From: Are our clone detectors good enough? An empirical study of code effects by obfuscation
Tools | Basic Strategy (%) | 2-Combined (%) | 3-Combined (%) | 4-Combined (%) | ||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
IR | NCO | SCE | ISC | CFO | IR_NCO | IR_SCE | IR_ISC | IR_CFO | NCO_SCE | NCO_ISC | NCO_CFO | SCE_ISC | SCE_CFO | ISC_CFO | IR_NCO_ISC | IR_NCO_CFO | IR_ISC_CFO | NCO_ISC_CFO | IR_NCO_ISC_CFO | |
SDD | * | * | * | * | * | * | * | * | * | * | * | * | * | * | * | * | * | * | * | * |
CCFinder | 60 | 60 | 49 | 2 | 100 | 74 | 75 | 50 | 100 | 100 | 49 | 100 | 31 | 100 | 100 | 74 | 100 | 100 | 100 | 100 |
CCAligner | 11 | 36 | 19 | 10 | 93 | 38 | 14 | 11 | 93 | 55 | 36 | 93 | 13 | 93 | 93 | 38 | 93 | 93 | 93 | 93 |
Deckard | 79 | 93 | 93 | 77 | 93 | 93 | 93 | 93 | 93 | 93 | 93 | 93 | 93 | 93 | 93 | 93 | 93 | 93 | 93 | 93 |
SourcererCC | * | * | * | * | * | * | * | * | * | * | * | * | * | * | * | * | * | * | * | * |
Oreo | 66 | 64 | 1 | 0 | 66 | 66 | 66 | 66 | 66 | 65 | 64 | 66 | 1 | 66 | 66 | 66 | 66 | 66 | 66 | 66 |
Average | 51 | 61 | 43 | 31 | 80 | 66 | 60 | 49 | 80 | 76 | 60 | 80 | 42 | 80 | 80 | 66 | 80 | 80 | 80 | 80 |
ASTNN | 29 | 24 | 18 | 20 | 15 | 33 | 28 | 29 | 14 | 23 | 27 | * | 20 | 20 | 17 | 35 | * | 12 | * | * |
DeepSim | 28 | 45 | 6 | 0 | 49 | 65 | 43 | 37 | 42 | 54 | 48 | 68 | 3 | 45 | 35 | 62 | 39 | 63 | 64 | 65 |
CCLearner | 68 | 7 | 0 | 0 | 92 | 89 | 68 | 68 | 92 | 6 | 8 | 92 | 0 | 92 | 92 | 89 | 92 | 92 | 92 | 92 |
Average | 42 | 25 | 8 | 7 | 52 | 62 | 46 | 45 | 49 | 28 | 28 | ** | 8 | 52 | 48 | 62 | ** | 56 | ** | ** |