<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.2 20190208//EN" "http://jats.nlm.nih.gov/publishing/1.2/JATS-journalpublishing1.dtd">
<article article-type="research-article" dtd-version="1.2" xml:lang="ru" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"><front><journal-meta><journal-id journal-id-type="issn">2518-1092</journal-id><journal-title-group><journal-title>Research result. Information technologies</journal-title></journal-title-group><issn pub-type="epub">2518-1092</issn></journal-meta><article-meta><article-id pub-id-type="doi">10.18413/2518-1092-2022-8-3-0-1</article-id><article-id pub-id-type="publisher-id">3219</article-id><article-categories><subj-group subj-group-type="heading"><subject>INFORMATION SYSTEM AND TECHNOLOGIES</subject></subj-group></article-categories><title-group><article-title>&lt;strong&gt;ANALYSIS CODE SIMILARITY AND SEARCH&amp;nbsp;FOR ITS BORROWINGS&lt;/strong&gt;</article-title><trans-title-group xml:lang="en"><trans-title>&lt;strong&gt;ANALYSIS CODE SIMILARITY AND SEARCH&amp;nbsp;FOR ITS BORROWINGS&lt;/strong&gt;</trans-title></trans-title-group></title-group><contrib-group><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Kuzminykh</surname><given-names>Yegor Sergeevich</given-names></name><name xml:lang="en"><surname>Kuzminykh</surname><given-names>Yegor Sergeevich</given-names></name></name-alternatives><email>egor2014ru@mail.ru</email></contrib><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Ilina</surname><given-names>Sofia Pavlovna</given-names></name><name xml:lang="en"><surname>Ilina</surname><given-names>Sofia Pavlovna</given-names></name></name-alternatives><email>sofi.ilina@mail.ru</email></contrib><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Maslova</surname><given-names>Maria Aleksandrovna</given-names></name><name xml:lang="en"><surname>Maslova</surname><given-names>Maria Aleksandrovna</given-names></name></name-alternatives><email>info@sevsu.ru</email></contrib></contrib-group><pub-date pub-type="epub"><year>2023</year></pub-date><volume>8</volume><issue>3</issue><fpage>0</fpage><lpage>0</lpage><self-uri content-type="pdf" xlink:href="/media/information/2023/3/ИТ_НР_8.3_1_sgrhY3L.pdf" /><abstract xml:lang="ru"><p>This article discusses an actual problem in the field of programming &amp;mdash; the borrowing of code and the possibility of its analysis. With the increase in the number of programmers and the abundance of software solutions, there is a need to determine the dependencies and uniqueness of the code used. Along with the increasing distribution of code through libraries and open sources, it becomes relevant to identify cases of plagiarism or illegal use. This article explores effective methods and tools for finding borrowed code. Through the presentation of existing algorithms and approaches, the authors of the article offer an assessment of the effectiveness of existing solutions and provide examples of algorithms that contribute to the analysis of the code for similarity.</p></abstract><trans-abstract xml:lang="en"><p>This article discusses an actual problem in the field of programming &amp;mdash; the borrowing of code and the possibility of its analysis. With the increase in the number of programmers and the abundance of software solutions, there is a need to determine the dependencies and uniqueness of the code used. Along with the increasing distribution of code through libraries and open sources, it becomes relevant to identify cases of plagiarism or illegal use. This article explores effective methods and tools for finding borrowed code. Through the presentation of existing algorithms and approaches, the authors of the article offer an assessment of the effectiveness of existing solutions and provide examples of algorithms that contribute to the analysis of the code for similarity.</p></trans-abstract><kwd-group xml:lang="ru"><kwd>information security</kwd><kwd>information security</kwd><kwd>security</kwd><kwd>cybersecurity</kwd><kwd>code</kwd><kwd>programming</kwd><kwd>code analysis</kwd><kwd>search for borrowings</kwd><kwd>code borrowing</kwd><kwd>code similarity assessment</kwd><kwd>code duplicates</kwd><kwd>machine learning</kwd><kwd>sorting</kwd></kwd-group><kwd-group xml:lang="en"><kwd>information security</kwd><kwd>information security</kwd><kwd>security</kwd><kwd>cybersecurity</kwd><kwd>code</kwd><kwd>programming</kwd><kwd>code analysis</kwd><kwd>search for borrowings</kwd><kwd>code borrowing</kwd><kwd>code similarity assessment</kwd><kwd>code duplicates</kwd><kwd>machine learning</kwd><kwd>sorting</kwd></kwd-group></article-meta></front><back><ref-list><title>Список литературы</title><ref id="B1"><mixed-citation>Babkina A.A. Instrumental support for the search for clones in the program code: Master&amp;#39;s thesis &amp;ndash; Siberian Federal University, 2017.</mixed-citation></ref><ref id="B2"><mixed-citation>Sargsyan S.S. Methods of searching for code clones and semantic errors based on semantic analysis of the program: dis. Candidate of Physical and Mathematical Sciences &amp;ndash; In-t Systems. programming, 2016.</mixed-citation></ref><ref id="B3"><mixed-citation>Identification of clones [Electronic resource]. URL: https://newtechaudit.ru/clone-code/</mixed-citation></ref><ref id="B4"><mixed-citation>Data processing for machine learning [Electronic resource]. URL: https://4brain.ru/aibasics/data.php</mixed-citation></ref><ref id="B5"><mixed-citation>What are the types of errors in machine learning models? [electronic resource]. URL: https://qaa-engineer.ru/kakie-byvayut-tipy-oshibok-v-modelyah-mashinnogo-obucheniya/</mixed-citation></ref><ref id="B6"><mixed-citation>Cross-validation [Electronic resource]. URL: https://academy.yandex.ru/handbook/ml/article/kross-validaciya</mixed-citation></ref><ref id="B7"><mixed-citation>A little educational program: what is an f measure in machine learning? [electronic resource]. URL: https://dzen.ru/a/ZIHJQbB6HGcQVC6i</mixed-citation></ref><ref id="B8"><mixed-citation>Looking for vulnerabilities in the code: theory, practice and prospects of SAST [Electronic resource]. URL: https://www.securitylab.ru/analytics/483063.php</mixed-citation></ref><ref id="B9"><mixed-citation>Algoritm SequenceMatcher [Elektronnyj resurs]. URL: https://docs.python.org/3/library/difflib.html#difflib.SequenceMatcher</mixed-citation></ref><ref id="B10"><mixed-citation>Vovchenko N.G., Kuznetsov N.G., Makarenko E.N. and others. Implementation of ESG principles in the strategy for sustainable development of the Russian economy. &amp;ndash; Rostov-on-Don: Rostov State Economic University &amp;ldquo;RINH&amp;rdquo;, 2022. &amp;ndash; 508 p.</mixed-citation></ref><ref id="B11"><mixed-citation>Nesterenko R.V., Maslovа M.A. Modern challenges and threats information security public cloud making and methods of work with them // Research result. Information technologies. &amp;ndash; Т.6, №1, 2021. &amp;ndash; P. 48-54. DOI: 10.18413/2518-1092-2021-6-1-0-6</mixed-citation></ref></ref-list></back></article>