1. A Systematic Review on Code Clone Detection
2. Gogul Balakrishnan and Thomas Reps . 2004. Analyzing Memory Accesses in x86 Executables . In Compiler Construction, Evelyn Duesterwald (Ed.). Springer Berlin Heidelberg , Berlin, Heidelberg . 5–23. isbn:978-3-540-24723-4 Gogul Balakrishnan and Thomas Reps. 2004. Analyzing Memory Accesses in x86 Executables. In Compiler Construction, Evelyn Duesterwald (Ed.). Springer Berlin Heidelberg, Berlin, Heidelberg. 5–23. isbn:978-3-540-24723-4
3. Tiffany Bao , Jonathan Burket , Maverick Woo , Rafael Turner , and David Brumley . 2014 . BYTEWEIGHT: Learning to recognize functions in binary code . In 23rd USENIX Security Symposium (USENIX Security 14) . 845–860. Tiffany Bao, Jonathan Burket, Maverick Woo, Rafael Turner, and David Brumley. 2014. BYTEWEIGHT: Learning to recognize functions in binary code. In 23rd USENIX Security Symposium (USENIX Security 14). 845–860.
4. Oren Barkan , Edan Hauon , Avi Caciularu , Ori Katz , Itzik Malkiel , Omri Armstrong , and Noam Koenigstein . 2021 . Grad-sam: Explaining transformers via gradient self-attention maps . In Proceedings of the 30th ACM International Conference on Information & Knowledge Management. 2882–2887 . Oren Barkan, Edan Hauon, Avi Caciularu, Ori Katz, Itzik Malkiel, Omri Armstrong, and Noam Koenigstein. 2021. Grad-sam: Explaining transformers via gradient self-attention maps. In Proceedings of the 30th ACM International Conference on Information & Knowledge Management. 2882–2887.
5. Clone detection using abstract syntax trees