Analyzing Stack Flows to Compare Java Programs

Cited 6 time in webofscience Cited 0 time in scopus
  • Hit : 735
  • Download : 0
DC FieldValueLanguage
dc.contributor.authorLim, HIko
dc.contributor.authorHan, Taisookko
dc.date.accessioned2013-03-11T02:33:02Z-
dc.date.available2013-03-11T02:33:02Z-
dc.date.created2012-04-18-
dc.date.created2012-04-18-
dc.date.issued2012-02-
dc.identifier.citationIEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E95D, no.2, pp.565 - 576-
dc.identifier.issn0916-8532-
dc.identifier.urihttp://hdl.handle.net/10203/98046-
dc.description.abstractThis paper presents a method for comparing and detecting clones of Java programs by analyzing program stack flows. A stack flow denotes an operational behavior of a program by describing individual instructions and stack movements for performing specific operations. We analyze stack flows by simulating the operand stack movements during execution of a Java program. Two programs for detection of clones of Java programs are compared by matching similar pairs of stack flows in the programs. Experiments were performed on the proposed method and compared with the earlier approaches of comparing Java programs, the Tamada, k-gram, and stack pattern based methods. Their performance was evaluated with real-world Java programs in several categories collected from the Internet. The experimental results show that the proposed method is more effective than earlier methods of comparing and detecting clones of Java programs.-
dc.languageEnglish-
dc.publisherIEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG-
dc.subjectSOFTWARE THEFT-
dc.subjectBIRTHMARKS-
dc.titleAnalyzing Stack Flows to Compare Java Programs-
dc.typeArticle-
dc.identifier.wosid000300471900033-
dc.identifier.scopusid2-s2.0-84856405303-
dc.type.rimsART-
dc.citation.volumeE95D-
dc.citation.issue2-
dc.citation.beginningpage565-
dc.citation.endingpage576-
dc.citation.publicationnameIEICE TRANSACTIONS ON INFORMATION AND SYSTEMS-
dc.identifier.doi10.1587/transinf.E95.D.565-
dc.contributor.localauthorHan, Taisook-
dc.contributor.nonIdAuthorLim, HI-
dc.type.journalArticleArticle-
dc.subject.keywordAuthorsoftware clone detection-
dc.subject.keywordAuthorsoftware copyright protection-
dc.subject.keywordAuthorJava bytecode analysis-
dc.subject.keywordPlusSOFTWARE THEFT-
dc.subject.keywordPlusBIRTHMARKS-
Appears in Collection
CS-Journal Papers(저널논문)
Files in This Item
There are no files associated with this item.
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 6 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0