{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,13]],"date-time":"2025-02-13T05:06:24Z","timestamp":1739423184932,"version":"3.37.0"},"reference-count":67,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,1,5]],"date-time":"2025-01-05T00:00:00Z","timestamp":1736035200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,5]],"date-time":"2025-01-05T00:00:00Z","timestamp":1736035200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Science Committee of the Republic of Armenia","award":["21SCG-1B003","21SCG-1B003","21SCG-1B003","21SCG-1B003","21SCG-1B003","21SCG-1B003","21SCG-1B003","21SCG-1B003"],"award-info":[{"award-number":["21SCG-1B003","21SCG-1B003","21SCG-1B003","21SCG-1B003","21SCG-1B003","21SCG-1B003","21SCG-1B003","21SCG-1B003"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2025,2]]},"DOI":"10.1007\/s10207-024-00968-z","type":"journal-article","created":{"date-parts":[[2025,1,5]],"date-time":"2025-01-05T07:28:20Z","timestamp":1736062100000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Accurate code fragment clone detection and its application in identifying known CVE clones"],"prefix":"10.1007","volume":"24","author":[{"given":"Mariam","family":"Arutunian","sequence":"first","affiliation":[]},{"given":"Sevak","family":"Sargsyan","sequence":"additional","affiliation":[]},{"given":"Hripsime","family":"Hovhannisyan","sequence":"additional","affiliation":[]},{"given":"Garnik","family":"Khroyan","sequence":"additional","affiliation":[]},{"given":"Albert","family":"Mkrtchyan","sequence":"additional","affiliation":[]},{"given":"Hovhannes","family":"Movsisyan","sequence":"additional","affiliation":[]},{"given":"Arutyun","family":"Avetisyan","sequence":"additional","affiliation":[]},{"given":"Hayk","family":"Aslanyan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,1,5]]},"reference":[{"issue":"6","key":"968_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3345317","volume":"52","author":"T Folt\u00fdnek","year":"2019","unstructured":"Folt\u00fdnek, T., Meuschke, N., Gipp, B.: Academic plagiarism detection: a systematic literature review. ACM Comput. Surv. 52(6), 1\u201342 (2019)","journal-title":"ACM Comput. Surv."},{"issue":"13","key":"968_CR2","doi-asserted-by":"publisher","first-page":"8581","DOI":"10.1007\/s11042-018-5827-6","volume":"79","author":"F Ullah","year":"2020","unstructured":"Ullah, F., Wang, J., Farhan, M., Jabbar, S., Zhiming, W., Khalid, Shehzad: Plagiarism detection in students\u2019 programming assignments based on semantics: multimedia e-learning based smart assessment methodology. Multimed. Tools Appl. 79(13), 8581\u20138598 (2020)","journal-title":"Multimed. Tools Appl."},{"key":"968_CR3","doi-asserted-by":"crossref","unstructured":"Zhang, F., Jhi, Y.-C., Wu, D., Liu, P., Zhu, S.: A first step towards algorithm plagiarism detection. In: Proceedings of the 2012 International Symposium on Software Testing and Analysis, ISSTA 2012, pp. 111\u2013121, New York, NY, USA. Association for Computing Machinery (2012)","DOI":"10.1145\/2338965.2336767"},{"key":"968_CR4","doi-asserted-by":"crossref","unstructured":"Zhang, F., Wu, D., Liu, P., Zhu, S.: Program logic based software plagiarism detection. In: 2014 IEEE 25th International Symposium on Software Reliability Engineering, pp. 66\u201377 (2014)","DOI":"10.1109\/ISSRE.2014.18"},{"issue":"5","key":"968_CR5","doi-asserted-by":"publisher","first-page":"942","DOI":"10.1007\/s11390-015-1573-7","volume":"30","author":"J Chen","year":"2015","unstructured":"Chen, J., Alalfi, M.H., Dean, T.R., Zou, Y.: Detecting android malware using clone detection. J. Comput. Sci. Technol. 30(5), 942\u2013956 (2015)","journal-title":"J. Comput. Sci. Technol."},{"key":"968_CR6","doi-asserted-by":"crossref","unstructured":"Kalysch, A., Milisterfer, O., Protsenko, M., M\u00fcller, T.: Tackling androids native library malware with robust, efficient and accurate similarity measures. In: Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES \u201918, New York, NY, USA. Association for Computing Machinery (2018)","DOI":"10.1145\/3230833.3232828"},{"issue":"2","key":"968_CR7","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/s11416-021-00383-1","volume":"18","author":"AM Lajevardi","year":"2022","unstructured":"Lajevardi, A.M., Parsa, S., Amiri, M.J.: Markhor: malware detection using fuzzy similarity of system call dependency sequences. J. Comput. Virol. Hacking Tech. 18(2), 81\u201390 (2022)","journal-title":"J. Comput. Virol. Hacking Tech."},{"key":"968_CR8","doi-asserted-by":"crossref","unstructured":"Kim, Seulbae, Woo, Seunghoon, Lee, Heejo, Oh, Hakjoo: Vuddy: A scalable approach for vulnerable code clone discovery. In: 2017 IEEE Symposium on Security and Privacy (SP), pages 595\u2013614, (2017)","DOI":"10.1109\/SP.2017.62"},{"key":"968_CR9","doi-asserted-by":"crossref","unstructured":"Liu, Z., Wei, Q., Cao, Y.: Vfdetect: a vulnerable code clone detection system based on vulnerability fingerprint. In: 2017 IEEE 3rd Information Technology and Mechatronics Engineering Conference (ITOEC), pp. 548\u2013553 (2017)","DOI":"10.1109\/ITOEC.2017.8122356"},{"key":"968_CR10","doi-asserted-by":"crossref","unstructured":"Patrick V., Fabien, B., W., Str\u00fcber, D., Schneider, K.: Detecting security vulnerabilities using clone detection and community knowledge. In: Proceedings of the International Conference on Software Engineering and Knowledge Engineering, SEKE, pp. 245\u2013252, 07 (2019)","DOI":"10.18293\/SEKE2019-183"},{"key":"968_CR11","doi-asserted-by":"crossref","unstructured":"Baker, B.S.: On finding duplication and near-duplication in large software systems. In: Proceedings of 2nd working conference on reverse engineering, pp 86\u201395 (1995)","DOI":"10.1109\/WCRE.1995.514697"},{"key":"968_CR12","doi-asserted-by":"crossref","unstructured":"Roy, C.K., Cordy, J.R.: An empirical study of function clones in open source software. In: 2008 15th Working Conference on Reverse Engineering, pp. 81\u201390 (2008)","DOI":"10.1109\/WCRE.2008.54"},{"key":"968_CR13","unstructured":"Open source security and risk analysis report (2024). https:\/\/www.synopsys.com\/content\/dam\/synopsys\/sig-assets\/reports\/rep-ossra-2024.pdf"},{"key":"968_CR14","doi-asserted-by":"crossref","unstructured":"Koschke, R., Bazrafshan, S.: Software-clone rates in open-source programs written in c or c++. In: 2016 IEEE 23rd International Conference on Software Analysis, Evolution, and Reengineering (SANER), vol.\u00a03, pp. 1\u20137 (2016)","DOI":"10.1109\/SANER.2016.28"},{"issue":"9","key":"968_CR15","doi-asserted-by":"publisher","first-page":"577","DOI":"10.1109\/TSE.2007.70725","volume":"33","author":"S Bellon","year":"2007","unstructured":"Bellon, S., Koschke, R., Antoniol, G., Krinke, J., Merlo, E.: Comparison and evaluation of clone detection tools. IEEE Trans. Softw. Eng. 33(9), 577\u2013591 (2007)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"968_CR16","unstructured":"GitHub: a platform for code hosting and collaboration. https:\/\/github.com\/. Accessed: 30 July 2024"},{"key":"968_CR17","unstructured":"National Institute of Standards and Technology (NIST) vulnerability database. https:\/\/nvd.nist.gov\/. Accessed: 30 July 2024"},{"key":"968_CR18","unstructured":"MITRE Corporation: common vulnerabilities and exposures (CVE) Database. https:\/\/cve.mitre.org\/. Accessed: 30 July 2024"},{"key":"968_CR19","unstructured":"The LLVM compiler infrastructure project. https:\/\/llvm.org"},{"issue":"3","key":"968_CR20","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1016\/0096-0551(78)90009-7","volume":"3","author":"Ken Kennedy","year":"1978","unstructured":"Kennedy, Ken: Use-definition chains with applications. Comput. Lang. 3(3), 163\u2013179 (1978)","journal-title":"Comput. Lang."},{"key":"968_CR21","unstructured":"ANTLR\u2014ANother Tool for Language Recognition. https:\/\/www.antlr.org\/"},{"key":"968_CR22","unstructured":"ASM\u2014Java Bytecode Manipulation and Analysis Framework. https:\/\/asm.ow2.io\/. Accessed: 30 July 2024"},{"key":"968_CR23","unstructured":"REIL\u2014The reverse engineering intermediate language. https:\/\/www.zynamics.com\/binnavi\/manual\/html\/reil_language.htm"},{"key":"968_CR24","unstructured":"IDA Pro: disassembler and debugger for binary code analysis. https:\/\/hex-rays.com\/ida-pro\/. Accessed: 30 July 2024"},{"key":"968_CR25","unstructured":"BinNavi: Binary code reverse engineering tool for vulnerability research. https:\/\/www.zynamics.com\/binnavi.html. Accessed: 30 July 2024"},{"key":"968_CR26","doi-asserted-by":"crossref","unstructured":"Aslanyan, H., Arutunian, M, Keropyan, G., Kurmangaleev, S., Vardanyan, V.: Binside: static analysis framework for defects detection in binary code. In: 2020 Ivannikov Memorial Workshop (IVMEM), pp 3\u20138, (2020)","DOI":"10.1109\/IVMEM51402.2020.00007"},{"key":"968_CR27","unstructured":"Precision and recall. https:\/\/en.wikipedia.org\/wiki\/Precision_and_recall"},{"key":"968_CR28","unstructured":"Root mean square deviation. https:\/\/en.wikipedia.org\/wiki\/Root_mean_square_deviation"},{"key":"968_CR29","unstructured":"OpenSSL: Robust toolkit for secure communication. https:\/\/www.openssl.org\/. Accessed: 30 July 2024"},{"key":"968_CR30","unstructured":"JasPer: JPEG-2000 Codec Software. https:\/\/www.linuxfromscratch.org\/blfs\/view\/7.4\/general\/jasper.html. Accessed: 30 July 2024"},{"key":"968_CR31","unstructured":"c-ares: C Library for Asynchronous DNS Requests. https:\/\/c-ares.org\/. Accessed: 30 July 2024"},{"key":"968_CR32","unstructured":"rsync: File synchronization and transfer utility. https:\/\/www.linuxfromscratch.org\/blfs\/view\/stable\/basicnet\/rsync.html. Accessed: 30 July 2024"},{"key":"968_CR33","unstructured":"Moss: a system for detecting software similarity. http:\/\/theory.stanford.edu\/~aiken\/moss\/. Accessed: 30 July 2024"},{"key":"968_CR34","unstructured":"CCFinder: Clone Code detection tool. https:\/\/github.com\/radekg1000\/ccfinderx. Accessed: 30 July 2024"},{"key":"968_CR35","unstructured":"CPD: Code duplicate detection tool. https:\/\/pmd.github.io\/pmd\/pmd_userdocs_cpd.html. Accessed: 30 July 2024"},{"key":"968_CR36","unstructured":"SourcererCC: Source Code Clone Detection Tool. https:\/\/github.com\/Mondego\/SourcererCC. Accessed: 30 July 2024"},{"key":"968_CR37","unstructured":"VUDDY: Vulnerability detection and analysis tool. https:\/\/github.com\/squizz617\/vuddy. Accessed: 30 July 2024"},{"key":"968_CR38","unstructured":"Clone Doctor: Software clone detection and reporting. http:\/\/www.semdesigns.com\/products\/clone\/. Accessed: 30 July 2024"},{"key":"968_CR39","unstructured":"Deckard: clone detection tool for software engineering. https:\/\/github.com\/skyhover\/Deckard. Accessed: 30 July 2024"},{"key":"968_CR40","unstructured":"BigCloneBench: Benchmark Dataset for Clone Detection. https:\/\/github.com\/clonebench\/BigCloneBench. Accessed: 30 July 2024"},{"key":"968_CR41","unstructured":"0 A.D.: Real-time Strategy Game of Ancient Warfare. https:\/\/play0ad.com\/. Accessed: 30 July 2024"},{"key":"968_CR42","unstructured":"PHP: Hypertext preprocessor. https:\/\/github.com\/php\/php-src. Accessed: 30 July 2024"},{"key":"968_CR43","unstructured":"CMake: cross-platform build system. https:\/\/gitlab.kitware.com\/cmake\/cmake. Accessed: 30 July 2024"},{"key":"968_CR44","unstructured":"OpenJPEG: JPEG 2000 Codec Library. https:\/\/github.com\/uclouvain\/openjpeg. Accessed: 30 July 2024"},{"key":"968_CR45","unstructured":"rct: Robust Code Transformation tool. https:\/\/github.com\/Andersbakken\/rct. Accessed: 30 July 2024"},{"key":"968_CR46","unstructured":"Emscripten: LLVM-to-JavaScript Compiler. https:\/\/github.com\/emscripten-core\/emscripten. Accessed: 30 July 2024"},{"key":"968_CR47","unstructured":"Fldigi: Digital Mode Ham Radio Software. https:\/\/github.com\/w1hkj\/fldigi. Accessed: 30 July 2024"},{"key":"968_CR48","unstructured":"POV-Ray: Persistence of vision raytracer. https:\/\/github.com\/POV-Ray\/povray. Accessed: 30 July 2024"},{"key":"968_CR49","unstructured":"ntopng: Network Traffic Analysis Tool. https:\/\/github.com\/ntop\/ntopng. Accessed: 30 July 2024"},{"key":"968_CR50","unstructured":"PointCloudLibrary: 3D Point cloud processing library. https:\/\/github.com\/PointCloudLibrary\/pcl. Accessed: 30 July 2024"},{"key":"968_CR51","unstructured":"Kamailio: Open source SIP server. https:\/\/github.com\/kamailio\/kamailio. Accessed: 30 July 2024"},{"key":"968_CR52","unstructured":"H2O: High-Performance HTTP\/2 Web Server. https:\/\/github.com\/h2o\/h2o. Accessed: 30 July 2024"},{"key":"968_CR53","unstructured":"ITK: The insight toolkit for image processing. https:\/\/github.com\/InsightSoftwareConsortium\/ITK. Accessed: 30 July 2024"},{"key":"968_CR54","unstructured":"Dragonfly: Modern In-Memory Store for Databases. https:\/\/github.com\/dragonflydb\/dragonfly. Accessed: 3 December 2024"},{"key":"968_CR55","unstructured":"Webdis: A redis HTTP interface. https:\/\/github.com\/nicolasff\/webdis. Accessed: 3 December 2024"},{"key":"968_CR56","unstructured":"Defold: cross-platform game engine. https:\/\/github.com\/defold\/defold. Accessed: 3 December 2024"},{"key":"968_CR57","unstructured":"ODrive: high performance motor controller. https:\/\/github.com\/madcowswe\/ODrive. Accessed: 3 December 2024"},{"key":"968_CR58","unstructured":"AzerothCore: MMORPG Server Framework. https:\/\/github.com\/azerothcore\/azerothcore-wotlk. Accessed: 3 December 2024"},{"key":"968_CR59","doi-asserted-by":"crossref","unstructured":"Schleimer, S., Wilkerson, D.S., Aiken, A.: Winnowing: local algorithms for document fingerprinting. In: Proceedings of the 2003 ACM SIGMOD International Conference on Management of Data, SIGMOD \u201903, pp. 76\u201385, New York, NY, USA. Association for Computing Machinery (2003)","DOI":"10.1145\/872769.872770"},{"issue":"7","key":"968_CR60","doi-asserted-by":"publisher","first-page":"654","DOI":"10.1109\/TSE.2002.1019480","volume":"28","author":"T Kamiya","year":"2002","unstructured":"Kamiya, T., Kusumoto, S., Inoue, K.: Ccfinder: a multilinguistic token-based code clone detection system for large scale source code. IEEE Trans. Softw. Eng. 28(7), 654\u2013670 (2002)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"968_CR61","doi-asserted-by":"crossref","unstructured":"Livieri, S., Higo, Y., Matushita, M., Inoue, K.: Very-large scale code clone analysis and visualization of open source programs using distributed ccfinder: D-ccfinder. In: 29th International Conference on Software Engineering (ICSE\u201907), pp. 106\u2013115 (2007)","DOI":"10.1109\/ICSE.2007.97"},{"key":"968_CR62","unstructured":"CPD: Copy\/Paste Detector for Java and C++. https:\/\/pmd.sourceforge.io\/pmd-5.3.0\/usage\/cpd-usage.html. Accessed: 30 July 2024"},{"key":"968_CR63","unstructured":"PMD: Source code analyzer and formatter. https:\/\/github.com\/pmd\/pmd. Accessed: 30 July 2024"},{"key":"968_CR64","unstructured":"Karp\u2013Rabin Algorithm: String search algorithm. https:\/\/xlinux.nist.gov\/dads\/HTML\/karpRabin.html. Accessed: 30 July 2024"},{"key":"968_CR65","doi-asserted-by":"crossref","unstructured":"Sajnani, H., Saini, V., Svajlenko, J., Roy, C.K., Lopes, C.V.: Sourcerercc: scaling code clone detection to big-code. In: 2016 IEEE\/ACM 38th International Conference on Software Engineering (ICSE), pp. 1157\u20131168 (2016)","DOI":"10.1145\/2884781.2884877"},{"key":"968_CR66","doi-asserted-by":"crossref","unstructured":"Jiang, L., Misherghi, G., Su, Z., Glondu, S.: Deckard: scalable and accurate tree-based detection of code clones. In: 29th International Conference on Software Engineering (ICSE\u201907), pp 96\u2013105 (2007)","DOI":"10.1109\/ICSE.2007.30"},{"key":"968_CR67","doi-asserted-by":"crossref","unstructured":"Tairas, R., Gray, J.: Sub-clone refactoring in open source software artifacts. In: Proceedings of the 2010 ACM Symposium on Applied Computing, SAC \u201910, pp. 2373\u20132374, New York, NY, USA. Association for Computing Machinery (2010)","DOI":"10.1145\/1774088.1774580"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00968-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-024-00968-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00968-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,12]],"date-time":"2025-02-12T05:13:58Z","timestamp":1739337238000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-024-00968-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,5]]},"references-count":67,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,2]]}},"alternative-id":["968"],"URL":"https:\/\/doi.org\/10.1007\/s10207-024-00968-z","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"type":"print","value":"1615-5262"},{"type":"electronic","value":"1615-5270"}],"subject":[],"published":{"date-parts":[[2025,1,5]]},"assertion":[{"value":"5 January 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no Conflict of interest as defined by Springer or other interests that might be perceived to influence the results and\/or discussion reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}],"article-number":"55"}}