Research Article

Flowchart-Based Cross-Language Source Code Similarity Detection

Table 2

The obfuscation techniques.

NumberObfuscation technique

1Copying the original code completely
2Modifying the comments
3Changing the code format and adding blank lines
4Renaming identifiers
5Adjusting code statements order
6Replacing constants
7Changing data types
8Substituting equivalent operators
9Adding redundant statements
10Substituting equivalent control structures