Discovering Code Cloning In Software Source Code By Fingerprinting
Source code, such as released under an open source license, is often reused, either unmodified, or with (slight) modifications. Unmodified verbatim reuse can easily be detected by computing checksums of files and comparing these to a list of known checksums from a knowledgebase. Modified source code reuse can be detected using a number of techniques often referred to as “code clone detection” in scientific literature.
Publication Date20 October 2014
TagsLinux FreeBSD Unix software software development *BSD Android Java open source code clone detection
Click to share this page via your favorite social network.
What we are trying to do?
We are attempting to mobilize the creativity and innovative capacities of the Linux and broader open source community to codify the universe of preexisting inventions in defensive publications that upon publication in the IP.COM database will immediately serve as effective prior art that prevents anyone from having a patent issued that claims inventions that have already been document in a defensive publication. In addition to creating a vehicle to utilize this highly effective form of IP rights management for known inventions, it is hoped that the community will use defensive publications as a means of codifying future inventions should the inventors prefer not to make their invention the subject of a patent disclosure and application.