Similarity Metrics for Code Reuse
dc.contributor.advisor | Nicholas, Charles | |
dc.contributor.author | Aurelio, Joseph | |
dc.contributor.department | Computer Science and Electrical Engineering | |
dc.contributor.program | Computer Science | |
dc.date.accessioned | 2022-02-09T15:52:31Z | |
dc.date.available | 2022-02-09T15:52:31Z | |
dc.date.issued | 2020-01-01 | |
dc.description.abstract | Most new software includes code that has been used before. Code that is later found to be vulnerable may exist in multiple software applications, but discovering all software containing the vulnerable code is difficult. In the same way, malicious code may resurface in new software. In this case, the ability to recognize reused, malicious code can help determine the trustworthiness of a new software application. Similarity metrics for code reuse can be applied to help solve these kinds of problems. In this theses, a variety of code similarity techniques are surveyed. We closely examine six approaches that can compare code from compiled software. We offer an analysis of the different approaches before performing experiments to measure their performance in comparing functions. We then conclude by comparing the effectiveness of the different approaches and the features from decompiled code they used. Finally, we offer suggestions for future work based on our findings. | |
dc.format | application:pdf | |
dc.genre | theses | |
dc.identifier | doi:10.13016/m2a6af-dngg | |
dc.identifier.other | 12367 | |
dc.identifier.uri | http://hdl.handle.net/11603/24172 | |
dc.language | en | |
dc.relation.isAvailableAt | The University of Maryland, Baltimore County (UMBC) | |
dc.relation.ispartof | UMBC Computer Science and Electrical Engineering Department Collection | |
dc.relation.ispartof | UMBC Theses and Dissertations Collection | |
dc.relation.ispartof | UMBC Graduate School Collection | |
dc.relation.ispartof | UMBC Student Collection | |
dc.source | Original File Name: Aurelio_umbc_0434M_12367.pdf | |
dc.subject | code clone detection | |
dc.subject | code reuse | |
dc.subject | malware analysis | |
dc.title | Similarity Metrics for Code Reuse | |
dc.type | Text | |
dcterms.accessRights | Access limited to the UMBC community. Item may possibly be obtained via Interlibrary Loan through a local library, pending author/copyright holder's permission. | |
dcterms.accessRights | This item may be protected under Title 17 of the U.S. Copyright Law. It is made available by UMBC for non-commercial research and education. For permission to publish or reproduce, please see http://aok.lib.umbc.edu/specoll/repro.php or contact Special Collections at speccoll(at)umbc.edu |