Back to Search Start Over

Are our clone detectors good enough? An empirical study of code effects by obfuscation.

Authors :
Huang, Weihao
Meng, Guozhu
Lin, Chaoyang
Yan, Qiucun
Chen, Kai
Ma, Zhuo
Source :
Cybersecurity (2523-3246); 7/2/2023, Vol. 6 Issue 1, p1-19, 19p
Publication Year :
2023

Abstract

Clone detection has received much attention in many fields such as malicious code detection, vulnerability hunting, and code copyright infringement detection. However, cyber criminals may obfuscate code to impede violation detection. To date, few studies have investigated the robustness of clone detectors, especially in-fashion deep learning-based ones, against obfuscation. Meanwhile, most of these studies only measure the difference between one code snippet and its obfuscation version. However, in reality, the attackers may modify the original code before obfuscating it. Then what we should evaluate is the detection of obfuscated code from cloned code, not the original code. For this, we conduct a comprehensive study evaluating 3 popular deep-learning based clone detectors and 6 commonly used traditional ones. Regarding the data, we collect 6512 clone pairs of five types from the dataset BigCloneBench and obfuscate one program of each pair via 64 strategies of 6 state-of-art commercial obfuscators. We also collect 1424 non-clone pairs to evaluate the false positives. In sum, a benchmark of 524,148 code pairs (either clone or not) are generated, which are passed to clone detectors for evaluation. To automate the evaluation, we develop one uniform evaluation framework, integrating the clone detectors and obfuscators. The results bring us interesting findings on how obfuscation affects the performance of clone detection and what is the difference between traditional and deep learning-based clone detectors. In addition, we conduct manual code reviews to uncover the root cause of the phenomenon and give suggestions to users from different perspectives. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISSN :
25233246
Volume :
6
Issue :
1
Database :
Complementary Index
Journal :
Cybersecurity (2523-3246)
Publication Type :
Academic Journal
Accession number :
164662948
Full Text :
https://doi.org/10.1186/s42400-023-00148-x