{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T12:32:48Z","timestamp":1773318768017,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,11,16]]},"DOI":"10.1145\/3712285.3759873","type":"proceedings-article","created":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T16:04:47Z","timestamp":1762963487000},"page":"1742-1754","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["SIREN: Software Identification and Recognition in HPC Systems"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-1892-3153","authenticated-orcid":false,"given":"Thomas","family":"Jakobsche","sequence":"first","affiliation":[{"name":"University of Basel, Basel, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8455-274X","authenticated-orcid":false,"given":"Fredrik","family":"Roberts\u00e9n","sequence":"additional","affiliation":[{"name":"CSC - IT Center for Science, Kajaani, Finland"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-7579-7245","authenticated-orcid":false,"given":"Jessica R.","family":"Jones","sequence":"additional","affiliation":[{"name":"Hewlett Packard Enterprise (HPE), Bristol, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7292-9984","authenticated-orcid":false,"given":"Utz-Uwe","family":"Haus","sequence":"additional","affiliation":[{"name":"Hewlett Packard Enterprise (HPE), Z\u00fcrich, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2773-4499","authenticated-orcid":false,"given":"Florina M.","family":"Ciorba","sequence":"additional","affiliation":[{"name":"University of Basel, Basel, Switzerland"}]}],"member":"320","published-online":{"date-parts":[[2025,11,15]]},"reference":[{"key":"e_1_3_3_2_2_2","unstructured":"2014. Extremely fast non-cryptographic hash algorithm. https:\/\/github.com\/Cyan4973\/xxHash. GitHub repository."},{"key":"e_1_3_3_2_3_2","unstructured":"2016. An Action Plan for High Performance Computing Security. https:\/\/csrc.nist.gov\/CSRC\/media\/Projects\/High-Performance-Computing-Security\/documents\/nist-high-performance-computing-security_draft.pdf November 2016."},{"key":"e_1_3_3_2_4_2","unstructured":"2017. SPIRE (the SPIFFE Runtime Environment). https:\/\/github.com\/spiffe\/spire. GitHub repository."},{"key":"e_1_3_3_2_5_2","unstructured":"n. d.. Climate Change Adaptation Digital Twin (Climate DT). https:\/\/destine.ecmwf.int\/climate-change-adaptation-digital-twin-climate-dt\/."},{"key":"e_1_3_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/SC.2014.18"},{"key":"e_1_3_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/HUST.2014.6"},{"key":"e_1_3_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96983-1_7"},{"key":"e_1_3_3_2_9_2","unstructured":"BBC News Technology. 2014. US National Agency Computers Misused to Mine Bitcoins. https:\/\/www.bbc.com\/news\/technology-27779030 10 June 2014."},{"key":"e_1_3_3_2_10_2","unstructured":"BBC News Technology. 2020. Europe\u2019s Supercomputers Hijacked by Attackers for Crypto Mining. https:\/\/www.bbc.com\/news\/technology-52709660 18 May 2020."},{"key":"e_1_3_3_2_11_2","volume-title":"Dagstuhl Reports","author":"Benkner Siegfried","year":"2014","unstructured":"Siegfried Benkner, Franz Franchetti, Hans\u00a0Michael Gerndt, and Jeffrey\u00a0K Hollingsworth. 2014. Automatic application tuning for HPC architectures (Dagstuhl Seminar 13401). In Dagstuhl Reports , Vol.\u00a03. Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik."},{"key":"e_1_3_3_2_12_2","unstructured":"Jim Brandt Florina Ciorba Ann Gentile Michael Ott and Torsten Wilde. 2023. Driving HPC Operations With Holistic Monitoring and Operational Data Analytics (Dagstuhl Seminar 23171). (2023)."},{"key":"e_1_3_3_2_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICPPW.2015.38"},{"key":"e_1_3_3_2_14_2","unstructured":"Thomas Claburn. 2025. LLMs can\u2019t stop making up software dependencies and sabotaging everything. https:\/\/www.theregister.com\/2025\/04\/12\/ai_code_suggestions_sabotage_supply_chain\/. The Register. Published Sat 12 Apr 2025."},{"key":"e_1_3_3_2_15_2","doi-asserted-by":"publisher","DOI":"10.1145\/3458817.3476186"},{"key":"e_1_3_3_2_16_2","doi-asserted-by":"crossref","unstructured":"Leonardo Dagum and Ramesh Menon. 1998. OpenMP: an industry standard API for shared-memory programming. IEEE computational science and engineering 5 1 (1998) 46\u201355.","DOI":"10.1109\/99.660313"},{"key":"e_1_3_3_2_17_2","doi-asserted-by":"crossref","unstructured":"Fred\u00a0J Damerau. 1964. A technique for computer detection and correction of spelling errors. Commun. ACM 7 3 (1964) 171\u2013176.","DOI":"10.1145\/363958.363994"},{"key":"e_1_3_3_2_18_2","unstructured":"Theodore\u00a0R. Delwiche. 2014. Harvard Research Computing Resources Misused for \u2018Dogecoin\u2019 Mining Operation. https:\/\/www.thecrimson.com\/article\/2014\/2\/20\/harvard-odyssey-dogecoin\/ 20 February 2014."},{"key":"e_1_3_3_2_19_2","unstructured":"Mark Fahey Nick Jones Bilel Hadri and Blake Hitchcock. 2010. The automatic library tracking database. Proceedings of the Cray User Group (2010)."},{"key":"e_1_3_3_2_20_2","doi-asserted-by":"crossref","unstructured":"Horst Feistel. 1973. Cryptography and computer privacy. Scientific american 228 5 (1973) 15\u201323.","DOI":"10.1038\/scientificamerican0573-15"},{"key":"e_1_3_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.5555\/2808941"},{"key":"e_1_3_3_2_22_2","doi-asserted-by":"crossref","unstructured":"Poornima Haridas Gopinath Chennupati Nandakishore Santhi Phillip Romero and Stephan Eidenbenz. 2020. Code characterization with graph convolutions and capsule networks. IEEE Access 8 (2020) 136307\u2013136315.","DOI":"10.1109\/ACCESS.2020.3011909"},{"key":"e_1_3_3_2_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/SCW63240.2024.00222"},{"key":"e_1_3_3_2_24_2","doi-asserted-by":"crossref","unstructured":"Jesse Kornblum. 2006. Identifying almost identical files using context triggered piecewise hashing. Digital investigation 3 (2006) 91\u201397.","DOI":"10.1016\/j.diin.2006.06.015"},{"key":"e_1_3_3_2_25_2","unstructured":"Edir\u00a0Garcia Lazo and Microsoft 365 Defender\u00a0Research Team. 2021. Combing through the fuzz: Using fuzzy hashing and deep learning to counter malware detection evasion techniques. https:\/\/www.microsoft.com\/security\/blog\/2021\/07\/27\/ 27 July 2021."},{"key":"e_1_3_3_2_26_2","first-page":"707","volume-title":"Soviet physics doklady","author":"Levenshtein Vladimir\u00a0I","year":"1966","unstructured":"Vladimir\u00a0I Levenshtein et\u00a0al. 1966. Binary codes capable of correcting deletions, insertions, and reversals. In Soviet physics doklady , Vol.\u00a010. Soviet Union, 707\u2013710."},{"key":"e_1_3_3_2_27_2","unstructured":"Robert McLay and Mark Fahey. 2015. Understanding the Software Needs of High Performance Computer Users with XALT. (2015)."},{"key":"e_1_3_3_2_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/Cluster48925.2021.00086"},{"key":"e_1_3_3_2_29_2","doi-asserted-by":"crossref","unstructured":"Sean Peisert. 2017. Security in High-Performance Computing Environments. Communications of the ACM (CACM) 60 9 (September 2017) 72\u201380.","DOI":"10.1145\/3096742"},{"key":"e_1_3_3_2_30_2","unstructured":"PyUp.io. 2021. A curated database of insecure Python packages. https:\/\/github.com\/pyupio\/safety-db. GitHub repository."},{"key":"e_1_3_3_2_31_2","doi-asserted-by":"crossref","unstructured":"Bernie Roehle. 1997. Channeling the data flood. IEEE spectrum 34 3 (1997) 32\u201338.","DOI":"10.1109\/6.576006"},{"key":"e_1_3_3_2_32_2","doi-asserted-by":"publisher","DOI":"10.1109\/CLUSTERWorkshops61563.2024.00016"},{"key":"e_1_3_3_2_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/IISWC.2005.1526010"},{"key":"e_1_3_3_2_34_2","unstructured":"Tiffany Trader. 2018. Russian Nuclear Engineers Caught Cryptomining on Lab Supercomputer. https:\/\/www.hpcwire.com\/2018\/02\/12\/russian-nuclear-engineers-caught-cryptomining-lab-supercomputer\/ 12 February 2018."},{"key":"e_1_3_3_2_35_2","unstructured":"Andy Turner. 2022. Software usage data on ARCHER2. https:\/\/www.archer2.ac.uk\/news\/2022\/02\/07\/software-usage-data.html EPCC."},{"key":"e_1_3_3_2_36_2","unstructured":"David\u00a0W Walker and Jack\u00a0J Dongarra. 1996. MPI: a standard message passing interface. Supercomputer 12 (1996) 56\u201368."},{"key":"e_1_3_3_2_37_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-92040-5_5"},{"key":"e_1_3_3_2_38_2","doi-asserted-by":"crossref","unstructured":"Dewi Yokelson Oskar Lappi Srinivasan Ramesh Miikka\u00a0S V\u00e4is\u00e4l\u00e4 Kevin Huck Touko Puro Boyana Norris Maarit Korpi-Lagg Keijo Heljanko and Allen\u00a0D Malony. 2024. SOMA: Observability Monitoring and In Situ Analytics for Exascale Applications. Concurrency and Computation: Practice and Experience 36 19 (2024) e8141.","DOI":"10.1002\/cpe.8141"},{"key":"e_1_3_3_2_39_2","doi-asserted-by":"publisher","DOI":"10.1007\/10968987_3"},{"key":"e_1_3_3_2_40_2","first-page":"1","volume-title":"2021 IEEE High Performance Extreme Computing Conference (HPEC)","author":"Zhang Yijia","year":"2021","unstructured":"Yijia Zhang, Burak Aksar, Omar Aaziz, Benjamin Schwaller, Jim Brandt, Vitus Leung, Manuel Egele, and Ayse\u00a0K Coskun. 2021. Using monitoring data to improve hpc performance via network-data-driven allocation. In 2021 IEEE High Performance Extreme Computing Conference (HPEC). IEEE, 1\u20137."}],"event":{"name":"SC '25: The International Conference for High Performance Computing, Networking, Storage and Analysis","location":"St. Louis MO USA","acronym":"SC '25","sponsor":["SIGHPC ACM Special Interest Group on High Performance Computing, Special Interest Group on High Performance Computing"]},"container-title":["Proceedings of the International Conference for High Performance Computing, Networking, Storage and Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3712285.3759873","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T18:50:59Z","timestamp":1773255059000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3712285.3759873"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,15]]},"references-count":39,"alternative-id":["10.1145\/3712285.3759873","10.1145\/3712285"],"URL":"https:\/\/doi.org\/10.1145\/3712285.3759873","relation":{},"subject":[],"published":{"date-parts":[[2025,11,15]]},"assertion":[{"value":"2025-11-15","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}