{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T06:30:38Z","timestamp":1774074638312,"version":"3.50.1"},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2020,9,9]],"date-time":"2020-09-09T00:00:00Z","timestamp":1599609600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,9,9]],"date-time":"2020-09-09T00:00:00Z","timestamp":1599609600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100002790","name":"Canadian Network for Research and Innovation in Machining Technology, Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002790","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001691","name":"Japan Society for the Promotion of Science","doi-asserted-by":"publisher","award":["JP16K12415"],"award-info":[{"award-number":["JP16K12415"]}],"id":[{"id":"10.13039\/501100001691","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001691","name":"Japan Society for the Promotion of Science","doi-asserted-by":"publisher","award":["JP19J23477"],"award-info":[{"award-number":["JP19J23477"]}],"id":[{"id":"10.13039\/501100001691","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Microsoft Azure for Research"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Empir Software Eng"],"published-print":{"date-parts":[[2020,11]]},"DOI":"10.1007\/s10664-020-09852-5","type":"journal-article","created":{"date-parts":[[2020,9,10]],"date-time":"2020-09-10T13:32:51Z","timestamp":1599744771000},"page":"4617-4675","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":52,"title":["Code cloning in smart contracts: a case study on verified contracts from the Ethereum blockchain platform"],"prefix":"10.1007","volume":"25","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6317-7001","authenticated-orcid":false,"given":"Masanari","family":"Kondo","sequence":"first","affiliation":[]},{"given":"Gustavo A.","family":"Oliva","sequence":"additional","affiliation":[]},{"given":"Zhen Ming","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Ahmed E.","family":"Hassan","sequence":"additional","affiliation":[]},{"given":"Osamu","family":"Mizuno","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,9]]},"reference":[{"key":"9852_CR1","unstructured":"Baker BS (1992) A program for identifying duplicated code Computer Science and Statistics: Proceedings of the 24th Symposium on the Interface, vol 24, pp 49\u201357"},{"key":"9852_CR2","unstructured":"Bartoletti M, Carta S, Cimoli T, Saia R (2017) Dissecting ponzi schemes on Ethereum: identification, analysis, and impact, vol abs\/1703.03779. arXiv:1703.03779"},{"issue":"9","key":"9852_CR3","doi-asserted-by":"publisher","first-page":"577","DOI":"10.1109\/TSE.2007.70725","volume":"33","author":"S Bellon","year":"2007","unstructured":"Bellon S, Koschke R, Antoniol G, Krinke J, Merlo E (2007) Comparison and evaluation of clone detection tools. IEEE Trans. Softw. Eng. 33(9):577\u2013591. https:\/\/doi.org\/10.1109\/TSE.2007.70725","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"6","key":"9852_CR4","doi-asserted-by":"publisher","first-page":"760","DOI":"10.1016\/j.scico.2010.11.010","volume":"77","author":"N Bettenburg","year":"2012","unstructured":"Bettenburg N, Shang W, Ibrahim WM, Adams B, Zou Y, Hassan AE (2012) An empirical study on inconsistent changes to code clones at the release level. Sci. Comput. Program. 77(6):760\u2013776. https:\/\/doi.org\/10.1016\/j.scico.2010.11.010","journal-title":"Sci. Comput. Program."},{"key":"9852_CR5","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1162\/tacl_a_00051","volume":"5","author":"P Bojanowski","year":"2017","unstructured":"Bojanowski P, Grave E, Joulin A, Mikolov T (2017) Enriching word vectors with subword information. Transactions of the Association for Computational Linguistics 5:135\u2013146","journal-title":"Transactions of the Association for Computational Linguistics"},{"issue":"3","key":"9852_CR6","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1007\/s10888-011-9188-x","volume":"10","author":"L Ceriani","year":"2012","unstructured":"Ceriani L, Verme P (2012) The origins of the gini index: extracts from variabilit\u00e0 e mutabilit\u00e0 (1912) by corrado gini. J Econ Inequal 10(3):421\u2013443. https:\/\/doi.org\/10.1007\/s10888-011-9188-x","journal-title":"J Econ Inequal"},{"key":"9852_CR7","doi-asserted-by":"publisher","unstructured":"Chen W, Zheng Z, Cui J, Ngai E, Zheng P, Zhou Y (2018) Detecting ponzi schemes on Ethereum: Towards healthier blockchain technology. In: Proceedings of the 2018 World Wide Web Conference WWW \u201918. International World Wide Web Conferences Steering Committee, Republic and Canton of Geneva, Switzerland, pp 1409\u20131418, https:\/\/doi.org\/10.1145\/3178876.3186046, (to appear in print)","DOI":"10.1145\/3178876.3186046"},{"key":"9852_CR8","doi-asserted-by":"publisher","unstructured":"Cordy JR, Roy CK (2011) The nicad clone detector. In: Proceedings of the 2011 IEEE 19th International Conference on Program Comprehension, IEEE Computer Society ICPC, USA, pp 219\u2013220, https:\/\/doi.org\/10.1109\/ICPC.2011.26, (to appear in print)","DOI":"10.1109\/ICPC.2011.26"},{"key":"9852_CR9","doi-asserted-by":"crossref","unstructured":"di Angelo M, Salzer G (2019) A survey of tools for analyzing Ethereum smart contracts. In: 2019 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPCON), pp 69\u201378","DOI":"10.1109\/DAPPCON.2019.00018"},{"key":"9852_CR10","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1007\/978-1-4612-5695-3_12","volume-title":"On the role of scientific thought","author":"EW Dijkstra","year":"1982","unstructured":"Dijkstra EW (1982) On the role of scientific thought. Springer, New York, NY, pp 60\u201366. https:\/\/doi.org\/10.1007\/978-1-4612-5695-3_12"},{"key":"9852_CR11","unstructured":"Economist T (2018) Blockchain technology may offer a way to re-decentralise the internet, The Economist Group Limited. [Online; accessed 10-August-2018]"},{"key":"9852_CR12","doi-asserted-by":"crossref","unstructured":"Fr\u00f6wis M, B\u00f6hme R (2017) In code we trust?. In: Data Privacy Management, Cryptocurrencies and Blockchain Technology Garcia-Alfaro, J Navarro-Arribas, G Hartenstein, H Herrera-Joancomart\u00ed, J. Springer International Publishing, Cham, pp 357\u2013372","DOI":"10.1007\/978-3-319-67816-0_20"},{"key":"9852_CR13","volume-title":"Design patterns: Elements of reusable object-oriented software","author":"E Gamma","year":"1995","unstructured":"Gamma E, Helm R, Johnson R, Vlissides J (1995) Design patterns: Elements of reusable object-oriented software. Addison-Wesley Reading, Boston, MA, USA"},{"key":"9852_CR14","doi-asserted-by":"crossref","unstructured":"Gao Z, Jayasundara V, Jiang L, Xia X, Lo D, Grundy J (2019) Smartembed: A tool for clone and bug detection in smart contracts through structural code embedding. In: Proceedings of the 35th International Conference on Software Maintenance and Evolution. ICSME \u201919","DOI":"10.1109\/ICSME.2019.00067"},{"key":"9852_CR15","doi-asserted-by":"publisher","unstructured":"G\u00f6de N, Koschke R (2009) Incremental clone detection. In: Proceedings of the 2009 European Conference on Software Maintenance and Reengineering. CSMR\u201909. IEEE Computer Society, USA, pp 219\u2013228, https:\/\/doi.org\/10.1109\/CSMR.2009.20, (to appear in print)","DOI":"10.1109\/CSMR.2009.20"},{"key":"9852_CR16","doi-asserted-by":"crossref","unstructured":"Grishchenko I, Maffei M, Schneidewind C (2018) Foundations and tools for the static analysis of Ethereum smart contracts. In: Computer Aided Verification Chockler, H Weissenbacher, G Springer International Publishing Cham, pp 51\u201378","DOI":"10.1007\/978-3-319-96145-3_4"},{"key":"9852_CR17","doi-asserted-by":"publisher","unstructured":"Hassan AE (2009) Predicting faults using the complexity of code changes. In: Proceedings of the 31st International Conference on Software Engineering. ICSE \u201909. IEEE Computer Society, Washington, DC, USA, pp 78\u201388, https:\/\/doi.org\/10.1109\/ICSE.2009.5070510, (to appear in print)","DOI":"10.1109\/ICSE.2009.5070510"},{"key":"9852_CR18","doi-asserted-by":"crossref","unstructured":"Hindle A, Barr ET, Su Z, Gabel M, Devanbu P (2012) On the naturalness of software. In: Proceedings of the 34th International Conference on Software Engineering. ICSE \u201912. IEEE Press, Piscataway, NJ, USA, pp 837\u2013847, http:\/\/dl.acm.org\/citation.cfm?id=2337223.2337322, (to appear in print)","DOI":"10.1109\/ICSE.2012.6227135"},{"key":"9852_CR19","unstructured":"Horwitz J, Huang Z (2018) \u201cCryptoKitties\u201d clones are already popping up in China. [Online; accessed 02-December-2019]"},{"key":"9852_CR20","doi-asserted-by":"crossref","unstructured":"Jakobsson M, Juels A (1999) Proofs of work and bread pudding protocols Proceedings of the IFIP TC6\/TC11 Joint Working Conference on Secure Information Networks: Communications and Multimedia Security. CMS \u201999. http:\/\/dl.acm.org\/citation.cfm?id=647800.757199. Kluwer, B.V., Deventer, The Netherlands, The Netherlands, pp 258\u2013272","DOI":"10.1007\/978-0-387-35568-9_18"},{"key":"9852_CR21","doi-asserted-by":"publisher","unstructured":"Jiang L, Misherghi G, Su Z, Glondu S (2007a) Deckard: Scalable and accurate tree-based detection of code clones. In: Proceedings of the 29th International Conference on Software Engineering. ICSE \u201907. IEEE Computer Society, Washington, DC, USA, pp 96\u2013105, https:\/\/doi.org\/10.1109\/ICSE.2007.30, (to appear in print)","DOI":"10.1109\/ICSE.2007.30"},{"key":"9852_CR22","doi-asserted-by":"publisher","unstructured":"Jiang L, Su Z, Chiu E (2007b) Context-based detection of clone-related bugs. In: Proceedings of the the 6th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on The Foundations of Software Engineering. ESEC-FSE \u201907. ACM, New York, NY, USA, pp 55\u201364, https:\/\/doi.org\/10.1145\/1287624.1287634, (to appear in print)","DOI":"10.1145\/1287624.1287634"},{"key":"9852_CR23","doi-asserted-by":"publisher","unstructured":"Juergens E, Deissenboeck F, Hummel B, Wagner S (2009) Do code clones matter?. In: Proceedings of the 31st International Conference on Software Engineering. ICSE \u201909. IEEE Computer Society, Washington, DC, USA, pp 485\u2013495, https:\/\/doi.org\/10.1109\/ICSE.2009.5070547, (to appear in print)","DOI":"10.1109\/ICSE.2009.5070547"},{"key":"9852_CR24","doi-asserted-by":"crossref","unstructured":"Kalra S, Goel S, Dhawan M, Sharma S (2018) ZEUS: analyzing safety of smart contracts. In: 25th Annual Network and Distributed System Security Symposium, NDSS 2018, San Diego, California, USA, February 18-21, 2018. NDSS \u201918. The Internet Society","DOI":"10.14722\/ndss.2018.23082"},{"key":"9852_CR25","unstructured":"Kaminska I (2017) It\u2019s not just a Ponzi, it\u2019s a \u2018smart\u2019 Ponzi. [Online; accessed 26-August-2018]"},{"issue":"7","key":"9852_CR26","doi-asserted-by":"publisher","first-page":"654","DOI":"10.1109\/TSE.2002.1019480","volume":"28","author":"T Kamiya","year":"2002","unstructured":"Kamiya T, Kusumoto S, Inoue K (July 2002) Ccfinder: A multilinguistic token-based code clone detection system for large scale source code. IEEE Trans. Softw. Eng. 28(7):654\u2013670. https:\/\/doi.org\/10.1109\/TSE.2002.1019480","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"6","key":"9852_CR27","doi-asserted-by":"publisher","first-page":"645","DOI":"10.1007\/s10664-008-9076-6","volume":"13","author":"CJ Kapser","year":"2008","unstructured":"Kapser CJ, Godfrey MW (2008) \u201ccloning considered harmful\u201d considered harmful: patterns of cloning in software. Empir Softw Eng 13(6):645. https:\/\/doi.org\/10.1007\/s10664-008-9076-6","journal-title":"Empir Softw Eng"},{"key":"9852_CR28","doi-asserted-by":"publisher","unstructured":"Kim M, Sazawal V, Notkin D, Murphy G (2005) An empirical study of code clone genealogies. In: Proceedings of the 10th European Software Engineering Conference Held Jointly with 13th ACM SIGSOFT International Symposium on Foundations of Software Engineering. ESEC\/FSE-13. ACM, New York, NY, USA, pp 187\u2013196, https:\/\/doi.org\/10.1145\/1081706.1081737, (to appear in print)","DOI":"10.1145\/1081706.1081737"},{"key":"9852_CR29","doi-asserted-by":"crossref","unstructured":"Koschke R Mens T, Demeyer S (eds) (2008) Identifying and removing software clones, 1st edn. Springer","DOI":"10.1007\/978-3-540-76440-3_2"},{"key":"9852_CR30","doi-asserted-by":"publisher","unstructured":"Liu H, Yang Z, Jiang Y, Zhao W, Sun J (2019) Enabling clone detection for Ethereum via smart contract birthmarks. In: Proceedings of the 27th International Conference on Program Comprehension. ICPC \u201919. IEEE Press, Piscataway, NJ, USA, pp 105\u2013115, https:\/\/doi.org\/10.1109\/ICPC.2019.00024, (to appear in print)","DOI":"10.1109\/ICPC.2019.00024"},{"key":"9852_CR31","doi-asserted-by":"publisher","unstructured":"Liu H, Yang Z, Liu C, Jiang Y, Zhao W, Sun J (2018) Eclone: Detect semantic clones in Ethereum via symbolic transaction sketch. In: Proceedings of the 2018 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering. ESEC\/FSE 2018. ACM, New York, NY, USA, pp 900\u2013903, https:\/\/doi.org\/10.1145\/3236024.3264596, (to appear in print)","DOI":"10.1145\/3236024.3264596"},{"issue":"OOPSLA","key":"9852_CR32","doi-asserted-by":"publisher","first-page":"84:1","DOI":"10.1145\/3133908","volume":"1","author":"CV Lopes","year":"2017","unstructured":"Lopes CV, Maj P, Martins P, Saini V, Yang D, Zitny J, Sajnani H, Vitek J (October 2017) D\u00e9j\u00e0vu: A map of code duplicates on github. Proc. ACM Program. Lang. 1(OOPSLA):84:1\u201384:28. https:\/\/doi.org\/10.1145\/3133908","journal-title":"Proc. ACM Program. Lang."},{"key":"9852_CR33","doi-asserted-by":"publisher","unstructured":"Luu L, Chu D-H, Olickel H, Saxena P, Hobor A (2016) Making smart contracts smarter. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. CCS \u201916. ACM, New York, NY, USA, pp 254\u2013269, https:\/\/doi.org\/10.1145\/2976749.2978309, (to appear in print)","DOI":"10.1145\/2976749.2978309"},{"key":"9852_CR34","doi-asserted-by":"publisher","unstructured":"Mockus A (2007) Large-scale code reuse in open source software. In: Proceedings of the First International Workshop on Emerging Trends in FLOSS Research and Development. FLOSS \u201907. IEEE Computer Society, Washington, DC, USA, pp 7\u2013, https:\/\/doi.org\/10.1109\/FLOSS.2007.10, (to appear in print)","DOI":"10.1109\/FLOSS.2007.10"},{"key":"9852_CR35","unstructured":"Popper N (2017) Understanding Ethereum, Bitcoin\u2019s Virtual Cousin, The New York Times. [Online; accessed 10-August-2018]"},{"key":"9852_CR36","unstructured":"Romano J, Kromrey JD, Coraggio J, Skowronek J (2006) Appropriate statistics for ordinal level data: Should we really be using t-test and Cohen\u2019sd for evaluating group differences on the NSSE and other surveys?. In: Annual meeting of the Florida Association of Institutional Research, pp 1\u20133"},{"key":"9852_CR37","doi-asserted-by":"crossref","unstructured":"Roos P (2015) Fast and precise statistical code completion. In: Proceedings of the 37th International Conference on Software Engineering - Volume 2. ICSE \u201915. http:\/\/dl.acm.org\/citation.cfm?id=2819009.2819158. IEEE Press, Piscataway, NJ, USA, pp 757\u2013759","DOI":"10.1109\/ICSE.2015.240"},{"issue":"7","key":"9852_CR38","doi-asserted-by":"publisher","first-page":"470","DOI":"10.1016\/j.scico.2009.02.007","volume":"74","author":"CK Roy","year":"2009","unstructured":"Roy CK, Cordy JR, Koschke R (May 2009) Comparison and evaluation of code clone detection techniques and tools: A qualitative approach. Sci. Comput. Program. 74(7):470\u2013495. https:\/\/doi.org\/10.1016\/j.scico.2009.02.007","journal-title":"Sci. Comput. Program."},{"key":"9852_CR39","unstructured":"Roy CK, Cordy JR (2007) A survey on software clone detection research Technical Report, School of Computing - Queen\u2019s University"},{"key":"9852_CR40","doi-asserted-by":"publisher","unstructured":"Sajnani H, Saini V, Svajlenko J, Roy CK, Lopes CV (2016) Sourcerercc: Scaling code clone detection to big-code. In: Proceedings of the 38th International Conference on Software Engineering. ICSE \u201916. Association for Computing Machinery, New York, NY, USA, pp 1157\u20131168, https:\/\/doi.org\/10.1145\/2884781.2884877, (to appear in print)","DOI":"10.1145\/2884781.2884877"},{"key":"9852_CR41","volume-title":"A mathematical theory of communication","author":"CE Shannon","year":"1963","unstructured":"Shannon CE, Weaver W (1963) A mathematical theory of communication. University of Illinois Press, Champaign, IL, USA"},{"issue":"10","key":"9852_CR42","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5120\/ijca2016908896","volume":"137","author":"A Sheneamer","year":"2016","unstructured":"Sheneamer A, Kalita J (2016) A survey of software clone detection techniques. International Journal of Computer Applications 137(10):1\u201321. Published by Foundation of Computer Science (FCS), NY, USA","journal-title":"International Journal of Computer Applications"},{"key":"9852_CR43","unstructured":"Skvorc B (2018) 15 Alternatives to CryptoKitties You Had No Idea Existed. [Online; accessed 02-December-2019]"},{"key":"9852_CR44","unstructured":"Swan M (2015) Blockchain: Blueprint for a new economy 1 O\u2019Reilly Media, Inc."},{"key":"9852_CR45","unstructured":"Szabo N (1994) Smart Contracts. [Online; accessed 26-August-2018]"},{"key":"9852_CR46","doi-asserted-by":"publisher","unstructured":"Tikhomirov S, Voskresenskaya E, Ivanitskiy I, Takhaviev R, Marchenko E, Alexandrov Y (2018) Smartcheck: Static analysis of Ethereum smart contracts. In: Proceedings of the 1st International Workshop on Emerging Trends in Software Engineering for Blockchain. WETSEB \u201918. ACM, New York, NY, USA, pp 9\u201316, https:\/\/doi.org\/10.1145\/3194113.3194115, (to appear in print)","DOI":"10.1145\/3194113.3194115"},{"issue":"1","key":"9852_CR47","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1016\/0304-3975(92)90143-4","volume":"92","author":"E Ukkonen","year":"1992","unstructured":"Ukkonen E (1992) Approximate string-matching with q-grams and maximal matches. Theor Comput Sci 92(1):191\u2013211. http:\/\/www.sciencedirect.com\/science\/article\/pii\/0304397592901434","journal-title":"Theor Comput Sci"},{"key":"9852_CR48","doi-asserted-by":"publisher","unstructured":"Wahler V, Seipel D, Gudenberg JW, Fischer G (2004) Clone detection in source code by frequent itemset techniques. In: Proceedings of the Source Code Analysis and Manipulation, Fourth IEEE International Workshop. SCAM \u201904. IEEE Computer Society, Washington, DC, USA, pp 128\u2013135, https:\/\/doi.org\/10.1109\/SCAM.2004.5, (to appear in print)","DOI":"10.1109\/SCAM.2004.5"},{"key":"9852_CR49","unstructured":"Wood G (2017) Ethereum: A Secure Decentralised Generalised Transaction Ledger - EIP-150 Revision. [Online; accessed 10-August-2018]"},{"key":"9852_CR50","doi-asserted-by":"publisher","unstructured":"Zheng P, Zheng Z, Luo X, Chen X, Liu X (2018) A detailed and real-time performance monitoring framework for blockchain systems. In: Proceedings of the 40th International Conference on Software Engineering: Software Engineering in Practice. ICSE-SEIP \u201918. ACM, New York, NY, USA, pp 134\u2013143, https:\/\/doi.org\/10.1145\/3183519.3183546, (to appear in print)","DOI":"10.1145\/3183519.3183546"}],"container-title":["Empirical Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-020-09852-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10664-020-09852-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-020-09852-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,9]],"date-time":"2021-09-09T00:16:56Z","timestamp":1631146616000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10664-020-09852-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,9]]},"references-count":50,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2020,11]]}},"alternative-id":["9852"],"URL":"https:\/\/doi.org\/10.1007\/s10664-020-09852-5","relation":{},"ISSN":["1382-3256","1573-7616"],"issn-type":[{"value":"1382-3256","type":"print"},{"value":"1573-7616","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,9,9]]},"assertion":[{"value":"9 September 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}