Login / Signup
Are our clone detectors good enough? An empirical study of code effects by obfuscation.
Weihao Huang
Guozhu Meng
Chaoyang Lin
Qiucun Yan
Kai Chen
Zhuo Ma
Published in:
Cybersecur. (2023)
Keyphrases
</>
static analysis
linux kernel
source code
clone detection
object detection
software systems
data sets
case study
operating system
reverse engineering
anti virus
reverse engineer