Review Article

A Survey of Automatic Software Vulnerability Detection, Program Repair, and Defect Prediction Techniques

Table 4

Technical characteristics of semantic-based clone detection.

System/writerPreprocessingRepresentationNetworkClone typesClassification object

CCDLC [13]Trimme, normalize method blocksBDG PDG ASTCNNT3-T4Method blocks
Sheneamer et al. [14]Trimme, nirmalize method blocksAST PDG BDGT1–T4Method blocks
ZEEK [15]Split the procedure to basic blocksHashesNNT4Code block
DeepSim [16]Use WALA to analysis bytecodeDFG CFGDNN′T4Method level