ログイン
Language:

WEKO3

  • トップ
  • ランキング
To
lat lon distance
To

Field does not validate



インデックスリンク

インデックスツリー

メールアドレスを入力してください。

WEKO

One fine body…

WEKO

One fine body…

アイテム

  1. 学術雑誌論文
  2. 5 技術(工学)

A Survey of Software Clone Detection From Security Perspective

http://hdl.handle.net/10228/0002000803
http://hdl.handle.net/10228/0002000803
47719192-a02b-4156-8572-78edafd929a7
名前 / ファイル ライセンス アクション
10435528.pdf 10435528.pdf (2.5 MB)
アイテムタイプ 学術雑誌論文 = Journal Article(1)
公開日 2024-06-19
資源タイプ
資源タイプ識別子 http://purl.org/coar/resource_type/c_6501
資源タイプ journal article
タイトル
タイトル A Survey of Software Clone Detection From Security Perspective
言語 en
言語
言語 eng
著者 張, 海波

× 張, 海波

WEKO 35483
Scopus著者ID 57211858936
ORCiD 0000-0002-4275-405X
九工大研究者情報 100001768

ja 張, 海波

en Zhang, Haibo


Search repository
Sakurai, Kouichi

× Sakurai, Kouichi

en Sakurai, Kouichi

Search repository
抄録
内容記述タイプ Abstract
内容記述 For software engineering, if two code fragments are closely similar with minor modifications or even identical due to a copy-paste behavior, that is called software/code clone. Code clones can cause trouble in software maintenance and debugging process because identifying all copied compromised code fragments in other locations is time-consuming. Researchers have been working on code clone detection issues for a long time, and the discussion mainly focuses on software engineering management and system maintenance. Another considerable issue is that code cloning provides an easy way to attackers for malicious code injection. A thorough survey work of code clone identification/detection from the security perspective is indispensable for providing a comprehensive review of existing related works and proposing future potential research directions. This paper can satisfy above requirements. We review and introduce existing security-related works following three different classifications and various comparison criteria. We then discuss three further research directions, (i) deep learning-based code clone vulnerability detection, (ii) vulnerable code clone detection for 5G-Internet of Things devices, and (iii) real-time detection methods for more efficiently detecting clone attacks. These methods are more advanced and adaptive to technological development than current technologies, and still have enough research space for future studies.
言語 en
書誌情報 en : IEEE Access

巻 9, p. 48157-48173, 発行日 2021-03-15
出版社
出版者 IEEE
DOI
識別子タイプ DOI
関連識別子 https://doi.org/10.1109/ACCESS.2021.3065872
ISSN
収録物識別子タイプ EISSN
収録物識別子 2169-3536
著作権関連情報
権利情報Resource https://creativecommons.org/licenses/by/4.0/
権利情報 This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
出版タイプ
出版タイプ VoR
出版タイプResource http://purl.org/coar/version/c_970fb48d4fbd8a85
査読の有無
値 yes
研究者情報
URL https://hyokadb02.jimu.kyutech.ac.jp/html/100001768_ja.html
論文ID(連携)
値 10435528
連携ID
値 12345
戻る
0
views
See details
Views

Versions

Ver.1 2024-06-19 02:27:51.230251
Show All versions

Share

Share
tweet

Cite as

Other

print

エクスポート

OAI-PMH
  • OAI-PMH JPCOAR 2.0
  • OAI-PMH JPCOAR 1.0
  • OAI-PMH DublinCore
  • OAI-PMH DDI
Other Formats
  • JSON
  • BIBTEX
  • ZIP

コミュニティ

確認

確認

確認


Powered by WEKO3


Powered by WEKO3