Research Article
Flowchart-Based Cross-Language Source Code Similarity Detection
Table 2
The obfuscation techniques.
| Number | Obfuscation technique |
| 1 | Copying the original code completely | 2 | Modifying the comments | 3 | Changing the code format and adding blank lines | 4 | Renaming identifiers | 5 | Adjusting code statements order | 6 | Replacing constants | 7 | Changing data types | 8 | Substituting equivalent operators | 9 | Adding redundant statements | 10 | Substituting equivalent control structures |
|
|