Call for Paper - January 2022 Edition
IJCA solicits original research papers for the January 2022 Edition. Last date of manuscript submission is December 20, 2021. Read More

A Survey on Trending Algorithms for Software Code Clone Detection

International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2017
Rashmi Sharma, Brahmaleen Kaur Sidhu

Rashmi Sharma and Brahmaleen Kaur Sidhu. A Survey on Trending Algorithms for Software Code Clone Detection. International Journal of Computer Applications 170(5):8-14, July 2017. BibTeX

	author = {Rashmi Sharma and Brahmaleen Kaur Sidhu},
	title = {A Survey on Trending Algorithms for Software Code Clone Detection},
	journal = {International Journal of Computer Applications},
	issue_date = {July 2017},
	volume = {170},
	number = {5},
	month = {Jul},
	year = {2017},
	issn = {0975-8887},
	pages = {8-14},
	numpages = {7},
	url = {},
	doi = {10.5120/ijca2017914835},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}


Most of the developers indulged in the coding phase of SDLC, try to copy the code that occurs again and again in the code, hence it becomes difficult to maintain the cloned data. If two functions or templates from a single source code are similar then it would be referred as “code clones”. Cloning in the code can lead to the obstacles in the maintenance phase of the software. It also increases the probability corresponding to the occurrence of bugs in the software. When a code is reused by copy-paste, then it referred as “software clone”. In order to detect the clone from the source code each and every template of the code is evaluated corresponding to the source code. The detection of clone is an issue hence various techniques had been developed in previous research works by various researchers for the detection of clone. In this study a brief introduction is given about the clones in the code, its types, reason of cloning, and process of clone detection. The second section depicts the clone detection techniques with their limitations and advantages. The traditional work conducted in this field is described in the third section of the study under the segment of related work.


  1. Chanchal K. Roy, James R. Cordy and Rainer Koschke, “Comparison and evaluation of code clone detection techniques and tools: a qualitative approach”, Elsevier, Vol 74, Pp 470-495, 2009
  2. Martin White, Michele Tufano, Christopher Vendome and Denys Poshyvanyk,“Deep Learning code fragments for code clone detection”, ACM, International Conference of on Automated Software Engineering, Pp 87-98, 2016
  3. Benjamin Hummel, Elmar Juergens Lars Heinemann and Michael Conradit, “Index based code clone detection: Incremental, Distributed, Scalable”, IEEE, Pp 1-9, 2010
  4. Yoshiki Higo, Toshihiro Kamiya, Kusumoto and Katsuro Inoue “Methods and implementation for investigating code clones in a software system”, Elsevier, Vol 49, Issue 9-10, Pp 985-998, 2007
  5. Shruti Jadon , “Code clones detection using machine learning techniques: support vector machine”, IEEE, International Conference of computing, communication and automation, Pp 299-303, 2017
  6. Fang Hsiang Su, Jonathan Bell, and Gail Kaiser “Challenges and Behavioral code clone detection”, IEEE, International conference on Software analysis, evolution and reengineering, Pp 21-22, 2016
  7. Siim Larus and karl Kilgi, “Code Clone Detection using wavelets”, IEEE, Pp 8-14, 2015
  8. Kavitha Esther Rajakumari and T. Jebarajan, “A novel approach to effective detection and analysis of code clones”, IEEE, Pp 287-290, 2013
  9. Ritesh V.Patil, Lalit V. Patil, Sachin V. Shinde and S. D. Joshi, “Software code cloning detection and future scope development- latest short review”, IEEE, International conference on recent advances and innovation in engineering, Pp 1-4, 2014
  10. Mai Iwamoto,  Shunsuke Oshima and  Takuo Nakashima, “Token based code clone detection techniques in a student’s programming excercise”, IEEE, International conference on broadband wireless computing communication and application, Pp 650-655, 2012
  11. Toshihiro kamiya, Shinji Kusumoto and Katsuro Inouel, “A multi-Linguistic Token Based Code Clone Detection System for Large Scale Source code”, IEEE, Pp 1-37, 2002,
  12. Stephane Ducasse, “A Language Independent Approach for detecting Duplicate Code”, IEEE, Pp 1-10, 1995
  13. Simone Livieri, “Very ALrge Scale Code Clone Analysis and Visualization of Open Source Programs Using Distributed CCFinder:DCCFinder”, IEEE, Pp 1-10,2007,
  14. Chanchal K. Roy, “An Empirical study of functions clones in open Source Software”, IEEE, Pp 1-10, 2008
  15. Elmar Juergens, “Do Code Clone Matters?”, IEEE, Pp 485-495, 2009
  16. Ginika Mahajan., “Implementing a 3-Way Approach of Clone Detection and Removal using PC Detector Tool”, in Proceedings of IEEE 2014, International Conference on Program Comprehension, pp.242-245,
  17. Nicolas Bettenburg , “An empirical study on inconsistent changes to code clones at the release level “ ELSEVIER ,2010, Pp 1-17
  18. Nam H. Pham, “Complete and Accurate Clone Detection in Graph-based Models”, IEEE, May 16-24, 2009, Pp286-276
  19. Elmar Juergens, “Do Code Clone Matters?”, IEEE, Pp 485-495, 2009
  20. Kuldeep Kaur and Dr. Raman Maini, “A Comprehensive review of code clone detection Techniques”, IJLTEMAS, Vol 4, Issue 12, Pp 43-47, 2015
  21. Abdullah Sheneamer and Jugal Kalita, “A Survey of Software Clone Detection Techniques”, International Journal of Computer Applications, Vol 137, Issue 10, Pp 1-21, 2016
  22. Nils Gode, “Clone Removal: Fact or Fiction?”, ACM, Proceedings of the 4th International Workshop on Software Clones , Pp 33-40, 2010
  23. Tahira Khatoon, Priyansha Singh and Shiksha Sukla “Abstract Sytax Tree Based Clone detection for java project”, IOSR journal of Engineering, Vol 2, Issue 12. Pp 45-47, 2012
  24. Dhavleesh Rattan, rajesh Bhatia and Maninder Singh “Software Clone detection : a systematic review”, Elsevier, Vol 55, Issue 7, Pp 1165-1199, 2013
  25. Michel Chilowicz , Etienne Duris and Gilles Roussel “Viewing functions as token sequence to highlight similarities in source code”, Elsevier, Vol 78, Issue 10, Pp 1871-1891, 2013
  26. Yong Yuan and Yao Guo, “Boreas: An Accurate and Scalable Token-Based Approach to Code Clone Detection”, IEEE, Pp 286-289, 2012
  27. Rochelle and Garry TR Leavens, “Semantic clone detection using method IOE-behavior”, IEEE, Proceeding IWCS, Pp 80-81, 2012
  28. Theirry Lavoie and Ettore Merlo, “An accurate estimation of the Levenshtein distance using metric trees and Manhattan distance”, IEEE, Proceedings in ISWC, Pp 7-15, 2012
  29. Ira D. Baxter, Andrew Yahin, Leonardo Moura, Marcelo Sant Anna and Lorraine Bier, “Clone Detection using Abstract Syntax Tree", IEEE, Proceeding of ICSM’98, Pp 1-11, 2012
  30. Dandan Kong, Xiaohong Su ;  Shitang Wu ;  Tiantian Wang ;  Peijun Ma “Detect functionally equivalent code fragments via k-nearest neighbor algorithm”, IEEE, ICACI, Pp 94-98, 2012


Source Code, Code Clone, Fragments, Lexical Clone, Semantic Clone, Syntactical Clone, Textual Clone