Login / Signup
Obfuscated code is identifiable by a token-based code clone detection technique.
Junaid Akram
Danish Vasan
Ping Luo
Published in:
Int. J. Inf. Comput. Secur. (2022)
Keyphrases
</>
clone detection
linux kernel
string matching
software reuse
source code
software systems
databases
malicious code
database systems
object recognition
pairwise
operating system
pattern matching
life cycle
reverse engineering