2021
DOI: 10.1186/s42400-021-00085-7
|View full text |Cite
|
Sign up to set email alerts
|

B2SMatcher: fine-Grained version identification of open-Source software in binary files

Abstract: Codes of Open Source Software (OSS) are widely reused during software development nowadays. However, reusing some specific versions of OSS introduces 1-day vulnerabilities of which details are publicly available, which may be exploited and lead to serious security issues. Existing state-of-the-art OSS reuse detection work can not identify the specific versions of reused OSS well. The features they selected are not distinguishable enough for version detection and the matching scores are only based on similarity… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
2
2

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(1 citation statement)
references
References 21 publications
0
1
0
Order By: Relevance
“…To help resolve these code-reuse-related issues, many binary code similarity analysis works are proposed and have been applied in various applications, including code search [29,30,37,63,79,81], OSS reuse detection [19,31,35,36,43,53,68,71,77], vulnerability detection [25,26,38,76] and patch presence test [51,61,74,78,82]. They usually regard the vulnerable functions or reused functions as the query functions and the functions in the commercial software as the target functions and produce the detection results by calculating the similarity between query functions and target functions.…”
Section: Introductionmentioning
confidence: 99%
“…To help resolve these code-reuse-related issues, many binary code similarity analysis works are proposed and have been applied in various applications, including code search [29,30,37,63,79,81], OSS reuse detection [19,31,35,36,43,53,68,71,77], vulnerability detection [25,26,38,76] and patch presence test [51,61,74,78,82]. They usually regard the vulnerable functions or reused functions as the query functions and the functions in the commercial software as the target functions and produce the detection results by calculating the similarity between query functions and target functions.…”
Section: Introductionmentioning
confidence: 99%