{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T12:27:33Z","timestamp":1766579253354,"version":"3.40.3"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031708954"},{"type":"electronic","value":"9783031708961"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-70896-1_3","type":"book-chapter","created":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T12:03:57Z","timestamp":1725537837000},"page":"45-66","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A Study of\u00a0Malicious Source Code Reuse Among GitHub, StackOverflow and\u00a0Underground Forums"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1141-4159","authenticated-orcid":false,"given":"Michal","family":"Tereszkowski-Kaminski","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5674-8531","authenticated-orcid":false,"given":"Santanu Kumar","family":"Dash","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0455-2553","authenticated-orcid":false,"given":"Guillermo","family":"Suarez-Tangil","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,9,6]]},"reference":[{"issue":"3","key":"3_CR1","doi-asserted-by":"publisher","first-page":"1259","DOI":"10.1007\/s10664-018-9650-5","volume":"24","author":"S Baltes","year":"2019","unstructured":"Baltes, S., Diehl, S.: Usage and attribution of stack overflow code snippets in github projects. Empir. Softw. Eng. 24(3), 1259\u20131295 (2019)","journal-title":"Empir. Softw. Eng."},{"issue":"12","key":"3_CR2","doi-asserted-by":"publisher","first-page":"3175","DOI":"10.1109\/TIFS.2018.2885512","volume":"14","author":"A Calleja","year":"2018","unstructured":"Calleja, A., Tapiador, J., Caballero, J.: The malsource dataset: quantifying complexity and code reuse in malware development. IEEE Trans. Inf. Forensics Secur. 14(12), 3175\u20133190 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"Cheng, X., Jiang, L., Zhong, H., Yu, H., Zhao, J.: On the feasibility of detecting cross-platform code clones via identifier similarity. In: Proceedings of the 5th International Workshop on Software Mining, KDD, pp. 39\u201342 (2016)","DOI":"10.1145\/2975961.2975967"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Islam, R., Rokon, M.O.F., Darki, A., Faloutsos, M.: Hackerscope: the dynamics of a massive hacker online ecosystem. arXiv preprint arXiv:2011.07222 (2020)","DOI":"10.1109\/ASONAM49781.2020.9381368"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Moradi-Jamei, B., Kramer, B.L., Calder\u00f3n, J.B.S., Korkmaz, G.: Community formation and detection on github collaboration networks. In: Proceedings of the 2021 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining, KDD, pp. 244\u2013251 (2021)","DOI":"10.1145\/3487351.3488278"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Nafi, K.W., Kar, T.S., Roy, B., Roy, C.K., Schneider, K.A.: CLCDSA: cross language code clone detection using syntactical features and API documentation. In: 2019 34th IEEE\/ACM International Conference on Automated Software Engineering (ASE), pp. 1026\u20131037. IEEE (2019)","DOI":"10.1109\/ASE.2019.00099"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Nakagawa, T., Higo, Y., Kusumoto, S.: Nil: large-scale detection of large-variance clones. In: Proceedings of the 29th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp. 830\u2013841 (2021)","DOI":"10.1145\/3468264.3468564"},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"Pastrana, S., Thomas, D.R., Hutchings, A., Clayton, R.: Crimebb: enabling cybercrime research on underground forums at scale. In: Proceedings of the 2018 World Wide Web Conference, pp. 1845\u20131854 (2018)","DOI":"10.1145\/3178876.3186178"},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"Qian, Y., Zhang, Y., Chawla, N., Ye, Y., Zhang, C.: Malicious repositories detection with adversarial heterogeneous graph contrastive learning. In: Proceedings of the 31st ACM International Conference on Information & Knowledge Management, pp. 1645\u20131654 (2022)","DOI":"10.1145\/3511808.3557384"},{"issue":"4","key":"3_CR10","doi-asserted-by":"publisher","first-page":"2464","DOI":"10.1007\/s10664-017-9564-7","volume":"23","author":"C Ragkhitwetsagul","year":"2018","unstructured":"Ragkhitwetsagul, C., Krinke, J., Clark, D.: A comparison of code similarity analysers. Empir. Softw. Eng. 23(4), 2464\u20132519 (2018)","journal-title":"Empir. Softw. Eng."},{"issue":"3","key":"3_CR11","doi-asserted-by":"publisher","first-page":"560","DOI":"10.1109\/TSE.2019.2900307","volume":"47","author":"C Ragkhitwetsagul","year":"2019","unstructured":"Ragkhitwetsagul, C., Krinke, J., Paixao, M., Bianco, G., Oliveto, R.: Toxic code snippets on stack overflow. IEEE Trans. Software Eng. 47(3), 560\u2013581 (2019)","journal-title":"IEEE Trans. Software Eng."},{"key":"3_CR12","unstructured":"Rokon, M.O.F., Islam, R., Darki, A., Papalexakis, E.E., Faloutsos, M.: Sourcefinder: finding malware source-code from publicly available repositories in github. In: 23rd International Symposium on Research in Attacks, Intrusions and Defenses ($$\\{$$RAID$$\\}$$ 2020), pp. 149\u2013163 (2020)"},{"key":"3_CR13","doi-asserted-by":"crossref","unstructured":"Rokon, M.O.F., Yan, P., Islam, R., Faloutsos, M.: Repo2vec: a comprehensive embedding approach for determining repository similarity. In: 2021 IEEE International Conference on Software Maintenance and Evolution (ICSME), pp. 355\u2013365. IEEE (2021)","DOI":"10.1109\/ICSME52107.2021.00038"},{"issue":"115","key":"3_CR14","first-page":"64","volume":"541","author":"CK Roy","year":"2007","unstructured":"Roy, C.K., Cordy, J.R.: A survey on software clone detection research. Queen\u2019s Sch. Comput. TR 541(115), 64\u201368 (2007)","journal-title":"Queen\u2019s Sch. Comput. TR"},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"Saini, V., Farmahinifarahani, F., Lu, Y., Baldi, P., Lopes, C.V.: Oreo: detection of clones in the twilight zone. In: Proceedings of the 2018 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp. 354\u2013365 (2018)","DOI":"10.1145\/3236024.3236026"},{"key":"3_CR16","doi-asserted-by":"crossref","unstructured":"Sajnani, H., Saini, V., Svajlenko, J., Roy, C.K., Lopes, C.V.: Sourcerercc: scaling code clone detection to big-code. In: Proceedings of the 38th International Conference on Software Engineering, pp. 1157\u20131168 (2016)","DOI":"10.1145\/2884781.2884877"},{"key":"3_CR17","doi-asserted-by":"crossref","unstructured":"Svajlenko, J., Roy, C.K.: Cloneworks: a fast and flexible large-scale near-miss clone detection tool. In: ICSE (Companion Volume), pp. 177\u2013179 (2017)","DOI":"10.1109\/ICSE-C.2017.78"},{"key":"3_CR18","unstructured":"Thomas, K., et al.: Framing dependencies introduced by underground commoditization. In: Proceedings of the Workshop on the Economics of Information Security (WEIS) (2015)"},{"key":"3_CR19","unstructured":"Weaver, N., Paxson, V., Staniford, S., Cunningham, R.: Large scale malicious code: a research agenda (2003)"},{"issue":"1","key":"3_CR20","doi-asserted-by":"publisher","first-page":"12","DOI":"10.3390\/computers12010012","volume":"12","author":"MA Yahya","year":"2023","unstructured":"Yahya, M.A., Kim, D.K.: CLCD-I: cross-language clone detection by using deep learning with infercode. Computers 12(1), 12 (2023)","journal-title":"Computers"},{"key":"3_CR21","doi-asserted-by":"crossref","unstructured":"Yang, D., Martins, P., Saini, V., Lopes, C.: Stack overflow in github: any snippets there? In: 2017 IEEE\/ACM 14th International Conference on Mining Software Repositories (MSR), pp. 280\u2013290. IEEE (2017)","DOI":"10.1109\/MSR.2017.13"},{"key":"3_CR22","unstructured":"yoeo: Guesslang (2020). https:\/\/github.com\/yoeo\/guesslang"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-70896-1_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T12:06:28Z","timestamp":1725537988000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-70896-1_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031708954","9783031708961"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-70896-1_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"6 September 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESORICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Symposium on Research in Computer Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bydgoszcz","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 September 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esorics2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/esorics2024.org","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}