Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1370256.1370279acmotherconferencesArticle/Chapter ViewAbstractPublication PagesuccsConference Proceedingsconference-collections
poster

Towards a mutation-based automatic framework for evaluating code clone detection tools

Published: 12 May 2008 Publication History
  • Get Citation Alerts
  • Abstract

    In the last decade, a great many code clone detection tools have been proposed. Such a large number of tools calls for a quantitative comparison, and there have been several attempts to empirically evaluate and compare many of the state-of-the-art tools. However, a recent study shows that there are several factors that could influence the the validity of the results of such comparisons. In order to overcome the effects of such factors (at least in part), in this student poster paper we outline a mutation-based controlled frame-work for evaluating clone detection tools using edit-based mutation operators that model cloning actions. While the framework is not yet completely implemented and as yet we do not have experimental data, we anticipate that such a framework will provide a useful contribution to the community by providing a more solid objective foundation for tool evaluation.

    References

    [1]
    J. H. Andrews, L. C. Briand and Y. Labiche. Is Mutation an Appropriate Tool for Testing Experiments? In ICSE, pp. 402--411, 2005.
    [2]
    B. S. Baker. Finding Clones with Dup: Analysis of an Experiment. IEEE TSE, Vol. 33(9):608--621, 2007.
    [3]
    B. Baker. On Finding Duplication and Near-Duplication in Large Software Systems. In WCRE, pp. 86--95, 1995.
    [4]
    S. Bellon, R. Koschke, G. Antoniol, J. Krinke and E. Merlo. Comparison and Evaluation of Clone Detection Tools. IEEE TSE, Vol. 33(9): 577--591. 2007.
    [5]
    M. Bruntink, A. Deursen, R. Engelen and T. Tourwe. On the Use of Clone Detection for Identifying Crosscutting Concern Code. IEEE TSE, 31(10): 804--818, 2005.
    [6]
    E. Burd and J. Bailey. Evaluating Clone Detection Tools for Use during Preventative Maintenance. In SCAM, pp. 36--43, 2002.
    [7]
    J. R. Cordy. The TXL source transformation language. Science of Computer Programming, 61(3):190--210, 2006.
    [8]
    J. Johnson. Visualizing Textual Redundancy in Legacy Source. In CASCON, pp. 171--183, 1994.
    [9]
    C. Kapser and M. Godfrey. "Cloning Considered Harmful" Considered Harmful. In WCRE, pp. 19--28, 2006.
    [10]
    M. Kim and G. Murphy. An Empirical Study of Code Clone Genealogies. In FSE, pp. 187--196, 2005.
    [11]
    R. Koschke, R. Falke and P. Frenzel. Clone Detection Using Abstract Syntax Suffix Trees. In WCRE, pp. 253--262, 2006.
    [12]
    Z. Li, S. Lu, S. Myagmar and Y. Zhou. CP-Miner: Finding Copy-Paste and Related Bugs in Large-Scale Software Code. IEEE TSE, 32(3):176--192, 2006.
    [13]
    C. K. Roy and J. R. Cordy. A Survey on Software Clone Detection Research. School of Computing TR 2007-541, Queen's University, 115 pp., 2007.
    [14]
    C. K. Roy and J. R. Cordy. Scenario-Based Comparison of Clone Detection Techniques. In ICPC, 10 pp., 2008 (to appear).
    [15]
    C. K. Roy and J. R. Cordy. NICAD: Accurate Detection of Near-Miss Intentional Clones Using Flexible Pretty-Printing and Code Normalization. In ICPC, 10 pp., 2008 (to appear).
    [16]
    F. V. Rysselberghe and S. Demeyer. Evaluating Clone Detection Techniques. In ELISA, 12pp., 2003.

    Cited By

    View all
    • (2023)Code Cloning in Smart Contracts on the Ethereum Platform: An Extended Replication StudyIEEE Transactions on Software Engineering10.1109/TSE.2022.320742849:4(2006-2019)Online publication date: 1-Apr-2023
    • (2021)BigCloneBenchCode Clone Analysis10.1007/978-981-16-1927-4_7(93-105)Online publication date: 4-Aug-2021
    • (2019)The Mutation and Injection Framework: Evaluating Clone Detection Tools with Mutation AnalysisIEEE Transactions on Software Engineering10.1109/TSE.2019.2912962(1-1)Online publication date: 2019
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    C3S2E '08: Proceedings of the 2008 C3S2E conference
    May 2008
    240 pages
    ISBN:9781605581019
    DOI:10.1145/1370256
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    • BytePress
    • Concordia University: Concordia University

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 12 May 2008

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. clone detection techniques
    2. evaluation
    3. framework
    4. maintenance
    5. mutation analysis
    6. software engineering

    Qualifiers

    • Poster

    Conference

    C3S2E '08
    Sponsor:
    • Concordia University

    Acceptance Rates

    Overall Acceptance Rate 12 of 42 submissions, 29%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)3
    • Downloads (Last 6 weeks)0

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)Code Cloning in Smart Contracts on the Ethereum Platform: An Extended Replication StudyIEEE Transactions on Software Engineering10.1109/TSE.2022.320742849:4(2006-2019)Online publication date: 1-Apr-2023
    • (2021)BigCloneBenchCode Clone Analysis10.1007/978-981-16-1927-4_7(93-105)Online publication date: 4-Aug-2021
    • (2019)The Mutation and Injection Framework: Evaluating Clone Detection Tools with Mutation AnalysisIEEE Transactions on Software Engineering10.1109/TSE.2019.2912962(1-1)Online publication date: 2019
    • (2018)Benchmarks for software clone detection: A ten-year retrospective2018 IEEE 25th International Conference on Software Analysis, Evolution and Reengineering (SANER)10.1109/SANER.2018.8330194(26-37)Online publication date: Mar-2018
    • (2015)Evaluating clone detection tools with BigCloneBenchProceedings of the 2015 IEEE International Conference on Software Maintenance and Evolution (ICSME)10.1109/ICSM.2015.7332459(131-140)Online publication date: 29-Sep-2015
    • (2013)ForkSim: Generating software forks for evaluating cross-project similarity analysis tools2013 IEEE 13th International Working Conference on Source Code Analysis and Manipulation (SCAM)10.1109/SCAM.2013.6648182(37-42)Online publication date: Sep-2013
    • (2013)LHDiffProceedings of the 2013 IEEE International Conference on Software Maintenance10.1109/ICSM.2013.34(230-239)Online publication date: 22-Sep-2013
    • (2011)An Analysis and Survey of the Development of Mutation TestingIEEE Transactions on Software Engineering10.1109/TSE.2010.6237:5(649-678)Online publication date: 1-Sep-2011
    • (2010)An evaluation framework for plagiarism detectionProceedings of the 23rd International Conference on Computational Linguistics: Posters10.5555/1944566.1944681(997-1005)Online publication date: 23-Aug-2010
    • (2009)Comparison and evaluation of code clone detection techniques and toolsScience of Computer Programming10.1016/j.scico.2009.02.00774:7(470-495)Online publication date: 1-May-2009
    • Show More Cited By

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media