{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T02:11:30Z","timestamp":1775873490482,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,5,21]],"date-time":"2011-05-21T00:00:00Z","timestamp":1305936000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,5,21]]},"DOI":"10.1145\/1985441.1985453","type":"proceedings-article","created":{"date-parts":[[2011,5,24]],"date-time":"2011-05-24T13:04:30Z","timestamp":1306242270000},"page":"63-72","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":117,"title":["Finding software license violations through binary code clone detection"],"prefix":"10.1145","author":[{"given":"Armijn","family":"Hemel","sequence":"first","affiliation":[{"name":"gpl-violations.org, Netherlands, Netherlands"}]},{"given":"Karl Trygve","family":"Kalleberg","sequence":"additional","affiliation":[{"name":"KolibriFX, Norway, Norway"}]},{"given":"Rob","family":"Vermaas","sequence":"additional","affiliation":[{"name":"Delft University of Technology, Netherlands, Netherlands"}]},{"given":"Eelco","family":"Dolstra","sequence":"additional","affiliation":[{"name":"Delft University of Technology, Netherlands, Netherlands"}]}],"member":"320","published-online":{"date-parts":[[2011,5,21]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"E. Andersen etal BusyBox hall of shame. http:\/\/busybox.net\/shame.html 2008.  E. Andersen et al. BusyBox hall of shame. http:\/\/busybox.net\/shame.html 2008."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/1776434.1776449"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/832303.836911"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2005.844059"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2010.35"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2010.5463282"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806824"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/998675.999463"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1002\/smr.v18:1"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1882291.1882315"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2009.5069483"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1858996.1859088"},{"key":"e_1_3_2_1_13_1","unstructured":"A. Hemel. The GPL compliance engineering guide. http:\/\/www.loohuis-consulting.nl\/downloads\/compliance-manual.pdf 2008--2010.  A. Hemel. The GPL compliance engineering guide. http:\/\/www.loohuis-consulting.nl\/downloads\/compliance-manual.pdf 2008--2010."},{"key":"e_1_3_2_1_14_1","unstructured":"L. Hewlett-Packard Development Company. FOSSology. http:\/\/www.fossology.org\/ 2009--2011.  L. Hewlett-Packard Development Company. FOSSology. http:\/\/www.fossology.org\/ 2009--2011."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-008-9076-6"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"D. Korn J. MacDonald J. Mogul and K. Vo. The VCDIFF generic differencing and compression data format. RFC 3284 June 2002.   D. Korn J. MacDonald J. Mogul and K. Vo. The VCDIFF generic differencing and compression data format. RFC 3284 June 2002.","DOI":"10.17487\/rfc3284"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.97"},{"key":"e_1_3_2_1_18_1","first-page":"13","volume-title":"Proceedings of the Eighth Working Conference on Reverse Engineering (WCRE'01)","author":"Moonen L."},{"key":"e_1_3_2_1_19_1","unstructured":"C. Percival. Naive differences of executable code. http:\/\/www.daemonology.net\/bsdiff\/ 2003.  C. Percival. Naive differences of executable code. http:\/\/www.daemonology.net\/bsdiff\/ 2003."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572272.1572287"},{"key":"e_1_3_2_1_21_1","unstructured":"Software Freedom Law Center. Best Buy Samsung Westinghouse and eleven other brands named in SFLC lawsuit. http:\/\/www.softwarefreedom.org\/news\/2009\/dec\/14\/busybox-gpl-lawsuit\/ 2009.  Software Freedom Law Center. Best Buy Samsung Westinghouse and eleven other brands named in SFLC lawsuit. http:\/\/www.softwarefreedom.org\/news\/2009\/dec\/14\/busybox-gpl-lawsuit\/ 2009."},{"key":"e_1_3_2_1_22_1","unstructured":"A. Vance. The defenders of free software. http:\/\/www.nytimes.com\/2010\/09\/26\/business\/26ping.html 2010.  A. Vance. The defenders of free software. http:\/\/www.nytimes.com\/2010\/09\/26\/business\/26ping.html 2010."},{"key":"e_1_3_2_1_23_1","unstructured":"H. Welte. Free and open source software license compliance. http:\/\/www.openfoundry.org\/en\/workshop\/details\/115 2010.  H. Welte. Free and open source software license compliance. http:\/\/www.openfoundry.org\/en\/workshop\/details\/115 2010."},{"key":"e_1_3_2_1_24_1","unstructured":"H. Welte and A. Hemel. The gpl-violations.org project. http:\/\/gpl-violations.org\/ 2005--2011.  H. Welte and A. Hemel. The gpl-violations.org project. http:\/\/gpl-violations.org\/ 2005--2011."}],"event":{"name":"ICSE11: International Conference on Software Engineering","location":"Waikiki, Honolulu HI USA","acronym":"ICSE11","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"]},"container-title":["Proceedings of the 8th Working Conference on Mining Software Repositories"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1985441.1985453","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1985441.1985453","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:06:12Z","timestamp":1750244772000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1985441.1985453"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,5,21]]},"references-count":24,"alternative-id":["10.1145\/1985441.1985453","10.1145\/1985441"],"URL":"https:\/\/doi.org\/10.1145\/1985441.1985453","relation":{},"subject":[],"published":{"date-parts":[[2011,5,21]]},"assertion":[{"value":"2011-05-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}