{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:43:58Z","timestamp":1742913838764,"version":"3.40.3"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030966478"},{"type":"electronic","value":"9783030966485"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-96648-5_7","type":"book-chapter","created":{"date-parts":[[2022,2,10]],"date-time":"2022-02-10T15:11:54Z","timestamp":1644505914000},"page":"132-155","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["XtraLibD: Detecting Irrelevant Third-Party Libraries in\u00a0Java and\u00a0Python Applications"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7112-0630","authenticated-orcid":false,"given":"Ritu","family":"Kapur","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Poojith U.","family":"Rao","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Agrim","family":"Dewam","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Balwinder","family":"Sodhi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2022,2,11]]},"reference":[{"key":"7_CR1","doi-asserted-by":"crossref","unstructured":"Alon, U., Zilberstein, M., Levy, O., Yahav, E.: Code2vec: learning distributed representations of code. Proc. ACM Program. Lang. 3(POPL), 40:1\u201340:29 (2019)","DOI":"10.1145\/3290353"},{"key":"7_CR2","unstructured":"Alqattan, H.: Pycln (2020). https:\/\/hadialqattan.github.io\/pycln\/. Accessed 09 Aug 2021"},{"key":"7_CR3","unstructured":"Desnos, A., Geoffroy Gueguen, S.B.: Welcome to Androguard\u2019s Documentation! (2018). https:\/\/androguard.readthedocs.io\/en\/latest\/"},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"Au, K.W.Y., Zhou, Y.F., Huang, Z., Lie, D.: PScout: analyzing the Android permission specification. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, pp. 217\u2013228. ACM (2012)","DOI":"10.1145\/2382196.2382222"},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"Backes, M., Bugiel, S., Derr, E.: Reliable third-party library detection in Android and its security applications. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 356\u2013367. ACM (2016)","DOI":"10.1145\/2976749.2978333"},{"key":"7_CR6","unstructured":"Book, T., Pridgen, A., Wallach, D.S.: Longitudinal analysis of Android ad library permissions. arXiv preprint arXiv:1303.0857 (2013)"},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"Chen, K., Liu, P., Zhang, Y.: Achieving accuracy and scalability simultaneously in detecting application clones on Android markets. In: Proceedings of the 36th International Conference on Software Engineering, pp. 175\u2013186. ACM (2014)","DOI":"10.1145\/2568225.2568286"},{"key":"7_CR8","unstructured":"Dai, A.M., Olah, C., Le, Q.V.: Document embedding with paragraph vectors. In: NIPS Deep Learning Workshop (2015)"},{"issue":"6","key":"7_CR9","doi-asserted-by":"publisher","first-page":"1195","DOI":"10.1007\/s10664-012-9199-7","volume":"18","author":"J Davies","year":"2013","unstructured":"Davies, J., German, D.M., Godfrey, M.W., Hindle, A.: Software bertillonage. Empir. Softw. Eng. 18(6), 1195\u20131237 (2013)","journal-title":"Empir. Softw. Eng."},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"Dewan, A., Rao, P.U., Sodhi, B., Kapur, R.: BloatLibD: detecting bloat libraries in Java applications. In: ENASE, pp. 126\u2013137 (2021)","DOI":"10.5220\/0010459401260137"},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"Feichtner, J., Rabensteiner, C.: Obfuscation-resilient code recognition in Android apps. In: Proceedings of the 14th International Conference on Availability, Reliability and Security, p. 8. ACM (2019)","DOI":"10.1145\/3339252.3339260"},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Grace, M.C., Zhou, W., Jiang, X., Sadeghi, A.R.: Unsafe exposure analysis of mobile in-app advertisements. In: Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 101\u2013112. ACM (2012)","DOI":"10.1145\/2185448.2185464"},{"key":"7_CR13","doi-asserted-by":"crossref","unstructured":"Ishio, T., Kula, R.G., Kanda, T., German, D.M., Inoue, K.: Software ingredients: detection of third-party component reuse in Java software release. In: 2016 IEEE\/ACM 13th Working Conference on Mining Software Repositories (MSR), pp. 339\u2013350. IEEE (2016)","DOI":"10.1145\/2901739.2901773"},{"key":"7_CR14","unstructured":"Le, Q., Mikolov, T.: Distributed representations of sentences and documents. In: International Conference on Machine Learning, pp. 1188\u20131196 (2014)"},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"Li, M., et al.: LibD: scalable and precise third-party library detection in Android markets. In: 2017 IEEE\/ACM 39th International Conference on Software Engineering (ICSE), pp. 335\u2013346. IEEE (2017)","DOI":"10.1109\/ICSE.2017.38"},{"key":"7_CR16","doi-asserted-by":"crossref","unstructured":"Liu, B., Liu, B., Jin, H., Govindan, R.: Efficient privilege de-escalation for ad libraries in mobile apps. In: Proceedings of the 13th Annual International Conference on Mobile Systems, Applications, and Services, pp. 89\u2013103 (2015)","DOI":"10.1145\/2742647.2742668"},{"key":"7_CR17","doi-asserted-by":"crossref","unstructured":"Ma, Z., Wang, H., Guo, Y., Chen, X.: LibRadar: fast and accurate detection of third-party libraries in Android apps. In: Proceedings of the 38th International Conference on Software Engineering Companion, pp. 653\u2013656. ACM (2016)","DOI":"10.1145\/2889160.2889178"},{"key":"7_CR18","doi-asserted-by":"crossref","unstructured":"Mitchell, N., Sevitsky, G.: The causes of bloat, the limits of health. In: Proceedings of the 22nd Annual ACM SIGPLAN Conference on Object-Oriented Programming Systems and Applications, pp. 245\u2013260 (2007)","DOI":"10.1145\/1297105.1297046"},{"key":"7_CR19","unstructured":"Myint, S.: Autoflake (2016). https:\/\/pypi.org\/project\/autoflake\/. Accessed 09 Aug 2021"},{"key":"7_CR20","unstructured":"Phil Frost, M.A., et al.: Pyflakes (2014). https:\/\/pypi.org\/project\/pyflakes\/. Accessed 09 Aug 2021"},{"key":"7_CR21","doi-asserted-by":"crossref","unstructured":"Serena Elisa Ponta, W.F., et al.: The used, the bloated, and the vulnerable: reducing the attack surface of an industrial application (2021)","DOI":"10.26226\/morressier.613b5418842293c031b5b612"},{"issue":"3","key":"7_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10664-020-09914-8","volume":"26","author":"C Soto-Valero","year":"2021","unstructured":"Soto-Valero, C., Harrand, N., Monperrus, M., Baudry, B.: A comprehensive study of bloated dependencies in the maven ecosystem. Empir. Softw. Eng. 26(3), 1\u201344 (2021)","journal-title":"Empir. Softw. Eng."},{"key":"7_CR23","unstructured":"StackOverflow: Stackoverflow developer survey results 2020: most popular technologies (2020). https:\/\/insights.stackoverflow.com\/survey\/2020#technology"},{"key":"7_CR24","unstructured":"Strobel, M.: Procyon: a suite of java metaprogramming tools focused on code generation, analysis, and decompilation, June 2019. https:\/\/bitbucket.org\/mstrobel\/procyon\/src\/default\/"},{"key":"7_CR25","doi-asserted-by":"crossref","unstructured":"Wang, H., Guo, Y., Ma, Z., Chen, X.: Wukong: a scalable and accurate two-phase approach to Android app clone detection. In: Proceedings of the 2015 International Symposium on Software Testing and Analysis, pp. 71\u201382. ACM (2015)","DOI":"10.1145\/2771783.2771795"},{"key":"7_CR26","doi-asserted-by":"crossref","unstructured":"Xu, G., Mitchell, N., Arnold, M., Rountev, A., Sevitsky, G.: Software bloat analysis: finding, removing, and preventing performance problems in modern large-scale object-oriented applications. In: Proceedings of the FSE\/SDP Workshop on Future of Software Engineering Research, pp. 421\u2013426 (2010)","DOI":"10.1145\/1882362.1882448"},{"key":"7_CR27","doi-asserted-by":"crossref","unstructured":"Zhang, Y., et al.: Detecting third-party libraries in Android applications with high precision and recall. In: 2018 IEEE 25th International Conference on Software Analysis, Evolution and Reengineering (SANER), pp. 141\u2013152. IEEE (2018)","DOI":"10.1109\/SANER.2018.8330204"}],"container-title":["Communications in Computer and Information Science","Evaluation of Novel Approaches to Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-96648-5_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,10]],"date-time":"2022-02-10T15:17:08Z","timestamp":1644506228000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-96648-5_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030966478","9783030966485"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-96648-5_7","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"11 February 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ENASE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Evaluation of Novel Approaches to Software Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 April 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 April 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"enase2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.enase.org\/?y=2021","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"PRIMORIS","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"96","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"15","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"16% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}