HiddenCPG: Large-Scale Vulnerable Clone Detection Using Subgraph Isomorphism of Code Property Graphs.
Seongil WiSijae WooJoyce Jiyoung WhangSooel SonPublished in: WWW (2022)
Keyphrases
- subgraph isomorphism
- clone detection
- string matching
- linux kernel
- edit distance
- graph matching
- maximum common subgraph
- graph isomorphism
- software reuse
- graph pattern matching
- software systems
- graph databases
- source code
- search tree
- weighted graph
- operating system
- graph mining
- graph patterns
- depth first search
- similarity measure
- hard problems
- distance measure
- pattern matching
- pattern recognition
- software engineering
- high level
- code clones
- object recognition
- pairwise
- dynamic programming
- open source
- database
- similarity search