Existing software composition analysis (SCA) techniques for the C/C++ ecosystem tend to identify the reused components through feature matching between target software project …
Y Du, O Alrawi, K Snow, M Antonakakis… - Proceedings of the 2023 …, 2023 - dl.acm.org
The complex optimizations supported by modern compilers allow for compiler provenance recovery at many levels. For instance, it is possible to identify the compiler family and …
Context: When software is released publicly, it is common to include with it either the full text of the license or licenses under which it is published, or a detailed reference to them …
A Gautier, C Whitehead, D Dzielski… - SoutheastCon …, 2023 - ieeexplore.ieee.org
Developing software securely remains a challenge even with great advancements made in AI, vulnerability databases, dynamic and static code analysis. Research into aspects of …
Y Zhou, J Chen, Y Shi, B Chen… - 2023 IEEE/ACM 45th …, 2023 - ieeexplore.ieee.org
Code clones have been used in many different software maintenance and evaluation tasks in practice (eg, change proportion and evolution, refactoring, and vulnerability …
X Zhu, J Wang, Z Fang, X Yin, S Liu - Applied Sciences, 2022 - mdpi.com
Third-party library (TPL) reuse may introduce vulnerable or malicious code and expose the software, which exposes them to potential risks. Thus, it is essential to identify third-party …
Pre-trained models have witnessed significant progress in nature language (including source code) and binary code comprehension. However, none of them are suitable for …
Y Wang, H Li, X Zhu, S Li, C Dong, S Yang… - arXiv preprint arXiv …, 2024 - arxiv.org
Binary code search plays a crucial role in applications like software reuse detection. Currently, existing models are typically based on either internal code semantics or a …
Y Zhang, C Ma, Y Ning, Q Wu, Z Guo - IEEE Access, 2024 - ieeexplore.ieee.org
Open source component libraries are widely used in software development. However, vulnerabilities of these components can threaten software security as they spread …