Review Article
A Survey of Automatic Software Vulnerability Detection, Program Repair, and Defect Prediction Techniques
Table 4
Technical characteristics of semantic-based clone detection.
| System/writer | Preprocessing | Representation | Network | Clone types | Classification object |
| CCDLC [13] | Trimme, normalize method blocks | BDG PDG AST | CNN | T3-T4 | Method blocks | Sheneamer et al. [14] | Trimme, nirmalize method blocks | AST PDG BDG | — | T1–T4 | Method blocks | ZEEK [15] | Split the procedure to basic blocks | Hashes | NN | T4 | Code block | DeepSim [16] | Use WALA to analysis bytecode | DFG CFG | DNN′ | T4 | Method level |
|
|