Research Article
Flowchart-Based Cross-Language Source Code Similarity Detection
Table 2
The obfuscation techniques.
| | Number | Obfuscation technique |
| | 1 | Copying the original code completely | | 2 | Modifying the comments | | 3 | Changing the code format and adding blank lines | | 4 | Renaming identifiers | | 5 | Adjusting code statements order | | 6 | Replacing constants | | 7 | Changing data types | | 8 | Substituting equivalent operators | | 9 | Adding redundant statements | | 10 | Substituting equivalent control structures |
|
|