{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T04:03:59Z","timestamp":1775016239419,"version":"3.50.1"},"reference-count":76,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,2,1]],"date-time":"2020-02-01T00:00:00Z","timestamp":1580515200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,2,1]],"date-time":"2020-02-01T00:00:00Z","timestamp":1580515200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,2,1]],"date-time":"2020-02-01T00:00:00Z","timestamp":1580515200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,2]]},"DOI":"10.1109\/saner48275.2020.9054845","type":"proceedings-article","created":{"date-parts":[[2020,4,3]],"date-time":"2020-04-03T07:47:32Z","timestamp":1585900052000},"page":"104-115","source":"Crossref","is-referenced-by-count":32,"title":["LibDX: A Cross-Platform and Accurate System to Detect Third-Party Libraries in Binary Code"],"prefix":"10.1109","author":[{"given":"Wei","family":"Tang","sequence":"first","affiliation":[]},{"given":"Ping","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Jialiang","family":"Fu","sequence":"additional","affiliation":[]},{"given":"Dan","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","year":"2019","journal-title":"Printable characters"},{"key":"ref72","year":"2019","journal-title":"A portable tool for parsing and analyzing Mach-O binaries"},{"key":"ref71","year":"2019","journal-title":"A python module to read and work with PE files"},{"key":"ref70","year":"2019","journal-title":"Displays information about elf files"},{"key":"ref76","author":"long","year":"2019","journal-title":"A tool to perform local searches for known vulnerabilities"},{"key":"ref74","year":"2019","journal-title":"An installable catalogue of FOSS applications for the Android platform"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2018.8330204"},{"key":"ref75","year":"2019","journal-title":"LibPNG16 DLL on Windows"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2013.10.006"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-017-9512-6"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-015-9393-5"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2597073.2597074"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3133908"},{"key":"ref37","first-page":"339","article-title":"Software Ingredients: Detection of Third-Party Component Reuse in Java Software Release","author":"ishio","year":"2016","journal-title":"2016 IEEE\/ACM 13th Conference on Mining Software Repositories (MSR)"},{"key":"ref36","first-page":"71","article-title":"Wukong: A scalable and accurate two-phase approach to android app clone detection","author":"wang","year":"0","journal-title":"Proceedings of the 2015 International Symposium on Software Testing and Analysis ACM"},{"key":"ref35","first-page":"63","article-title":"Finding software license violations through binary code clone detection","author":"kalleberg","year":"0","journal-title":"Working Conference on Mining Software Repositories"},{"key":"ref34","year":"2019","journal-title":"Fedora &#x201C;Fedora x86"},{"key":"ref60","year":"0","journal-title":"Insignary clarity"},{"key":"ref62","year":"2019","journal-title":"Black duck sea"},{"key":"ref61","year":"2019","journal-title":"Flexnet code insight"},{"key":"ref63","year":"2019","journal-title":"Libpng in opencv repository on github"},{"key":"ref28","year":"2019","journal-title":"The one-click fix for dll errors"},{"key":"ref64","year":"2019","journal-title":"Libpng in opencv package on fedora 29"},{"key":"ref27","year":"2019","journal-title":"Mobile-ads-sdk"},{"key":"ref65","year":"2019","journal-title":"pkgs org - Packages Search"},{"key":"ref66","year":"2019","journal-title":"International components for unicode libraries"},{"key":"ref29","year":"2019","journal-title":"Ida pro An interactive disassembler"},{"key":"ref67","year":"2019","journal-title":"A library of functions for manipulating png image format files"},{"key":"ref68","year":"2019","journal-title":"Extract cpio archive from rpm package manager (rpm) package"},{"key":"ref69","author":"troan","year":"2019","journal-title":"A python wrapper for libmagic"},{"key":"ref2","year":"2019","journal-title":"The complete open-source and business software platform"},{"key":"ref1","author":"inc","year":"2019","journal-title":"Github is how people build software"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2009.02.007"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.97"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1019480"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.62"},{"key":"ref23","first-page":"1157","article-title":"Sourcer-ercc: Scaling code clone detection to big-code","author":"sajnani","year":"0","journal-title":"2016 IEEE\/ACM 38th International Conference on Software Engineering (ICSE) ICSE"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2004.6"},{"key":"ref25","first-page":"597","article-title":"Sourcerercc and sourcerercc-i: tools to detect clones in batch mode and during software development","author":"saini","year":"0","journal-title":"Proceedings of the 38th International Conference on Software Engineering Companion ACM"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23185"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2017.22"},{"key":"ref59","first-page":"238","article-title":"Binhunt: Automatically finding semantic differences in binary programs","author":"gao","year":"0","journal-title":"International Conference on Information and Communications Security"},{"key":"ref58","article-title":"Blanket execution: Dynamic similarity testing for program binaries and components","author":"egele","year":"0","journal-title":"USENIX Security Symposium"},{"key":"ref57","first-page":"117","article-title":"Detecting code clones in binary executables","author":"szebjernsen","year":"0","journal-title":"Proceedings of the Eighteenth International Symposium on Software Testing and Analysis ACM"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950350"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2017.2655046"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134018"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/WiCOM.2012.6478318"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2013.6624046"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2016.73"},{"key":"ref11","author":"luszcz","year":"2017","journal-title":"Artifex v hancom Open source is now an enforceable contract"},{"key":"ref40","first-page":"653","article-title":"Libradar: fast and accurate detection of third-party libraries in android apps","author":"ma","year":"0","journal-title":"Proceedings of the 38th International Conference on Software Engineering Companion ACM"},{"key":"ref12","author":"goldstein","year":"2017","journal-title":"The 100 million court case for open source license compliance"},{"key":"ref13","author":"michaeli","year":"2016","journal-title":"The real impact of the wordpress-wix fiasco"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663755"},{"key":"ref15","article-title":"State of software security 2017","author":"wysopal","year":"2017","journal-title":"Veracode CA Tech Rep"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-017-9521-5"},{"key":"ref17","first-page":"255","article-title":"Do developers update third-party libraries in mobile apps?","author":"salza","year":"0","journal-title":"Proc 26th Conf Program Comprehension"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134048"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978333"},{"key":"ref4","year":"2019","journal-title":"The APT package management tool"},{"key":"ref3","author":"inc","year":"2019","journal-title":"Google Code"},{"key":"ref6","year":"2019","journal-title":"The missing package manager for macOS"},{"key":"ref5","year":"2019","journal-title":"RPM Package Manager"},{"key":"ref8","year":"2019","journal-title":"A package manager for NET"},{"key":"ref7","year":"2019","journal-title":"A dependency manager for Swift and Objective-C Cocoa projects"},{"key":"ref49","first-page":"43","article-title":"A survey of binary similarity and distance measures","volume":"8","author":"choi","year":"2010","journal-title":"Journal of Systemics Cybernetics and Informatics"},{"key":"ref9","year":"2019","journal-title":"The Libraries io Website"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/3175492"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2019.8667977"},{"key":"ref48","year":"2019","journal-title":"Binsourcerer Assembly to source code matching framework for ida pro"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37119-6_14"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.38"},{"key":"ref41","first-page":"55","article-title":"Libid: reliable identification of obfuscated third-party android libraries","author":"zhang","year":"0","journal-title":"Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis ACM"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2012.6240477"},{"key":"ref43","first-page":"175","article-title":"Achieving accuracy and scalability simultaneously in detecting application clones on android markets","author":"chen","year":"0","journal-title":"Proceedings of the 36th International Conference on Software Engineering ACM"}],"event":{"name":"2020 IEEE 27th International Conference on Software Analysis, Evolution and Reengineering (SANER)","location":"London, ON, Canada","start":{"date-parts":[[2020,2,18]]},"end":{"date-parts":[[2020,2,21]]}},"container-title":["2020 IEEE 27th International Conference on Software Analysis, Evolution and Reengineering (SANER)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9040394\/9054788\/09054845.pdf?arnumber=9054845","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T21:55:29Z","timestamp":1656453329000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9054845\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2]]},"references-count":76,"URL":"https:\/\/doi.org\/10.1109\/saner48275.2020.9054845","relation":{},"subject":[],"published":{"date-parts":[[2020,2]]}}}