References
- BSA Global Report Study in Brief, http://globalstudy.bsa.org/2011/downloads/study_pdf/2011_BSA_Piracy_ Study-InBrief.pdf
- The Economic Impact of Properly Licensed Software, http://portal.bsa.org/insead/assets/studies/2013softwarevaluestudy_en.pdf
- B. Baker, "On finding duplication and near-duplication in large software systems", In Proceedings of WCRE 1995.
- S. Ducasse, M. Rieger, S. Demeyer, "A language independent approach for detecting duplicated code", In Proceeding of lCSM 1999.
- U. Manber, "Finding similar files in a large file system", In Proceeding of USENIX Winter Conf, 1994.
- T. Kamiya, S. Kusumoto, K. Inoue, "CCFinder: A multilinguistic token-based code clone detection system for large scale source code", IEEE Transactions on Software Engineering 28(7), 2002.
- Z. Li, S. Lu, S. Myagmar, and Y. Zhou, "Cp-miner: Finding copy-paste and related bugs in large-scale software code", IEEE Transactions on Software Engineering, 32(3),2006.
- I. Baxter, A. Yahin, L. Moura, M. Anna, "Clone detection using abstract syntax trees", In Proceeding of iCSM 1998.
- L. Jiang, G. Misherghi, Z. Su, S. Glondu, "DECKARD: Scalable and accurate tree-based detection of code clones", In Proceedings of iCSE 2007.
- R. Komondoor, S. Horwitz, "Using slicing to identify duplication in source code", In Proceedings of SAS 2001.
- M. Gabel, L. Jiang, and Z. Su, "Scalable detection of semantic clones", In Proceeding of iCSE, 2008.
- C. Liu, C. Chen, J. Han, and P.S. Yu, "GPlag: detection of software plagiarism by program dependence graph analysis", In proceeding of KDD, 2006.
- X. Wang, Y. -C. Jhi, S. Zhu, and P. Liu, "Behavior based software theft detection," In Proceeding of CCS, 2009.
- J. Jang and D. Brumley, "BitShred: Fast, Scalable Code Reuse Detection in Binary Code", CMU-CyLab-10-006, 2009.
- Y. Dang, R. Wu, H. Zhang, D. Zhang, and P. Nobel, "ReBucket: A method for clustering duplicate crash reports based on call stack similarity", In Proceeding of ICSE 2012.
- S. Han, Y. Dang, S. Ge, D. Zhang, and T. Xie, "Performance debugging in the large via mining millions of stack traces," In Proceeding of iCSE, 2012.
- Y.-C. Jhi, X. Wang, X. Jia, S. Zhu, P. Liu, and D, Wu, "Value-based program characterization and its application to software plagiarism detection", In Proceeding of iCSE 2011.
- H. Kim, Y. Jung, S. Kim and K. Yi, "MeCC: Memory Comparison based Clone Detector", In Proceeding of ICSE, 2011.
- CREST Project Page, http://code.google.com/p/crest
- C. Cadar, D. Dunbar, and D. Engler, "Klee: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs", In Proceedings of OSDI, 2008.
- Y Choi, "Prism: Semantic Units Clustering and Memory Context Techniques for Binary-level Software Similarity Analysis and Plagiarism Detection", Ph.D. Dissertation, Dankook University, 2013.
- S. Schleimer, D. S. Wilkerson, and A. Aiken, "Winnowing: local algorithms for document fingerprinting", In Proceeding of SIGMOD, 2003.