a comparison of code similarity analyzers
play

A Comparison of Code Similarity Analyzers C. Ragkhitwetsagul, J. - PowerPoint PPT Presentation

A Comparison of Code Similarity Analyzers C. Ragkhitwetsagul, J. Krinke, D. Clark SCAM 16, EMSE (under reviewed) 1 Photo: https://c1.staticflickr.com/1/316/31831180223_38db905f28_c.jpg When source code is copied and modified, which


  1. A Comparison of Code Similarity Analyzers C. Ragkhitwetsagul, J. Krinke, D. Clark SCAM ’16, EMSE (under reviewed) 1 Photo: https://c1.staticflickr.com/1/316/31831180223_38db905f28_c.jpg

  2. “When source code is copied and modified, which code similarity detection techniques or tools get the most accurate results?” 2

  3. Bellon et al. (TSE 2007) Roy et al. (Sci Comp Prog. 2009) Hage et al. (CSERC 2010) Biegel et al. (MSR ’11) 3

  4. The selected tools are limited to only a subset of 1 clone or plagiarism detectors 
 (and their parameters). 2 The results are based on di ff erent data sets. 4

  5. 30 tools 5

  6. Pervasive Modifications From: https://www.princeton.edu/pr/pub/integrity/pages/plagiarism/ /* ORIGINAL */ /* PERVASIVELY MODIFIED CODE */ private static int partition 
 private static int partition (Comparable[] a, int lo, int hi) { 
 ( int [] bob, int left, int right){ 
 int i = lo; 
 int x = left; 
 int j = hi+1; 
 int y = right+1; 
 Comparable v = a[lo]; 
 for (;;) { 
 while ( true ) { 
 while ( less (bob[left],bob[--y])) 
 while ( less (a[++i], v)) { 
 if (y == left) break ; 
 if (i == hi) break ; 
 while ( less (bob[++x],bob[left])) 
 } 
 if (x == right) break ; 
 while ( less (v, a[--j])) { 
 if (x >= y) break ; 
 if (j == lo) break ; 
 swap (bob, y, x); 
 } 
 } 
 if (i >= j) break ; 
 swap (bob, y, left); 
 exch (a, i, j); 
 return y; 
 } 
 } exch (a, lo, j); 
 return j; 
 } SW Plagiarism clone evolution refactoring 6

  7. 7

  8. pervasively to be used in modified code detection phase bytecode source pervasively modified code decompilers compiler obfuscator obfuscator ARTIFICE original ProGuard Krakatau javac BubbleSort.java EightQueens.java Procyon GuessWord.java TowerOfHanoi.java InfixConverter.java Kapreka_Tran.java MagicSquare.java RailRoadCar.java SLinkedList.java SqrtAlgorithm.java 8

  9. Boiler-Plate Code Flores E., Rosso P ., Moreno L., Villatoro-Tello E. (2014) Detection of SOurce COde re-use (SOCO). http://users.dsic.upv.es/grupos/nle/soco/ 9

  10. Parameter Settings 10 Jonathan H. Ward (Wikipedia CC BY-SA 3.0)

  11. 11

  12. Similarity Report InfC/ InfC/ InfC/ InfC/ InfC/ InfC/ InfC/ InfC/ InfC/ InfC/ Sqrt/ Sqrt/ … Squr/ Squr/ orig artfc orig orig orig orig artfc artfc artfc artfc orig artfc artfc artfc no no pg pg no no pg pg pg pg kraka procy kraka procy kraka procy kraka procy kraka procy tau on tau on tau on tau on tau on InfConv/orig 100 55 36 63 32 43 34 60 31 43 20 20 … 14 17 InfConv/artifice 55 100 35 54 33 39 37 56 32 39 19 30 … 14 17 InfConv/orig_no_krakatau 36 35 100 38 60 26 80 35 59 26 13 14 … 28 17 InfConv/orig_no_procyon 63 54 38 100 34 58 37 80 34 58 21 20 … 15 21 InfConv/orig_pg_krakatau 32 33 60 34 100 33 61 33 82 33 17 17 … 29 20 InfConv/orig_pg_procyon 43 39 26 58 33 100 26 59 33 100 19 20 … 14 21 InfConv/artific_no_krakatau 34 37 80 37 61 26 100 36 59 26 14 14 … 28 17 InfConv/artifice_no_procyon 60 56 35 80 33 59 36 100 32 59 19 20 … 15 19 InfConv/artifice_pg_krakatau 31 32 59 34 82 33 59 32 100 33 15 16 … 28 17 InfConv/artifice_pg_procyon 43 39 26 58 33 100 26 59 33 100 19 20 … 14 21 Sqrt/orig 20 19 13 21 17 19 14 19 15 19 100 32 … 14 16 Sqrt/artifice 20 30 14 20 17 20 14 20 16 20 32 100 … 15 18 … … … … … … … … … … … … … … … … Square/artifice_pg_krakatau 14 14 28 15 29 14 28 15 28 14 14 15 … 100 32 Square/artifice_pg_procyon 17 17 17 21 20 21 17 19 17 21 16 18 … 32 100 12

  13. Similarity Threshold = 50 InfC/ InfC/ InfC/ InfC/ InfC/ InfC/ InfC/ InfC/ InfC/ InfC/ Sqrt/ Sqrt/ … Squr/ Squr/ orig artfc orig orig orig orig artfc artfc artfc artfc orig artfc artfc artfc no no pg pg no no pg pg pg pg kraka procy kraka procy kraka procy kraka procy kraka procy tau on tau on tau on tau on tau on InfConv/orig 100 55 36 63 32 43 34 60 31 43 20 20 … 14 17 InfConv/artifice 55 100 35 54 33 39 37 56 32 39 19 30 … 14 17 InfConv/orig_no_krakatau 36 35 100 38 60 26 80 35 59 26 13 14 … 28 17 InfConv/orig_no_procyon 63 54 38 100 34 58 37 80 34 58 21 20 … 15 21 InfConv/orig_pg_krakatau 32 33 60 34 100 33 61 33 82 33 17 17 … 29 20 InfConv/orig_pg_procyon 43 39 26 58 33 100 26 59 33 100 19 20 … 14 21 InfConv/artific_no_krakatau 34 37 80 37 61 26 100 36 59 26 14 14 … 28 17 InfConv/artifice_no_procyon 60 56 35 80 33 59 36 100 32 59 19 20 … 15 19 InfConv/artifice_pg_krakatau 31 32 59 34 82 33 59 32 100 33 15 16 … 28 17 InfConv/artifice_pg_procyon 43 39 26 58 33 100 26 59 33 100 19 20 … 14 21 Sqrt/orig 20 19 13 21 17 19 14 19 15 19 100 32 … 14 16 Sqrt/artifice 20 30 14 20 17 20 14 20 16 20 32 100 … 15 18 … … … … … … … … … … … … … … … … Square/artifice_pg_krakatau 14 14 28 15 29 14 28 15 28 14 14 15 … 100 32 Square/artifice_pg_procyon 17 17 17 21 20 21 17 19 17 21 16 18 … 32 100 13

  14. Best Threshold 1.00 F-measure = 0.8282 0.75 F-measure 0.50 0.25 31 0.00 0 5 10 15 20 25 30 35 40 45 50 55 60 65 70 75 80 85 90 95 100 Threshold Value (T) 14

  15. Optimal Configuration Best Param Settings Best Threshold Pervasive: 14,880,000 pairwise comparisons SOCO: 99,816,528 pairwise comparisons Icons made by Freepik from www.flaticon.com is licensed by Creative Commons BY 3.0 15

  16. ccfx deckard Clone 
 iclones det. nicad simian jplag-java jplag-text Plag 
 plaggie det. sherlock simjava simtext 7zncd-BZip2 7zncd-Deflate 7zncd-Deflate2 Pervasive 7zncd-LZMA 7zncd-Deflate64 Mod. 7zncd-PPMd bzip2ncd gzipncd Comp. icd ncd-bzlib ncd-zlib xz-ncd bsdiff diff Others difflib fuzzywuzzy jellyfish ngram cosine F1 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1

  17. ccfx deckard Clone 
 iclones det. nicad simian jplag-java jplag-text Plag 
 plaggie det. sherlock simjava simtext 7zncd-BZip2 7zncd-Deflate 7zncd-Deflate2 Boiler- 7zncd-LZMA 7zncd-Deflate64 Plate 7zncd-PPMd bzip2ncd gzipncd Comp. icd ncd-bzlib ncd-zlib xz-ncd bsdiff diff Others difflib fuzzywuzzy jellyfish ngram cosine F1 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1

  18. Highly specialised source code similarity detection techniques and tools can perform better than more general, compression & textual similarity measures. Interesting: difflib and fuzzywuzzy. Icons made by Freepik from www.flaticon.com is licensed by Creative Commons BY 3.0 18

  19. Optimal Configurations CCFX’s Precision vs. Recall Measure Value ccfx’s params b t Precision 1.00 19 7, 8, 9 Recall 0.98 5 12 19

  20. CCFX Optimal Config. 20

  21. b = 5, t = 11, 12 b = 19, t = 7, 8, 9 21

  22. Pervasive Boiler- Plate Mod.

  23. The optimal configurations derived from one data set has a detrimental impact on the similarity detection results for another data set. Cbuckley, Jpowell on en.wikipedia Icons made by Freepik from www.flaticon.com is licensed by Creative Commons BY 3.0 23

  24. javac Krakatau Procyon Normalisation by Decompilation Pervasively modified Normalisation Normalised code code Decompile Compile 24

  25. ccfx deckard Clone 
 iclones det. nicad simian jplag-java jplag-text plaggie Plag 
 det. sherlock simjava simtext 7zncd-BZip2 7zncd-Deflate 7zncd-Deflate2 Orig. 7zncd-LZMA 7zncd-LZMA2 7zncd-PPMd Dec. bzip2ncd gzipncd Comp. icd ncd-bzlib ncd-zlib xz-ncd bsdiff diff Others py-difflib py-fuzzywuzzy py-jellyfish py-ngram py-sklearn 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 F1 F1

  26. Compilation and decompilation can be used as an effective normalisation method that greatly improves similarity detection on Java source code (with statistical significance) IWSC ‘17 Icons made by Freepik from www.flaticon.com is licensed by Creative Commons BY 3.0 26

  27. Ranked Results Only Top k Results ccfx jplag-java fuzzywuzzy difflib ncd-bzlib jplag-text bzip2ncd simjava simian gzipncd gzipncd ncd-zlib ncd-zlib sherlock jplag-text 7zncd-Deflate64 7zncd-PPMd 7zncd-Deflate xzncd fuzzywuzzy 0.8 0.85 0.9 0.95 1 0.8 0.85 0.9 0.95 1 Mean Average Precision (MAP) Mean Average Precision (MAP) Pervasive Mod. Boiler-Plate 27

  28. Distribution of tool’s F1 scores vs. pervasive mod. type Original Obfuscator Decompiler O = original K = Krakatau A = Artifice (source) Pc = Procyon Pg = ProGuard (bytecode) 28

  29. F1 Score 0.1—0.4 0.4—0.6 0.6—0.8 0.8—1.0 O A K Pc Pg Pg A A A A Tool K Pc K Pc Pg Pg K Pc ccfx deckard iclones nicad simian Original jplag-java jplag-text O = original plaggie sherlock simjava Obfuscator simtext 7zncd-BZip2 A = Artifice (source) 7zncd-Deflate 7zncd-Deflate2 Pg = ProGuard 
 7zncd-LZMA (bytecode) 7zncd-LZMA2 7zncd-PPMd bzip2ncd Decompiler gzipncd icd K = Krakatau ncd-zlib Pc = Procyon ncd-bzlib xzncd bsdi ff di ff di ffl ib fuzzywuzzy jellyfish ngram cosine

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend