期刊文献+

标识符重命名不一致性缺陷的检测 被引量:4

Detection of identifier renaming inconsistency
下载PDF
导出
摘要 为解决已有的克隆代码及相关缺陷检测工具无法分析大型程序代码,又不能识别经过修改了的克隆代码的问题,在改进基于频繁子序列挖掘的克隆代码检测模型基础上,提出了基于序列挖掘的C克隆代码及标识符重命名不一致性缺陷检测模型.该模型改进了已有的忘记修改某标识符缺陷检测子模型,并增加了错误修改某标识符缺陷检测子模型,通过计算标识符未改变率来检测标识符重命名不一致性缺陷.实验表明,该模型能在克隆代码检测的基础上检测克隆代码引起的相关缺陷,降低了漏检率和误检率,适用于2种标识符重命名不一致性缺陷的检测. For solving the problem that the current clone and related bug detection tools can not analyze largescale code and detect modified code clones, a model of clone and identifier inconsistency bugs detection based on the improved model of clone detection via sequential pattern mining is proposed. This model improves the existing submodel of identifier forgotten renaming bug detection, and introduces a new submodel of identifier mistaken renaming bug detection. Identifier renaming inconsistency bugs are detected by computing identifier unchanged ratio (UnchangedRatio). Experiment results indicate that this model can detect clone related bugs on the basis of code clone detection, reduce false-negative rate and false-positive rate, and is effective in detecting two kinds of identifier inconsistency bugs.
出处 《哈尔滨工业大学学报》 EI CAS CSCD 北大核心 2011年第1期89-94,98,共7页 Journal of Harbin Institute of Technology
基金 国家自然科学基金资助项目(61073052) 高等学校博士学科点专项科研基金资助项目(20092302110040)
关键词 序列挖掘 克隆代码 标识符重命名不一致性 软件缺陷检测 sequential pattern mining code clone identifier inconsistency bug software bug detectiion
  • 相关文献

参考文献17

  • 1DUCASSE S, RIEGER M, DEMEYER S. A language independent approach for detecting duplicated code [ C ]//Proceedings of the IEEE International Conference on Software Maintenance. Washington. DC : ACM, 1999:109-118.
  • 2van RYSSELBERGHE F. Vingerafdrukken van code om duplieatie op te sporen [ D ]. Antwerpen : Master Thesis at Universiteit Antwerpen, 2002.
  • 3BAKER B S. A program for identifying duplicated code [ C]//Proceedings of Computing Science and Statistics 24th Symposium on the Interface Interface. New Jersey: Interface Foundation of North America, 1992:132 - 141.
  • 4BAKER B S. Parameterized duplication in strings: algorithms and an application to software maintenance [ C]//Proceedings of the 25th Annual ACM Symposium on Theory of Computing. New York, NY: ACM, 1993: 75 - 96.
  • 5BAKER B S. Parameterized duplication in strings: Algorithms and an application to software maintenance [J]. SIAM Journal on Computing,1997, 26(5) : 1343 - 1362.
  • 6CHURCH K W, HELFMAN J I. Dotplot: a program for exploring selfsimilarity in millions of lines of text and code [ J ]. Journal of Computational and Graphical Statistics, 1993, 2(2) 153 - 174.
  • 7KAMIYA T, KUSUMOTO S, INOUE K. CCFinder: a multilinguistic token-based code clone detection system for large scale source code [ J ]. IEEE Transacitions on Software Engineering, 2002, 28 (7) : 654 - 670.
  • 8BASIT H A, SMYTH W F, TURPIN A, et al. Efficient token based clone detection with flexible tokenizatiou [ C ]//Proceeding ESEC-FSE Companion '07 The 6th Joint Meeting on European software engineering conference and the ACM SIGSOFT symposium on the foundations of software engineering: companion papers. New York, NY: ACM, 2007:513-516.
  • 9WISE M J. YAP3 :. improved detection of similarities in computer program and other texts [ C ]//Proceedings of the Twenty-seventh SIGCSE Technical Symposium on Computer Science Education. New York, NY : ACM, 1996:130 - 134.
  • 10BAXTER I D, YAHIN A, MOURA L, et al. Clone detection using abstract syntax trees [ C ]//Proceedings of the International Conference Software Maintenance. Washington DC : IEEE Computer Society, 1998 : 368 - 377.

二级参考文献10

  • 1Baxter D,Yahin A,Moura L,et al.Clone detection using abstract syntax trees[C]//Proc.IEEE Int'l Conf.on Software Maintenance(ICSM)'98,Bethesda,Maryland,Nov.,1998:368-377.
  • 2Raghavan K,Susan H.Using slicing to identify duplication in source code[C]//Proc.of the 8th International Symposium on Static Analysis(SAS),Paris,France,2001(7):40-56.
  • 3Baker B.A program for identifying duplicated code[C]//Proceedings of Computing Science and Statistics,1992(24):49-57.
  • 4Baker B.On finding duplication and near-duplication in large software systems[C]//Proceedings of the Second Working Conference on Reverse Engineering(WCRE'95),Toronto,1995:86-95.
  • 5Raghavan K,Susan H.Tool demonstration:finding duplicated code using program dependences[C]// Proc.European Symposium on Programming Languages(ESOP),2001(4):383-386.
  • 6Martin F.Refactoring:Improving the design of existing code[M].Addison Wesley Longman,Inc.,Reading,Massachusetts,1999:1-20.
  • 7St'ephane D,Matthias R,Serge D.A language independent approach for detecting duplicated code[C]//Yang H J,White L.Proceedings ICSM'99(15th International Conference on Software Maintenanae),1999:109-118.
  • 8Kontogiannis K,et al.Pattern matching for clone and concept detection[J].Automated Software Engineering,1996(6):77-108.
  • 9Baker B.Parameterized duplication in strings:algorithms and an application to software maintenance[J].25th Annual ACM Symposium on Theory of Computing,1997,26(5):1343-1362.
  • 10Cory K,Godfrey M W.Toward a taxonomy of clones in source code:a case study[J].Amsterdam:Evolution of Large-scale Industrial Software Applications(ELISA),2003,18(2):61-82.

共引文献2

同被引文献33

  • 1刘文伟,刘坚.一个重建GCC抽象语法树的方法[J].计算机工程与应用,2004,40(18):125-128. 被引量:7
  • 2王成,刘金刚.一种改进的字符串匹配算法[J].计算机工程,2006,32(2):62-64. 被引量:26
  • 3Brenda S. Baker. A Program for Identifying Duplicated Code[C]. In Proceedings of Computing Science and Statistics: 24th Symposium on the Interface, Vol. 24:49-57, March 1992.
  • 4J Howard Johnson. Identifying Redundancy in Source Code Using Fingerprints [C]. In Proceeding of the 1993 Conference of the Centre for Advanced Studies Conference (CASCON' 93), pp. 171-183, Toronto, Canada, October 1993.
  • 5S, Ducasse, M. Rieger, S. Demeyer, A Language Independent Approach for Detecting Duplicated Code [C]. in:Proceedings of the 15th International Conference on Software Maintenance, ICSM 1999, pp. 109-1 18.
  • 6Li, Z., Lu, S., Myagmar, S., et al. CP-Miner: A tool for finding copy-paste and related bugs in operating system code [C]. In OSDI, 2004:289-302.
  • 7Toshihiro Kamiya, Shinji Kusumoto, Katsuro Inoue. CCFinder: A multilinguistic token-based code clone detection system for large scale source code [J]. IEEE Transactions on Software Engineering, 2002,28(7):654-670.
  • 8Muddu, B. , Asadullah, A., Bhat, V 7th International Workshop on Digital Software Clones (IWSC)[C],2013 2013 , Page(s): 39- 45.
  • 9Baxter, A. Yahin, L. Moura , et al. Clone Detection Using Abstract Syntax Trees[C]. In ICSM, pp. 368-377, 1998.
  • 10S. Bellon, R. Koschke, G. Antoniol, et al. Comparison and Evaluation of Clone Detection Tools[J]. IEEE TSE,2007,33(9):577-591.

引证文献4

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部