{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T20:23:03Z","timestamp":1740169383074,"version":"3.37.3"},"reference-count":23,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/access.2024.3442191","type":"journal-article","created":{"date-parts":[[2024,8,12]],"date-time":"2024-08-12T17:35:53Z","timestamp":1723484153000},"page":"111846-111857","source":"Crossref","is-referenced-by-count":0,"title":["Research and Implementation of Open Source Component Library Detection for Binary Programs"],"prefix":"10.1109","volume":"12","author":[{"given":"Yanan","family":"Zhang","sequence":"first","affiliation":[{"name":"Automotive Data of China (Tianjin) Company Ltd., Tianjin, China"}]},{"given":"Chao","family":"Ma","sequence":"additional","affiliation":[{"name":"CATARC Intelligent and Connected Technology Company Ltd., Tianjin, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9368-0185","authenticated-orcid":false,"given":"Yuqiao","family":"Ning","sequence":"additional","affiliation":[{"name":"CATARC Intelligent and Connected Technology Company Ltd., Tianjin, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-8004-2759","authenticated-orcid":false,"given":"Qingyang","family":"Wu","sequence":"additional","affiliation":[{"name":"CATARC Intelligent and Connected Technology Company Ltd., Tianjin, China"}]},{"given":"Zhen","family":"Guo","sequence":"additional","affiliation":[{"name":"CATARC Intelligent and Connected Technology Company Ltd., Tianjin, China"}]}],"member":"263","reference":[{"volume-title":"Security Bulletin on Remote Code Execution Vulnerabilities in Apache Log4j2 (Second Edition)","year":"2021","key":"ref1"},{"issue":"S2","key":"ref2","first-page":"29","article-title":"Application research on \u2018network security level protection evaluation report template (2019 edition)","volume-title":"Inf. Netw. Secur.","author":"Youjian","year":"2020"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/access.2023.3324402"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3597926.3598143"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2185448.2185464"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2016.52"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568286"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ISSNIP.2014.6827639"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2742647.2742668"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2435349.2435377"},{"key":"ref11","article-title":"BinPro: A tool for binary source code provenance","author":"Miyani","year":"2017","journal-title":"arXiv:1711.00830"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40203-6_11"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2771783.2771795"},{"key":"ref14","first-page":"653","article-title":"LibRadar: Fast and accurate detection of third-party libraries in Android apps","volume-title":"Proc. IEEE\/ACM 38th Int. Conf. Softw. Eng. Companion (ICSE-C)","author":"Ma"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3524842.3528442"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978333"},{"volume-title":"LibScout","year":"2019","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88403-3_5"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134048"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2018.8330204"},{"volume-title":"LibPecker","year":"2018","key":"ref21"},{"key":"ref22","first-page":"1312","article-title":"OSLDetector: Identifying open-source libraries through binary analysis","volume-title":"Proc. 35th IEEE\/ACM Int. Conf. Automated Softw. Eng. (ASE)","author":"Zhang"},{"volume-title":"Experimental-Data","year":"2024","key":"ref23"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10380310\/10634183.pdf?arnumber=10634183","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,20]],"date-time":"2024-08-20T05:52:27Z","timestamp":1724133147000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10634183\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/access.2024.3442191","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2024]]}}}