期刊文献+

一种程序源代码相似度度量方法 被引量:7

Method of Program Source Code Similarity Measurement
下载PDF
导出
摘要 提出一种程序源代码相似度度量方法,根据C语言程序源代码的结构特点划分函数作用域,采用相关规则对划分后的程序代码进行规格化处理,对生成的Token序列求Hash值,使用散列值匹配算法对程序源代码进行相似度度量。实验结果证明,该方法可提高程序源代码相似度度量精度,且运行效率较高。 This paper proposes a method of program source code similarity measurement. According to the structure feature of the C program language source code, by using the division of function scope, the rules normalize source code. The generated Token sequence is calculated Hash value. It uses the Hash value matching algorithm to measure the program source code similarity. Experimental results show that the accuracy of similar degree can be measured well and run-time efficiency is high.
出处 《计算机工程》 CAS CSCD 2012年第6期37-39,共3页 Computer Engineering
基金 中央高校基本科研业务费科研专项基金资助项目(CDJZR10180008)
关键词 函数作用域 代码规格化 散列值匹配 相似度度量 function scope code normalization Hash value matching similarity measurement
  • 相关文献

参考文献8

  • 1Baker B S, Giancarlo R. Sparse Dynamic Programming for Lon- gest Common Subsequence from Fragments[J]. Journal of Algorithms, 2002, 42(2): 231-254. 被引量:1
  • 2Kamiya T, Kusumoto S, Inoue K. CCFinder: A Multilinguistic Token-based Code Clone Detection System for Large Scale Source Code[J]. IEEE Trans. on Software Engineering, 2002, 28(7): 654-670. 被引量:1
  • 3Schleimer S, Wilkerson D S, Aiken A. Winnowing: Local Algo- rithms for Document Fingerprinting[C]//Proc. of ACM SIGMOD International Conference on Management of Data. San Diego, California, USA: [s. n.], 2003. 被引量:1
  • 4曹孟春,陈凯明.一种用于反编译代码与源代码的比较算法[J].计算机工程,2009,35(4):38-40. 被引量:3
  • 5Jones E L. Metrics Based Plagiarism Monitoring[J]. Journal of Computing Sciences in Colleges, 2001, 16(4): 253-261. 被引量:1
  • 6Chilowicz M, Duris E, Roussel G. Syntax Tree Fingerprinting for Source Code Similarity Detection[C]//Proc. of ICPC'09. Vancouver, Canada: [s. n.], 2009. 被引量:1
  • 7Yang Suying, Wang Xin. A Visual Domain Recognition Method Based on Function Mode for SourceCode Plagiarism[C]//Proc. of the 3rd Internatioaai Symposium on Intelligent Information Technology and Security Informatics. Jinggangshan, China: [s. n.], 2010. 被引量:1
  • 8Karp R M, Rabin M O. Efficient Randomized Pattern-matching Algorithms[J]. IBM Journal of Research and Development, 1987, 31 (2): 249-260. 被引量:1

二级参考文献9

  • 1Sites R L, Chemoff A, Kirk M B, et al. Binary Translation[J]. Digital Technical Journal, 1992, 4(4): 69-81. 被引量:1
  • 2Cifuentes C, Waddington T, Emmerik M V. Computer Security Analysis Through Decompilation and High-level Debugging[C]// Proceedings of WCRE'01. Stuttgart, Germany: IEEE Computer Society Press, 2001 : 375-380. 被引量:1
  • 3Emmerik M V, Waddinton T. Using a Decompiler for Real-world Source Recovery[C]//Proceedings of WCRE'04. Delft, Netherlands: IEEE Computer Society Press, 2004: 27-36. 被引量:1
  • 4Horwitz S. Identifying the Semantic and Textual Differences Between Two Version of a Program[C]//Proceedings of PLDI'90. New York, USA: ACM Press, 1990: 234-245. 被引量:1
  • 5Kim M, Notkin D. Program Element Matching for Multi-version Program Analysis[C]//Proceedings of the 3rd International Workshop on Mining Software Repositories. Shanghai, China: ACM Press, 2006: 58-64. 被引量:1
  • 6Necula G C, McPeak S, Rahul S R et al. CIL: Intermediate Language and Tools for Analysis and Transformation of C Programs[J]. Lecture Notes in Computer Science, 2002, 2304: 213-228. 被引量:1
  • 7Cifuentes C, Gough K J. Decompilation of Binary Programs[J]. Software-Practice & Experience, 1995, 25(7): 811-829. 被引量:1
  • 8Emmerik M V, Krol G, Waddington T. Boomerang Decompiler[Z]. (2006-11-03). http://boomerang.sourceforge.net. 被引量:1
  • 9刘宗田.C语言反编译系统DECLER[J].微电子学与计算机,1997,14(5):1-3. 被引量:5

共引文献2

同被引文献32

  • 1Baker B S, Giancarlo R. Sparse dynamic programming for longest common subsequence from fragments. Journal of Algorithms, 2002; 42 ( 2 ) : 23 !-254. 被引量:1
  • 2Schleimer S, Wilkerson D S, Aiken A. Winnowing: local algorithms for document fingerprinting. Proc of ACM SIGMOD International Conference on Management of Data. San Diego, California, USA: Is. n. 1 , 2003:16-18. 被引量:1
  • 3Granville A. Detecting plagiarism in Java code. Supervisor: Yorick Wilks,2002 ; (2) :56-58. 被引量:1
  • 4Aiken A, Schleimer S, Wi|kerson D S. Winnowing : local algorithms for document fingerprinting. Proceedings of the ACM SIGMOD Inter- national Conference on Management, 2003:45-46. 被引量:1
  • 5Karp R M, Rabin M O. Efficient randomized pattern-matching algo- rithms. IBM Journal of Research and Development, 1987 ; 31 ( 2 ) : 249 -260. 被引量:1
  • 6Schleimer S, Wilkerson D S, Aiken A. Winnowing: local algorithms for document fingerprinting. Proc of ACM SIGMOD International Conference on Management of Data. San Diego, California, USA: , 2003:123-125. 被引量:1
  • 7Prechelt L, Malpohl G, Philippsen M. Finding plagiarisms among a set of programs with JPlag. Journal of Universal Computer Science, 2002 ;8 ( 11 ) : 1016-1038. 被引量:1
  • 8Guo Shuqiao, Huang Zhiyong, Jagadish H V, et al. Relaxed space bounding for moving objects: a case for the buddy tree. SIGMOD Record, 2006; 35(4): 24-29. 被引量:1
  • 9Jones E L Metrics based plagiarism monitoring. Journal of tins Sciences in Collezcs. 2001:16(4) : 253-261. 被引量:1
  • 10Shawky D M, Ali A F. An approach for assessing similarity metrics used in metric-based clone detec- tion techniques[C]///The 3rd IEEE International Conference on Computer Science and Information Technology (ICCSIT), Chengdu,2010: 580-584. 被引量:1

引证文献7

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部