secure message in a host image. However, it uses a patch-based key to encode/decode the data like cryptography approaches. Both the host image and key patches are randomly initialized. The proposed approach consists of encoding and decoding algorithms. The encodin...
متن کاملParallel Clone Code Detector in MapReduce
Programmers often copy code to improve efficiency, and different developers may write the same code independently, these behaviors bring clone code to the project. Clone code makes the project hard to maintain and weakens the robustness, and the bugs in these code segments would undermine the whole project. The state-of-the-art clone code detectors are either not able to find code with same sem...
متن کاملconstruction and validation of a computerized adaptive translation test (a receptive based study)
آزمون انطباقی رایانه ای (cat) روشی نوین برای سنجش سطح علمی دانش آموزان می باشد. در حقیقت آزمون های رایانه ای با سرعت بالایی به سمت و سوی جایگزین عملی برای آزمون های کاغذی می روند (کینگزبری، هاوسر، 1993). مقاله حاضر به دنبال آزمون انطباقی رایانه ای برای ترجمه می باشد. بدین منظور دو پرسشنامه مشتمل بر 55 تست ترجمه میان 102 آزمودنی و 10 مدرس زبان انگلیسی پخش گردید. پرسشنامه اول میان 102 دانشجوی س...
A Novel Metrics Based Technique for Code Clone Detection
Nowadays, software development is a tricky and time-consuming task. In order to make the development easy, one uses the existing modules with or without a bit change. Modules which are used with or without changes are called as code clones. In several places in case of same or different software, a clone can be used for development purpose. Without having care, copy and paste code can lead to i...
متن کاملRefactoring Support Based on Code Clone Analysis
Software maintenance is the most expensive activity in software development. Many software companies spent a large amount of cost to maintain the existing software systems. In perfective maintenance, refactoring has often been applied to the software to improve the understandability and complexity. One of the targets of refactoring is code clone. A code clone is a code fragment in a source code...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Wireless Communications and Mobile Computing
سال: 2022
ISSN: ['1530-8669', '1530-8677']
DOI: https://doi.org/10.1155/2022/3822836