Nicholas, CharlesAurelio, Joseph2022-02-092022-02-092020-01-0112367http://hdl.handle.net/11603/24172Most new software includes code that has been used before. Code that is later found to be vulnerable may exist in multiple software applications, but discovering all software containing the vulnerable code is difficult. In the same way, malicious code may resurface in new software. In this case, the ability to recognize reused, malicious code can help determine the trustworthiness of a new software application. Similarity metrics for code reuse can be applied to help solve these kinds of problems. In this theses, a variety of code similarity techniques are surveyed. We closely examine six approaches that can compare code from compiled software. We offer an analysis of the different approaches before performing experiments to measure their performance in comparing functions. We then conclude by comparing the effectiveness of the different approaches and the features from decompiled code they used. Finally, we offer suggestions for future work based on our findings.application:pdfcode clone detectioncode reusemalware analysisSimilarity Metrics for Code ReuseText