{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T22:30:13Z","timestamp":1769725813290,"version":"3.49.0"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319608754","type":"print"},{"value":"9783319608761","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-60876-1_15","type":"book-chapter","created":{"date-parts":[[2017,6,3]],"date-time":"2017-06-03T08:00:34Z","timestamp":1496476834000},"page":"325-344","source":"Crossref","is-referenced-by-count":8,"title":["SCVD: A New Semantics-Based Approach for Cloned Vulnerable Code Detection"],"prefix":"10.1007","author":[{"given":"Deqing","family":"Zou","sequence":"first","affiliation":[]},{"given":"Hanchao","family":"Qi","sequence":"additional","affiliation":[]},{"given":"Zhen","family":"Li","sequence":"additional","affiliation":[]},{"given":"Song","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Hai","family":"Jin","sequence":"additional","affiliation":[]},{"given":"Guozhong","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Sujuan","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yuyi","family":"Zhong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,6,4]]},"reference":[{"key":"15_CR1","unstructured":"CloneDR. \nhttp:\/\/www.semdesigns.com\/Products\/Clone\/"},{"key":"15_CR2","unstructured":"CodeSurfer. \nhttps:\/\/www.grammatech.com\/products\/codesurfer"},{"key":"15_CR3","doi-asserted-by":"crossref","unstructured":"Baker, B.S.: On finding duplication and near-duplication in large software systems. In: Proceedings of 2nd Working Conference on Reverse Engineering, pp. 86\u201395. IEEE (1995)","DOI":"10.1109\/WCRE.1995.514697"},{"key":"15_CR4","doi-asserted-by":"crossref","unstructured":"Baxter, I.D., Yahin, A., Moura, L., Sant\u2019Anna, M., Bier, L.: Clone detection using abstract syntax trees. In: Proceedings of International Conference on Software Maintenance, pp. 368\u2013377 (1998)","DOI":"10.1109\/ICSM.1998.738528"},{"key":"15_CR5","unstructured":"Cordella, L.P., Foggia, P., Sansone, C., Vento, M.: An improved algorithm for matching large graphs. In: Proceedings of 3rd IAPR-TC15 Workshop on Graph-Based Representations in Pattern Recognition, pp. 149\u2013159 (2001)"},{"key":"15_CR6","unstructured":"Csardi, G., Nepusz, T.: The igraph software package for complex network research. Int. J. Complex Syst. 1695(5), 1\u20139 (2006)"},{"key":"15_CR7","doi-asserted-by":"crossref","unstructured":"Ducasse, S., Rieger, M., Demeyer, S.: A language independent approach for detecting duplicated code. In: Proceedings of the International Conference on Software Maintenance (ICSM), pp. 109\u2013118. IEEE (1999)","DOI":"10.1109\/ICSM.1999.792593"},{"issue":"3","key":"15_CR8","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1145\/24039.24041","volume":"9","author":"J Ferrante","year":"1987","unstructured":"Ferrante, J., Ottenstein, K.J., Warren, J.D.: The program dependence graph and its use in optimization. ACM Trans. Program. Lang. Syst. (TOPLAS) 9(3), 319\u2013349 (1987)","journal-title":"ACM Trans. Program. Lang. Syst. (TOPLAS)"},{"key":"15_CR9","doi-asserted-by":"crossref","unstructured":"Gabel, M., Jiang, L., Su, Z.: Scalable detection of semantic clones. In: Proceedings of ACM\/IEEE 30th International Conference on Software Engineering (ICSE), pp. 321\u2013330. IEEE (2008)","DOI":"10.1145\/1368088.1368132"},{"key":"15_CR10","doi-asserted-by":"crossref","unstructured":"Jang, J., Agrawal, A., Brumley, D.: ReDeBug: finding unpatched code clones in entire OS distributions. In: Proceedings of IEEE Symposium on Security and Privacy (SP), pp. 48\u201362. IEEE (2012)","DOI":"10.1109\/SP.2012.13"},{"key":"15_CR11","doi-asserted-by":"crossref","unstructured":"Jiang, L., Misherghi, G., Su, Z., Glondu, S.: Deckard: scalable and accurate tree-based detection of code clones. In: Proceedings of the 29th International Conference on Software Engineering, pp. 96\u2013105. IEEE Computer Society (2007)","DOI":"10.1109\/ICSE.2007.30"},{"key":"15_CR12","unstructured":"Johnson, J.H.: Identifying redundancy in source code using fingerprints. In: Proceedings of the 1993 Conference of the Centre for Advanced Studies on Collaborative Research, pp. 171\u2013183. IBM Press (1993)"},{"key":"15_CR13","doi-asserted-by":"crossref","unstructured":"Johnson, J.H.: Substring matching for clone detection and change tracking. In: Proceedings of the International Conference on Software Maintenance (ICSM), vol. 94, pp. 120\u2013126 (1994)","DOI":"10.1109\/ICSM.1994.336783"},{"key":"15_CR14","unstructured":"Jones, J.: Abstract syntax tree implementation idioms. In: Proceedings of the 10th Conference on Pattern Languages of Programs (PLoP). p. 26 (2003)"},{"issue":"7","key":"15_CR15","doi-asserted-by":"crossref","first-page":"654","DOI":"10.1109\/TSE.2002.1019480","volume":"28","author":"T Kamiya","year":"2002","unstructured":"Kamiya, T., Kusumoto, S., Inoue, K.: CCFinder: a multilinguistic token-based code clone detection system for large scale source code. IEEE Trans. Softw. Eng. 28(7), 654\u2013670 (2002)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"15_CR16","doi-asserted-by":"crossref","unstructured":"Kim, M., Sazawal, V., Notkin, D., Murphy, G.: An empirical study of code clone genealogies. In: ACM SIGSOFT Software Engineering Notes, vol. 30, pp. 187\u2013196. ACM (2005)","DOI":"10.1145\/1081706.1081737"},{"key":"15_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1007\/3-540-47764-0_3","volume-title":"Static Analysis","author":"R Komondoor","year":"2001","unstructured":"Komondoor, R., Horwitz, S.: Using slicing to identify duplication in source code. In: Cousot, P. (ed.) SAS 2001. LNCS, vol. 2126, pp. 40\u201356. Springer, Heidelberg (2001). doi:\n10.1007\/3-540-47764-0_3"},{"key":"15_CR18","doi-asserted-by":"crossref","unstructured":"Koschke, R., Falke, R., Frenzel, P.: Clone detection using abstract syntax suffix trees. In: Proceedings of the 13th Working Conference on Reverse Engineering (WCRE), pp. 253\u2013262. IEEE (2006)","DOI":"10.1109\/WCRE.2006.18"},{"key":"15_CR19","doi-asserted-by":"crossref","unstructured":"Li, J., Ernst, M.D.: CBCD: cloned buggy code detector. In: Proceedings of 34th International Conference on Software Engineering (ICSE), pp. 310\u2013320. IEEE (2012)","DOI":"10.1109\/ICSE.2012.6227183"},{"key":"15_CR20","doi-asserted-by":"crossref","unstructured":"Li, Z., Zou, D., Xu, S., Jin, H., Qi, H., Hu, J.: VulPecker: an automated vulnerability detection system based on code similarity analysis. In: Proceedings of the 32nd Annual Conference on Computer Security Applications (ACSAC), pp. 201\u2013213. ACM (2016)","DOI":"10.1145\/2991079.2991102"},{"issue":"3","key":"15_CR21","doi-asserted-by":"crossref","first-page":"176","DOI":"10.1109\/TSE.2006.28","volume":"32","author":"Z Li","year":"2006","unstructured":"Li, Z., Lu, S., Myagmar, S., Zhou, Y.: CP-Miner: finding copy-paste and related bugs in large-scale software code. IEEE Trans. Softw. Eng. 32(3), 176\u2013192 (2006)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"15_CR22","doi-asserted-by":"crossref","unstructured":"Mayrand, J., Leblanc, C., Merlo, E.: Experiment on the automatic detection of function clones in a software system using metrics. In: Proceedings of International Conference on Software Maintenance (ICSM), p. 244 (1996)","DOI":"10.1109\/ICSM.1996.565012"},{"issue":"4","key":"15_CR23","doi-asserted-by":"crossref","first-page":"339","DOI":"10.1002\/jgt.3190010410","volume":"1","author":"RC Read","year":"1977","unstructured":"Read, R.C., Corneil, D.G.: The graph isomorphism disease. J. Graph Theory 1(4), 339\u2013363 (1977)","journal-title":"J. Graph Theory"},{"issue":"6","key":"15_CR24","doi-asserted-by":"crossref","first-page":"402","DOI":"10.1002\/smr.1707","volume":"27","author":"H Sajnani","year":"2015","unstructured":"Sajnani, H., Saini, V., Lopes, C.: A parallel and efficient approach to large scale clone detection. J. Softw. Evol. Process 27(6), 402\u2013429 (2015)","journal-title":"J. Softw. Evol. Process"},{"key":"15_CR25","doi-asserted-by":"crossref","unstructured":"Sheneamer, A., Kalita, J.: Semantic clone detection using machine learning. In: Proceedings of 15th IEEE International Conference on Machine Learning and Applications, pp. 1024\u20131028. IEEE (2016)","DOI":"10.1109\/ICMLA.2016.0185"},{"key":"15_CR26","doi-asserted-by":"crossref","unstructured":"White, M., Tufano, M., Vendome, C., Poshyvanyk, D.: Deep learning code fragments for code clone detection. In: Proceedings of the 31st IEEE\/ACM International Conference on Automated Software Engineering, pp. 87\u201398. ACM (2016)","DOI":"10.1145\/2970276.2970326"},{"key":"15_CR27","doi-asserted-by":"crossref","unstructured":"Yamaguchi, F., Golde, N., Arp, D., Rieck, K.: Modeling and discovering vulnerabilities with code property graphs. In: Proceedings of IEEE Symposium on Security and Privacy (SP), pp. 590\u2013604. IEEE (2014)","DOI":"10.1109\/SP.2014.44"}],"container-title":["Lecture Notes in Computer Science","Detection of Intrusions and Malware, and Vulnerability Assessment"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-60876-1_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,12]],"date-time":"2017-06-12T12:17:01Z","timestamp":1497269821000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-60876-1_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319608754","9783319608761"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-60876-1_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]}}}