Analysis of Industrial Control System Software to Detect Semantic Clones

被引:4
|
作者
Jnanamurthy, H. K. [1 ]
Jetley, Raoul [2 ]
Henskens, Frans [1 ]
Paul, David [3 ]
Wallis, Mark [1 ]
Sudarsan, S. D. [2 ]
机构
[1] Univ Newcastle, Sch Elect Engn & Comp Sci, Callaghan, NSW, Australia
[2] ABB Corp Res Ctr, Software Res Grp, Bangalore, Karnataka, India
[3] Univ New England, Sch Sci & Technol, Armidale, NSW, Australia
关键词
Software Clones; PLC programs; Software Maintenance; Software-Reusability; CODE;
D O I
10.1109/ICIT.2019.8754957
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The detection of software clones is gaining more attention due to the advantages it can bring to software maintenance. Clone detection helps in code optimization (code present in multiple locations can be updated and optimized once), bug detection (discovering bugs that are copied to various locations in the code), and analysis of re-used code in software systems. There are several approaches to detect clones at the code level, but existing methods do not address the issue of clone detection in the PLC-based IEC 61131-3 languages. In this paper, we present a novel approach to detect clones in PLC-based IEC 61131-3 software using semantic-based analysis. For the semantic analysis, we use I/O based dependency analysis to detect PLC program clones. Our approach is a semantic-based technique to identify clones, making it feasible even for large code bases. Further, experiments indicate that the proposed method is successful in identifying software clones.
引用
收藏
页码:773 / 779
页数:7
相关论文
共 50 条
  • [41] DEVELOPMENT OF A SOFTWARE SYSTEM FOR INDUSTRIAL ROBOTS
    MOTIWALLA, S
    MECHANICAL ENGINEERING, 1982, 104 (08) : 36 - 39
  • [42] SourcererCC and SourcererCC-I: Tools to Detect Clones in Batch mode and During Software Development
    Saini, Vaibhav
    Sajnani, Hitesh
    Kim, Jaewoo
    Lopes, Cristina
    2016 IEEE/ACM 38TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING COMPANION (ICSE-C), 2016, : 597 - 600
  • [43] A Spectral Analysis Software to Detect Modules in a DSM
    Sarkar, Somwrita
    Dong, Andy
    RISK AND CHANGE MANAGEMENT IN COMPLEX SYSTEMS, 2014, : 55 - 64
  • [44] An Efficient Tool for Industrial Control System Security Analysis
    Xia, Chuangming
    Tian, Jing
    Li, Erqing
    Zhou, Junwei
    Xiang, Jianwen
    Wang, Jin
    Bai, Liang
    He, Yueying
    2016 IEEE 14TH INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, 14TH INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, 2ND INTL CONF ON BIG DATA INTELLIGENCE AND COMPUTING AND CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/DATACOM/CYBERSC, 2016, : 424 - 427
  • [45] A detailed analysis of public industrial control system datasets
    Balla Babiker A.
    Hadi Habaebi M.
    Mubarak S.
    Islam Md.R.
    International Journal of Security and Networks, 2023, 18 (04) : 245 - 263
  • [46] A tiered security analysis of Industrial Control System Devices
    Vargas, Cyntia
    Langfinger, Michael
    Vogel-Heuser, Birgit
    2017 IEEE 15TH INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS (INDIN), 2017, : 399 - 404
  • [47] Analysis of dataflows within industrial control system design
    Koziorek, Jiri
    Konecny, Jaromir
    Gavlas, Antonin
    Kraut, Radim
    Walder, Petr
    22ND INTERNATIONAL CONFERENCE ON CIRCUITS, SYSTEMS, COMMUNICATIONS AND COMPUTERS (CSCC 2018), 2018, 210
  • [48] Semantic Analysis of Dialogs to Detect Social Engineering Attacks
    Bhakta, Ram
    Harris, Ian G.
    2015 IEEE 9TH INTERNATIONAL CONFERENCE ON SEMANTIC COMPUTING (ICSC), 2015, : 424 - 427
  • [49] Analysis and Clustering of Model Clones: An Automotive Industrial Experience
    Alalfi, Manar H.
    Cordy, James R.
    Dean, Thomas R.
    2014 SOFTWARE EVOLUTION WEEK - IEEE CONFERENCE ON SOFTWARE MAINTENANCE, REENGINEERING, AND REVERSE ENGINEERING (CSMR-WCRE), 2014, : 375 - 378
  • [50] Software control system
    Anon
    Glass, 2001, 78 (09):