Guidelines For Project Report: 7. Conclusion & Recommendations
Guidelines For Project Report: 7. Conclusion & Recommendations
After completion of the project work, every student will submit a project report which should
contain the following:
REFERENCES
NOTE: Project report must not contain any description of the following except only a relevant
and short mention – technology or platform or OS or tools used or any language details. It must
be more focused on project work carried out and its implementation details without including
any source code.
Annexure-1 (A typical Specimen of Title Page)
TITLE OF PROJECT
<Font Size 24><BOLD><Centralized>
A Project Work
<Font Size 14><BOLD><Centralized>
BACHELOR OF ENGINEERING
<Font Size 16>><BOLD><Centralized>
IN
NAME_OF_SPECIALIZED_BRANCH
<Font Size 14><BOLD><Centralized>
Submitted by:
<Font Size 14><BOLD><Centralized>
SUPERVISORS NAME
<Font Size 14>><BOLD><Centralized>
DECLARATION
<Font size 16><Bold><Centralized>
(Candidate Name)
Candidate UID: xxxxxxxxxxx
<Font size 14><Bold><Right Alligned>
Date:
Place:
<Font size 12><Bold><Left alligneed>
ii
Annexure-3 (A typical specimen of table of contents)
Table of Contents
Title Page i
Declaration of the Student ii
Abstract iii
Acknowledgement iv
List of Figures v
List of Tables (optional) vi
Timeline / Gantt Chart vii
1. INTRODUCTION* 1
1.1 Problem Definition 1
1.2 Project Overview/Specifications* (page-1 and 3) 2
1.3 Hardware Specification 3
1.4 Software 4
Specification 1.3.1 4
1.3.2
…
2. LITERATURE SURVEY 5
2.1 Existing System 5
2.2 Proposed System 6
2.3 Feasibility Study* (page-4) 7
3. PROBLEM FORMULATION 9
4. OBJECTIVES 16
5. METHODOLOGY 18
6. CONCLUSIONS AND DISCUSSION 19
7. REFERENCES 22
List of Tables
Table Title page
vii
List of Figures
Figure Title page
3.1 Joint in a steel moment resisting frame (a) geometry, and (b) in-plane 11
lateral distortional shear force on it. Results of analytical study (a)
3.2 Idealised trilinear model used in this study of or RC Frame 11
buildings with masonry infilled walls; (b) Mean DRF
spectra of Uttarkashi earthquake strong motions records derived
for bare and masonry infilled RC frame buildings
characteristics with k= 2, =2,and 0.2. The spectra
correspond to ductility values of 1,2,3,5,8,10,12 and 15. Dark and
dashed lines correspond to bare and infilled frame buildings
respectively.
viii
List of Symbols
Symbol Description
τ c
ix
1 INTRODUCTION
1.1
1.1.1
2 LITERATURE REVIEW
Kim et al. [25] proposed VUDDY, which is a scalable approach for detection of
vulnerable code clones. This approach can detect vulnerabilities efficiently and
accurately in large software. They able to achieve extreme level of scalability by using
function-level granularity and a length-filtering techniques that decreases number of
signature comparisons. Most interesting feature of this technique is that it can even detect
variants of known vulnerabilities. To achieve extreme level of scalability, they used function-
level granularity and length-filtering techniques to reduce number of signature comparisons.
2.1 Literature Review Summary
From the literature review, it is observed that studies highlight the need of efficient and
scalable approach for detecting code clones having software vulnerability. The existing
techniques are not able to detect all types of vulnerable code clones. Different approaches
suffer from high false negative rate and not scalable to large software systems due to high
time complexity. So firstly, there is a need........................................ Second same subject
systems should be used to compare the approaches which detect
4 RESEARCH OBJECTIVES
The proposed research is aimed to carry out work leading to the development of an approach
for vulnerable code clone detection. The proposed aim will be achieved by dividing the work
into following objectives:
The following methodology will be followed to achieve the objectives defined for proposed
research work:
1. Detailed study of software vulnerabilities, their types and impact of code cloning
practice on software vulnerabilities will be done.
2. Installation of clone detection tools and hand on experience on existing approaches of
clone detection applicable for software code clone vulnerability will be done. Relative
pros and cons will be identified.
3. Vulnerability database will be created, which corresponds to the C/C++ open source
projects that have some vulnerabilities according to National Vulnerability Database
(NVD) [36] and Open Sourced Vulnerability Database (OSVDB) [51].
4. Different clone detections techniques will be analysed to figure it out which clone
detection technique is appropriate for particular type of vulnerability.
5. An approach will be developed for vulnerable code clone detection.
6. Various parameters will be identified to evaluate the proposed system.
7. Comparison of new implemented approach with exiting approaches will be done.
6 RESULTS AND DISCUSSION
7 REFERENCES
[1] D. Rattan, R. Bhatia, and M. Singh, “Software clone detection: A systematic review,”
Information and Software Technology, vol. 55, no. 7, pp. 1165–1199, Jul. 2013.
[2] J. F. Islam, M. Mondal, and C. K. Roy, “Bug Replication in Code Clones: An
Empirical Study,” in 2016 IEEE 23rd International Conference on Software
Analysis, Evolution, and Reengineering (SANER), 2016, pp. 68–78.
[3] M. R. Islam and M. F. Zibran, “A Comparative Study on Vulnerabilities in Categories
of Clones and Non-cloned Code,” in 2016 IEEE 23rd International Conference on
Software Analysis, Evolution, and Reengineering (SANER), 2016, pp. 8–14.
[4] M. R. Islam, M. F. Zibran, and A. Nagpal, “Security Vulnerabilities in Categories of
Clones and Non-Cloned Code: An Empirical Study,” in 2017 ACM/IEEE
International Symposium on Empirical Software Engineering and Measurement
(ESEM), 2017, pp. 20–29.
[5] C. K. Roy, M. F. Zibran, and R. Koschke, “The vision of software clone management:
Past, present, and future (Keynote paper),” in 2014 Software Evolution Week - IEEE
Conference on Software Maintenance, Reengineering, and Reverse Engineering
(CSMR-WCRE), 2014, pp. 18–33.
[6] J. Krinke, “A Study of Consistent and Inconsistent Changes to Code Clones,” in
14th Working Conference on Reverse Engineering (WCRE 2007), 2007, pp. 170–
178.
[7] D. Chatterji, J. C. Carver, N. A. Kraft, and J. Harder, “Effects of cloned code on
software maintainability: A replicated developer study,” in 2013 20th Working
Conference on Reverse Engineering (WCRE), 2013, pp. 112–121.
[8] D. Rattan, R. Bhatia, and M. Singh, “An Empirical Study of Clone Detection
in MATLAB/ Simulink Models,” International Journal of Information and
Communication Technology.
[9] D. Rattan, R. Bhatia, and M. Singh, “Detecting High Level Similarities in Source
Code and Beyond,” International Journal of Energy, Information and
Communications, vol. 6, no. 2, pp. 1–16, 2015.
[10] D. Rattan, R. Bhatia, and M. Singh, “Detection and Analysis of Clones in UML Class
Models,” International Journal of Software Engineering, IJSE, vol. 8, no. 2, pp. 66–
99, 2015.
[11] D. Rattan, R. Bhatia, and M. Singh, “Model clone detection based on tree
comparison,” in 2012 Annual IEEE India Conference (INDICON), 2012, pp. 1041–
1046.
[12] C. K. Roy and J. R. Cordy, “NICAD: Accurate Detection of Near-Miss Intentional
Clones Using Flexible Pretty-Printing and Code Normalization,” in 2008 16th
IEEE International Conference on Program Comprehension, 2008, pp. 172–181.
[13] M. Mondal, C. K. Roy, and K. A. Schneider, “SPCP-Miner: A tool for mining code
clones that are important for refactoring or tracking,” in 2015 IEEE 22nd
International Conference on Software Analysis, Evolution, and Reengineering
(SANER), 2015, pp. 484–488.