Research Article

A Novel Vulnerable Code Clone Detector Based on Context Enhancement and Patch Validation

Table 1

Examples of vulnerable function fingerprints.

Vulnerable function lengthCVE number of the vulnerabilityVulnerable function fingerprint

143CVE-2017-1301208345519ec358d8af82812efab5051f6
CVE-2015-130878675ef39f395a7d95076b3354f0e48e