CFP last date
22 April 2024
Reseach Article

Code Cloning: The Analysis, Detection and Removal

by Mohammed Abdul Bari, Shahanawaj Ahamad
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 20 - Number 7
Year of Publication: 2011
Authors: Mohammed Abdul Bari, Shahanawaj Ahamad
10.5120/2444-3300

Mohammed Abdul Bari, Shahanawaj Ahamad . Code Cloning: The Analysis, Detection and Removal. International Journal of Computer Applications. 20, 7 ( April 2011), 34-38. DOI=10.5120/2444-3300

@article{ 10.5120/2444-3300,
author = { Mohammed Abdul Bari, Shahanawaj Ahamad },
title = { Code Cloning: The Analysis, Detection and Removal },
journal = { International Journal of Computer Applications },
issue_date = { April 2011 },
volume = { 20 },
number = { 7 },
month = { April },
year = { 2011 },
issn = { 0975-8887 },
pages = { 34-38 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume20/number7/2444-3300/ },
doi = { 10.5120/2444-3300 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:07:10.805376+05:30
%A Mohammed Abdul Bari
%A Shahanawaj Ahamad
%T Code Cloning: The Analysis, Detection and Removal
%J International Journal of Computer Applications
%@ 0975-8887
%V 20
%N 7
%P 34-38
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The coping, modifying a block of code is identified as cloning and is the most basic means of software reuse. It has been extensively used within the software development community. An official survey which is carried out within large, long term software development project suggested that 25-30% of modules in system may be cloned. This paper begins with background concept of code cloning, presents overcall taxonomy of current techniques and tools, and classify evolution tools in two different format as static code clone and dynamic code cloning, this together presented with program analysis, secondly as a solution the static code is divided into four parts as T1, T2, T3, T4, to finally develop a process to detect and remove code cloning.

References
  1. N. Davey, S.D.H Fied, R.J.Frank and D.S.W.Tansley “ The Development of a Software Clone Detector”, University of Hertfordshire , UK, 1995.
  2. Chanchal K.Roy,James R. Cordy, Rainer Koschke ,” Comparison and Evaluation of Code Clone Detection Techniques and Tools: A Qualitative Approach “, School of Computing ,Queen’s University , Canada ,2009.
  3. Chanchal Kumar Roy and James R. Cordy ,” A Survey on Software Clone Detection Research “, School of Computing ,Queen’s University ,Canada, 2007.
  4. J Howard Johnson,” Identifying Redundancy in Source Code Using Fingerprints”, In Proceeding of the Conference of the Centre for Advanced Studies Conference (CASCON’93), Toronto, Canada, October 1993.
  5. Brenda Baker, “On Finding Duplication and Near-Duplication in Large Software Systems”, In Proceedings of the Second Working Conference on Reverse Engineering (WCRE’95), Toronto, Ontario, Canada, July 1995.
  6. B. Baker, “On Finding Duplication and Near-Duplication in Large Software Systems”, in Proceedings of the 2nd Working Conference on Reverse Engineering, WCRE 1995, (1995)
  7. Wikipedia, “Static Code Analysis “, 2010.
  8. Thomas LaToza, “A Literature Review of Clone Detection Analysis “, 2005.
  9. Martin Johns, “A Practical Guide to Vulnerability Checkers “, University of Hamburg, 2006.
  10. R. Komondoor and S. Horwitz, “Using Slicing to Identify Duplication in Source Code”, in: Proceedings of the 8th Int. Symposium on Static Analysis, (2001).
  11. J. Krinke, “Identifying Similar Code with Program Dependence Graphs”, in Proceedings of the 8th Working Conference on Reverse Engineering, (2001).
  12. K. Kontogiannis, R. DeMori, E. Merlo, M. Galler, and M. Bernstein, “Pattern Matching for Clone and Concept Detection, Journal of Automated Soft. Engg., 1996.
  13. J. Mayrand, C. Leblanc and E. Merlo,” Experiment on the Automatic Detection of Function Clones in a Software System Using Metrics, in proceedings of the 12th International Conference on Software Maintenance, 1996.
  14. N. Davey, P. Barson, S. Field and R. Frank,” The Development of a Software Clone Detector”, International Journal of Applied Software Technology, 1996.
  15. J. Mayrand, C. Leblanc and E. Merlo,” Experiment on the Automatic Detection of Function Clones in a Software System Using Metrics”, in Proceedings of the 12th Int. Conference on Software Maintenance, ICSM 1996.
  16. R. Koschke, R. Falke and P. Frenzel,” Clone Detection Using Abstract Syntax Suffix Trees” in Proceedings of the 13th Working Conference on Reverse Engg. WCRE 2006.
  17. C.K. Roy and J.R. Cordy, NICAD, “Accurate Detection of Near-Miss Intentional Clones Using Flexible Pretty- Printing and Code Normalization” in Proceedings of the 16th IEEE International Conference on Program Comprehension, ICPC 2008.
  18. T. Kamiya, S. Kusumoto and K. Inoue, CCFinder: A Multilinguistic, “Token-Based Code Clone Detection System for Large Scale Source Code”, IEEE Transactions on Software Engineering,2008.
  19. B. Baker,” A Program for Identifying Duplicated Code”, in: Proceedings of Computing Science and Statistics 24th Symposium on the Interface, 2004.
  20. I. Baxter, A. Yahin, L. Moura and M. Anna,” Clone Detection Using Abstract Syntax Trees”, in Proceedings of the 14th International Conference on Software Maintenance, 2008.
  21. V. Wahler, D. Seipel, J. Gudenberg and G. Fischer, “Clone Detection in Source Code by Frequent Itemset Techniques”, in Proceedings of the 4th IEEE International Workshop Source Code Analysis and Manipulation, 2004.
Index Terms

Computer Science
Information Sciences

Keywords

Code Clone Static Code Clone Dynamic Code Clone Legacy Program Program Analysis