S. Brenda and . Baker, A program for identifying duplicated code. Computing Science and Statistics, pp.49-49, 1993.

S. Brenda and . Baker, On finding duplication and near-duplication in large software systems, Proceedings of 2nd Working Conference on, pp.86-95, 1995.

A. Bartel, J. Klein, Y. L. Traon, and M. Monperrus, Automatically securing permission-based software by reducing the attack surface: An application to android, Proceedings of the 27th IEEE/ACM International Conference on Automated Software Engineering, pp.274-277, 2012.
URL : https://hal.archives-ouvertes.fr/hal-00700074

A. Hamid, S. Basit, and . Jarzabek, Efficient token based clone detection with flexible tokenization, Proceedings of the the 6th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering, pp.513-516, 2007.

D. Ira, A. Baxter, L. Yahin, M. Moura, L. Sant'anna et al., Clone detection using abstract syntax trees, Software Maintenance, 1998. Proceedings., International Conference on, pp.368-377, 1998.

M. Carvalho, J. Demott, R. Ford, and D. Wheeler, IEEE security & privacy, vol.101, issue.4, pp.63-67, 2014.

. Cve-community, Common vulnerabilities and exposures, 1999.

S. Ducasse, M. Rieger, and S. Demeyer, A language independent approach for detecting duplicated code, Software Maintenance, 1999.(ICSM'99) Proceedings. IEEE International Conference on, pp.109-118, 1999.

Z. Durumeric, J. Kasten, D. Adrian, A. Halderman, M. Bailey et al., The matter of heartbleed, Proceedings of the 2014 Conference on Internet Measurement Conference, pp.475-488, 2014.

M. Seyed, H. R. Ghaffarian, and . Shahriari, Software vulnerability analysis and discovery using machine-learning and data-mining techniques: A survey, ACM Computing Surveys (CSUR), vol.50, issue.4, p.56, 2017.

. Ak-ghosh, W. H. Pendarakis, and . Sanders, Moving target defense co-chair's report-national cyber leap year summit, Federal Networking and Information Technology Research and Development, 2009.

D. Gitchell and N. Tran, Sim: a utility for detecting similarity in computer programs, ACM SIGCSE Bulletin, vol.31, pp.266-270, 1999.

. Github and . Inc, A web-based hosting service for version control using git

N. Göde and R. Koschke, Incremental clone detection, Software Maintenance and Reengineering, 2009. CSMR'09. 13th European Conference on, pp.219-228, 2009.

M. Howard, J. Pincus, and J. Wing, Measuring relative attack surfaces, Workshop on Advanced Developments in Software and Systems Security, 2003.

S. Jajodia, A. K. Ghosh, V. S. Subrahmanian, V. Swarup, C. Wang et al., Moving Target Defense II: Application of Game Theory and Adversarial Modeling, 2012.

S. Jajodia, A. K. Ghosh, V. Swarup, C. Wang, and X. S. Wang, Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats, 2011.

S. Jajodia, K. Anup, V. Ghosh, C. Swarup, X. Wang et al., Moving target defense: creating asymmetric uncertainty for cyber threats, vol.54, 2011.

J. Howard, Substring matching for clone detection and change tracking, ICSM, vol.94, pp.120-126, 1994.

T. Kamiya, Tutorial of cli tool ccfx, 2008.

T. Kamiya, S. Kusumoto, and K. Inoue, Ccfinder: a multilinguistic tokenbased code clone detection system for large scale source code, IEEE Transactions on Software Engineering, vol.28, issue.7, pp.654-670, 2002.

D. Kantola, E. Chin, W. He, and D. Wagner, Reducing attack surfaces for intra-application communication in android, Proceedings of the second ACM workshop on Security and privacy in smartphones and mobile devices, pp.69-80, 2012.

M. Richard and . Karp, Combinatorics, complexity, and randomness, Commun. ACM, vol.29, issue.2, pp.97-109, 1986.

M. Richard, . Karp, and . Michael-o-rabin, Efficient randomized pattern-matching algorithms, IBM Journal of Research and Development, vol.31, issue.2, pp.249-260, 1987.

R. Komondoor and S. Horwitz, Using slicing to identify duplication in source code, International Static Analysis Symposium, pp.40-56, 2001.

K. Kontogiannis, R. Galler, and . Demori, Detecting code similarity using patterns, Working Notes of 3rd Workshop on AI and Software Engineering, vol.6, 1995.

A. Kostas, R. Kontogiannis, E. Demori, M. Merlo, M. Galler et al., Pattern matching for clone and concept detection, Automated Software Engineering, vol.3, issue.1-2, pp.77-108, 1996.

R. Koschke, R. Falke, and P. Frenzel, Clone detection using abstract syntax suffix trees, Reverse Engineering, 2006. WCRE'06. 13th Working Conference on, pp.253-262, 2006.

A. Kurmus, R. Tartler, D. Dorneanu, B. Heinloth, V. Rothberg et al., Attack surface metrics and automated compile-time os kernel tailoring, NDSS, 2013.

Z. Li, S. Lu, S. Myagmar, and Y. Zhou, Cp-miner: Finding copy-paste and related bugs in large-scale software code, IEEE Transactions on software Engineering, vol.32, issue.3, pp.176-192, 2006.

P. Manadhata and J. Wing, An attack surface metric, 2005.

P. Manadhata and J. Wing, An attack surface metric, IEEE Trans. Softw. Eng, vol.37, issue.3, pp.371-386, 2011.

P. Manadhata and J. Wing, Measuring a system's attack surface, 2004.

K. Pratyusa, J. M. Manadhata, and . Wing, An attack surface metric, IEEE Transactions on Software Engineering, vol.37, issue.3, pp.371-386, 2011.

J. Mayrand, C. Leblanc, and E. Merlo, Experiment on the automatic detection of function clones in a software system using metrics, icsm, vol.96, p.244, 1996.

A. Raza, G. Vogel, and E. Plödereder, Bauhaus-a tool suite for program analysis and reverse engineering, Ada-Europe, vol.4006, pp.71-82, 2006.

T. Rothwell, The gnu c reference manual, 2006.

K. Chanchal, J. R. Roy, R. Cordy, and . Koschke, Comparison and evaluation of code clone detection techniques and tools: A qualitative approach, Science of computer programming, vol.74, issue.7, pp.470-495, 2009.

C. Kumar, R. , and J. Cordy, A survey on software clone detection research. Queen's School of Computing TR, vol.541, pp.64-68, 2007.

A. Syropoulos, Mathematics of multisets, Workshop on Membrane Computing, pp.347-358, 2000.

C. Theisen, K. Herzig, P. Morrison, B. Murphy, and L. Williams, Approximating attack surfaces with stack traces, Proceedings of the 37th International Conference on Software Engineering, vol.2, pp.199-208, 2015.

A. Awad, Y. Younis, and . Malaiya, Relationship between attack surface and vulnerability density: A case study on apache http server, Proceedings on the International Conference on Internet Computing (ICOMP), page 1. The Steering Committee of The World Congress in Computer Science, 2012.

. Awad-a-younis, K. Yashwant, I. Malaiya, and . Ray, Using attack surface entry points and reachability analysis to assess the risk of software vulnerability exploitability, High-Assurance Systems Engineering (HASE), pp.1-8, 2014.

M. Zhang, L. Wang, S. Jajodia, A. Singhal, and M. Albanese, Network diversity: a security metric for evaluating the resilience of networks against zero-day attacks, IEEE Transactions on Information Forensics and Security, vol.11, issue.5, pp.1071-1086, 2016.