scispace - formally typeset
Open AccessJournal ArticleDOI

A Survey of Software Clone Detection Techniques

Abdullah Sheneamer, +1 more
- 17 Mar 2016 - 
- Vol. 137, Iss: 10, pp 1-21
Reads0
Chats0
TLDR
In this study, code clones, common types of clones, phases of clone detection, the state-ofthe-art in code clone detection techniques and tools, and challenges faced byclone detection techniques are discussed.
Abstract
If two fragments of source code are identical or similar to each other, they are called code clones. Code clones introduce difficulties in software maintenance and cause bug propagation. Software clones occur due to several reasons such as code reuse by copying pre-existing fragments, coding style, and repeated computation using duplicated functions with slight changes in variables or data structures used. If a code fragment is edited, it will have to be checked against all related code clones to see if they need to be modified as well. Removal, avoidance or refactoring of cloned code are other important issues in software maintenance. However, several research studies have demonstrated that removal or refactoring of cloned code is sometimes harmful. In this study, code clones, common types of clones, phases of clone detection, the state-ofthe-art in code clone detection techniques and tools, and challenges faced by clone detection techniques are discussed.

read more

Content maybe subject to copyright    Report

Citations
More filters

Clone Detection in Automotive Model-Based Development.

TL;DR: In this paper, the authors present an approach for the automatic detection of clones in large models as they are used in model-based development of control systems, which can be applied to most graphical data-flow languages.
Proceedings ArticleDOI

Oreo: detection of clones in the twilight zone

TL;DR: Ore is presented, a novel approach to source code clone detection that not only detects Type-1 to Type-3 clones accurately, but is also capable of detecting harder-to-detect clones in the Twilight Zone.
Proceedings ArticleDOI

Oreo: Detection of Clones in the Twilight Zone

TL;DR: In this article, the authors present Oreo, a novel approach to source code clone detection that not only detects Type-1 to Type-3 clones accurately, but is also capable of detecting harder-to-detect clones in the Twilight Zone.
Journal ArticleDOI

Code smells and refactoring: A tertiary systematic review of challenges and observations

TL;DR: In this article, the authors present a tertiary systematic literature review of previous surveys, secondary systematic literature reviews, and systematic mappings on code smells and refactoring, and identify the main observations (what we know) and challenges (What we do not know) on code smell and reusability.
References
More filters
Book

Data Mining: Concepts and Techniques

TL;DR: This book presents dozens of algorithms and implementation examples, all in pseudo-code and suitable for use in real-world, large-scale data mining projects, and provides a comprehensive, practical look at the concepts and techniques you need to get the most out of real business data.
Journal ArticleDOI

Identification of common molecular subsequences.

TL;DR: This letter extends the heuristic homology algorithm of Needleman & Wunsch (1970) to find a pair of segments, one from each of two long sequences, such that there is no other Pair of segments with greater similarity (homology).
Proceedings Article

The MD5 Message-Digest Algorithm

TL;DR: This document describes the MD5 message-digest algorithm, which takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input.
Related Papers (5)