2020 IEEE 14th International Workshop on Software Clones (IWSC) 2020
DOI: 10.1109/iwsc50091.2020.9047638
|View full text |Cite
|
Sign up to set email alerts
|

Twin-Finder: Integrated Reasoning Engine for Pointer-Related Code Clone Detection

Abstract: Detecting similar code fragments, usually referred to as code clones, is an important task. In particular, code clone detection can have significant uses in the context of vulnerability discovery, refactoring and plagiarism detection. However, false positives are inevitable and always require manual reviews. In this paper, we propose Twin-Finder+, a novel closed-loop approach for pointerrelated code clone detection that integrates machine learning and symbolic execution techniques to achieve precision. Twin-Fi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 36 publications
0
3
0
Order By: Relevance
“…Techniques like CCFinder [11], VUDDY [12], SeClone [13], TwinFinder [14], Deckard [15] have high complexities in terms of usage of memory and processing power.…”
Section: Runtime Complexitymentioning
confidence: 99%
See 1 more Smart Citation
“…Techniques like CCFinder [11], VUDDY [12], SeClone [13], TwinFinder [14], Deckard [15] have high complexities in terms of usage of memory and processing power.…”
Section: Runtime Complexitymentioning
confidence: 99%
“…For reducing false positives TwinFinder uses a feedback loop for formal loops to tune the machine learning algorithm. It lays special focus on false positives and was able to eliminate 99.32, 89 & 86.74% of false positives in bzip2, thttpd & Links respectively [14].…”
Section: Latest Work On Code Clone Detectionmentioning
confidence: 99%
“…Learning-based approach for vulnerability removal: Prior work has studied bug/vulnerabilities removal using learning-based approaches. StatSym [44,46] and SARRE [15] propose frameworks combining statistical and formal analysis for vulnerable path discovery. SIMBER [40] proposes a statistical inference framework to eliminate redundant bound checks and improve the performance of applications without sacrificing security.…”
Section: Related Workmentioning
confidence: 99%
“…Hongfa Xue, et.al (2020) designed a new closed-loop known as Twin-Finder with the purpose of detecting the pointer-related code clone [26]. In this approach, the ML (Machine Learning) was put together with the symbolic execution methods for attaining precision.…”
mentioning
confidence: 99%