2021
DOI: 10.1145/3468744.3468752
|View full text |Cite
|
Sign up to set email alerts
|

Finding Software License Violations Through Binary Code Clone Detection - A Retrospective

Abstract: Ten years ago, we published the article Finding software license violations through binary code clone detection at the MSR 2011 conference. Our paper was motivated by the tendency of em- bedded hardware vendors to only release binary blobs of their rmware, often violating the licensing terms of open-source soft- ware present inside those blobs. The techniques presented in our paper were designed to accurately identify open-source code hid- den inside binary blobs. Here, we give our perspectives on the impact o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(1 citation statement)
references
References 4 publications
0
1
0
Order By: Relevance
“…B2SFinder [72], the start-of-the-art tool, selects basic syntactic features (e.g., string literals) that still remain consistent after compilation to match the source code and open-source components. In addition to binary SCA, binary source code matching is crucial in other scenarios of software security, such as reverse engineering [41] and malware analysis [20]. To our best knowledge, the effectiveness of existing binary source code matching is generally compromised due to substantial disparities between binary and source code [71].…”
Section: Background and Motivation 21 Software Composition Analysismentioning
confidence: 99%
“…B2SFinder [72], the start-of-the-art tool, selects basic syntactic features (e.g., string literals) that still remain consistent after compilation to match the source code and open-source components. In addition to binary SCA, binary source code matching is crucial in other scenarios of software security, such as reverse engineering [41] and malware analysis [20]. To our best knowledge, the effectiveness of existing binary source code matching is generally compromised due to substantial disparities between binary and source code [71].…”
Section: Background and Motivation 21 Software Composition Analysismentioning
confidence: 99%