{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T14:06:54Z","timestamp":1770905214184,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,5,23]],"date-time":"2022-05-23T00:00:00Z","timestamp":1653264000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,5,23]]},"DOI":"10.1145\/3524842.3528473","type":"proceedings-article","created":{"date-parts":[[2022,10,18]],"date-time":"2022-10-18T00:08:36Z","timestamp":1666051716000},"page":"561-565","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Is open source eating the world's software?"],"prefix":"10.1145","author":[{"given":"Julius","family":"Musseau","sequence":"first","affiliation":[{"name":"Mergebase, Canada"}]},{"given":"John Speed","family":"Meyers","sequence":"additional","affiliation":[{"name":"Chainguard"}]},{"given":"George P.","family":"Sieniawski","sequence":"additional","affiliation":[{"name":"IQT Labs"}]},{"given":"C. Albert","family":"Thompson","sequence":"additional","affiliation":[{"name":"Ford Motor Company"}]},{"given":"Daniel","family":"German","sequence":"additional","affiliation":[{"name":"University of Victoria, Canada"}]}],"member":"320","published-online":{"date-parts":[[2022,10,17]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2012.6405311"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-014-9325-9"},{"key":"e_1_3_2_1_3_1","volume-title":"Serena Elisa Ponta, and Eric Bodden. Identifying challenges for oss vulnerability scanners-a study & test suite","author":"Dann Andreas","year":"2021","unstructured":"Andreas Dann , Henrik Plate , Ben Hermann , Serena Elisa Ponta, and Eric Bodden. Identifying challenges for oss vulnerability scanners-a study & test suite . IEEE , 2021 . Andreas Dann, Henrik Plate, Ben Hermann, Serena Elisa Ponta, and Eric Bodden. Identifying challenges for oss vulnerability scanners-a study & test suite. IEEE, 2021."},{"key":"e_1_3_2_1_4_1","volume-title":"A method for open source license compliance of java applications","author":"German Daniel","year":"2011","unstructured":"Daniel German and Massimiliano Di Penta . A method for open source license compliance of java applications . IEEE Software , 29(3), 2011 . Daniel German and Massimiliano Di Penta. A method for open source license compliance of java applications. IEEE Software, 29(3), 2011."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21347-2_16"},{"key":"e_1_3_2_1_6_1","first-page":"63","volume-title":"Proceedings of the 8th International Working Conference on Mining Software Repositories, MSR 2011 (Co-located with ICSE), Waikiki, Honolulu, HI, USA, May 21--28, 2011","author":"Hemel Armijn","year":"2011","unstructured":"Armijn Hemel , Karl Trygve Kalleberg , Rob Vermaas , and Eelco Dolstra . Finding software license violations through binary code clone detection. In Arie van Deursen, Tao Xie, and Thomas Zimmermann, editors , Proceedings of the 8th International Working Conference on Mining Software Repositories, MSR 2011 (Co-located with ICSE), Waikiki, Honolulu, HI, USA, May 21--28, 2011 , Proceedings , pages 63 -- 72 . ACM, 2011 . Armijn Hemel, Karl Trygve Kalleberg, Rob Vermaas, and Eelco Dolstra. Finding software license violations through binary code clone detection. In Arie van Deursen, Tao Xie, and Thomas Zimmermann, editors, Proceedings of the 8th International Working Conference on Mining Software Repositories, MSR 2011 (Co-located with ICSE), Waikiki, Honolulu, HI, USA, May 21--28, 2011, Proceedings, pages 63--72. ACM, 2011."},{"key":"e_1_3_2_1_7_1","first-page":"125","volume-title":"Beyond lines of code: Do we need more complexity metrics? In Andy Oram and Greg Wilson","author":"Herraiz Israel","year":"2011","unstructured":"Israel Herraiz and Ahmed E. Hassan . Beyond lines of code: Do we need more complexity metrics? In Andy Oram and Greg Wilson , editors, Making Software - What Really Works, and Why We Believe It, Theory in practice, pages 125 -- 144 . O'Reilly , 2011 . Israel Herraiz and Ahmed E. Hassan. Beyond lines of code: Do we need more complexity metrics? In Andy Oram and Greg Wilson, editors, Making Software - What Really Works, and Why We Believe It, Theory in practice, pages 125--144. O'Reilly, 2011."},{"key":"e_1_3_2_1_8_1","volume-title":"20th International Conference on Program Comprehension","author":"Mojica Ruiz Bram Adams","year":"2012","unstructured":"Bram Adams Israel J. Mojica Ruiz , Meiyappan Nagappan and Ahmed E. Hassan . Understanding reuse in the android market . In 20th International Conference on Program Comprehension , 2012 . Bram Adams Israel J. Mojica Ruiz, Meiyappan Nagappan and Ahmed E. Hassan. Understanding reuse in the android market. In 20th International Conference on Program Comprehension, 2012."},{"key":"e_1_3_2_1_9_1","volume-title":"Bram Adams and Ahmed E. Hassan. A large-scale empirical study on software reuse in mobile apps","author":"Steffen Dienst Thorsten Berger Meiyappan Nagappan","year":"2014","unstructured":"Meiyappan Nagappan Steffen Dienst Thorsten Berger Israel J. Mojica Ruiz , Bram Adams and Ahmed E. Hassan. A large-scale empirical study on software reuse in mobile apps . IEEE Software , 31(2), 2014 . Meiyappan Nagappan Steffen Dienst Thorsten Berger Israel J. Mojica Ruiz, Bram Adams and Ahmed E. Hassan. A large-scale empirical study on software reuse in mobile apps. IEEE Software, 31(2), 2014."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2465449.2465468"},{"key":"e_1_3_2_1_11_1","volume-title":"Aug","author":"Sonatype Inc.","year":"2020","unstructured":"Sonatype Inc. The 2020 State of the Software Supply Chain. https:\/\/www.sonatype.com\/2020ssc , Aug 2020 . Sonatype Inc. The 2020 State of the Software Supply Chain. https:\/\/www.sonatype.com\/2020ssc, Aug 2020."},{"key":"e_1_3_2_1_12_1","volume-title":"May","author":"Synopsys Cybersecurity Research Center","year":"2021","unstructured":"Synopsys Cybersecurity Research Center . Open Source Security and Risk Analysis Report. https:\/\/www.synopsys.com\/software-integrity\/resources\/analyst-reports\/2020-open-source-security-risk-analysis.html , May 2021 . Synopsys Cybersecurity Research Center. Open Source Security and Risk Analysis Report. https:\/\/www.synopsys.com\/software-integrity\/resources\/analyst-reports\/2020-open-source-security-risk-analysis.html, May 2021."},{"key":"e_1_3_2_1_13_1","volume-title":"IEEE\/ACM 13th Working Conference on Mining Software Repositories","author":"Tetsuya Kanda","year":"2016","unstructured":"Tetsuya Kanda Daniel M. German Takashi Ishio, Raula Gaikovina Kula and Katsuro Inoue. Software ingredients: Detection of third-party component reuse in java software release . In IEEE\/ACM 13th Working Conference on Mining Software Repositories , 2016 . Tetsuya Kanda Daniel M. German Takashi Ishio, Raula Gaikovina Kula and Katsuro Inoue. Software ingredients: Detection of third-party component reuse in java software release. In IEEE\/ACM 13th Working Conference on Mining Software Repositories, 2016."},{"key":"e_1_3_2_1_14_1","volume-title":"July","year":"2018","unstructured":"Tidelift. How to make open source work better for everybody. https:\/\/tidelift.com\/about\/2018-tidelift-professional-open-source-survey-results , July 2018 . Tidelift. How to make open source work better for everybody. https:\/\/tidelift.com\/about\/2018-tidelift-professional-open-source-survey-results, July 2018."}],"event":{"name":"MSR '22: 19th International Conference on Mining Software Repositories","location":"Pittsburgh Pennsylvania","acronym":"MSR '22","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"]},"container-title":["Proceedings of the 19th International Conference on Mining Software Repositories"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3524842.3528473","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3524842.3528473","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:09:35Z","timestamp":1750183775000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3524842.3528473"}},"subtitle":["measuring the proportion of open source in proprietary software using Java binaries"],"short-title":[],"issued":{"date-parts":[[2022,5,23]]},"references-count":14,"alternative-id":["10.1145\/3524842.3528473","10.1145\/3524842"],"URL":"https:\/\/doi.org\/10.1145\/3524842.3528473","relation":{},"subject":[],"published":{"date-parts":[[2022,5,23]]},"assertion":[{"value":"2022-10-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}