暂无分享,去创建一个
Jean-Pierre Seifert | Federico Maggi | Konrad Rieck | Fabian Yamaguchi | Tommi Unruh | Bhargava Shastry | Malte Skoruppa | J. Seifert | Fabian Yamaguchi | F. Maggi | Bhargava Shastry | Malte Skoruppa | Konrad Rieck | Tommi Unruh | Jean-Pierre Seifert
[1] Thomas W. Reps,et al. Program analysis via graph reachability , 1997, Inf. Softw. Technol..
[2] David Brumley,et al. ReDeBug: Finding Unpatched Code Clones in Entire OS Distributions , 2012, 2012 IEEE Symposium on Security and Privacy.
[3] Magdalena Balazinska,et al. Advanced clone-analysis to support object-oriented system refactoring , 2000, Proceedings Seventh Working Conference on Reverse Engineering.
[4] V. N. Venkatakrishnan,et al. Vetting SSL Usage in Applications with SSLINT , 2015, 2015 IEEE Symposium on Security and Privacy.
[5] Konrad Rieck,et al. Modeling and Discovering Vulnerabilities with Code Property Graphs , 2014, 2014 IEEE Symposium on Security and Privacy.
[6] Konrad Rieck,et al. Generalized vulnerability extrapolation using abstract syntax trees , 2012, ACSAC '12.
[7] Elmar Jürgens,et al. Index-based code clone detection: incremental, distributed, scalable , 2010, 2010 IEEE International Conference on Software Maintenance.
[8] Rainer Koschke,et al. Clone Detection Using Abstract Syntax Suffix Trees , 2006, 2006 13th Working Conference on Reverse Engineering.
[9] Junfeng Yang,et al. Scalable and systematic detection of buggy inconsistencies in source code , 2010, OOPSLA.
[10] Yuanyuan Zhou,et al. CP-Miner: finding copy-paste and related bugs in large-scale software code , 2006, IEEE Transactions on Software Engineering.
[11] Elmar Jürgens,et al. CloneDetective - A workbench for clone detection research , 2009, 2009 IEEE 31st International Conference on Software Engineering.
[12] Zhendong Su,et al. DECKARD: Scalable and Accurate Tree-Based Detection of Code Clones , 2007, 29th International Conference on Software Engineering (ICSE'07).
[13] Filippo Lanubile,et al. Finding function clones in Web applications , 2003, Seventh European Conference onSoftware Maintenance and Reengineering, 2003. Proceedings..
[14] Jens Krinke,et al. Identifying similar code with program dependence graphs , 2001, Proceedings Eighth Working Conference on Reverse Engineering.
[15] Thierry Lavoie,et al. Uncovering access control weaknesses and flaws with security-discordant software clones , 2013, ACSAC.
[16] Hoan Anh Nguyen,et al. Detection of recurring software vulnerabilities , 2010, ASE.
[17] Stéphane Ducasse,et al. A language independent approach for detecting duplicated code , 1999, Proceedings IEEE International Conference on Software Maintenance - 1999 (ICSM'99). 'Software Maintenance for Business Change' (Cat. No.99CB36360).
[18] Susan Horwitz,et al. Using Slicing to Identify Duplication in Source Code , 2001, SAS.
[19] Shinji Kusumoto,et al. CCFinder: A Multilinguistic Token-Based Code Clone Detection System for Large Scale Source Code , 2002, IEEE Trans. Software Eng..
[20] Brenda S. Baker,et al. On finding duplication and near-duplication in large software systems , 1995, Proceedings of 2nd Working Conference on Reverse Engineering.
[21] Justin Clarke. Reviewing Code for SQL Injection , 2009 .
[22] Mark Harman,et al. KClone: A Proposed Approach to Fast Precise Code Clone Detection , 2009 .
[23] Christopher Krügel,et al. Pixy: a static analysis tool for detecting Web application vulnerabilities , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[24] Ettore Merlo,et al. Assessing the benefits of incorporating function clone detection in a development process , 1997, 1997 Proceedings International Conference on Software Maintenance.
[25] Alexander Aiken,et al. Static Detection of Security Vulnerabilities in Scripting Languages , 2006, USENIX Security Symposium.
[26] P. Bulychev. An evaluation of duplicate code detection using anti-unification , 2009 .