2014 14th International Conference on Quality Software 2014
DOI: 10.1109/qsic.2014.28
|View full text |Cite
|
Sign up to set email alerts
|

A Method to Evaluate CFG Comparison Algorithms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0
1

Year Published

2016
2016
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 19 publications
(6 citation statements)
references
References 22 publications
0
5
0
1
Order By: Relevance
“…Since each concrete similarity algorithm exploits graph characteristics for a field-specific problem, we selected algorithms which have already shown to be effective for software security research. Algorithms used for graph similarity problems in the software context are close to our hardware applications (e.g., Trojan detection and reverse engineering), see Chan et al [18] or Hu et al [9].…”
Section: Discussionmentioning
confidence: 99%
See 3 more Smart Citations
“…Since each concrete similarity algorithm exploits graph characteristics for a field-specific problem, we selected algorithms which have already shown to be effective for software security research. Algorithms used for graph similarity problems in the software context are close to our hardware applications (e.g., Trojan detection and reverse engineering), see Chan et al [18] or Hu et al [9].…”
Section: Discussionmentioning
confidence: 99%
“…Third, graph similarity is computed ( -). Note that the original algorithm computed an approximation of the graph edit distance and not a similarity score, Chan et al [18] defined a formula to compute this value for a given edit distance . The computational complexity of the graph edit distance approximation is OððjV 1 j þ jV 2 jÞ 6 Þ since the Hungarian method can be implemented with OðjV j 3 Þ.…”
Section: Algorithm 1 Graph Edit Distance Approximationmentioning
confidence: 99%
See 2 more Smart Citations
“…Под сопоставлением здесь понимается присвоение этим узлам одинаковых меток, уникальных в рамках каждого графа. Некоторые другие подходы к сравнению графов рассматриваются в [31]. Там же предлагается методология для оценки различных способов сравнения графов потока управления.…”
Section: похожесть графов потока управленияunclassified