2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE) 2021
DOI: 10.1109/icse43902.2021.00083
|View full text |Cite
|
Sign up to set email alerts
|

CENTRIS: A Precise and Scalable Approach for Identifying Modified Open-Source Software Reuse

Abstract: Open-source software (OSS) is widely reused as it provides convenience and efficiency in software development. Despite evident benefits, unmanaged OSS components can introduce threats, such as vulnerability propagation and license violation. Unfortunately, however, identifying reused OSS components is a challenge as the reused OSS is predominantly modified and nested. In this paper, we propose CENTRIS, a precise and scalable approach for identifying modified OSS reuse. By segmenting an OSS code base and detect… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
31
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 25 publications
(31 citation statements)
references
References 38 publications
0
31
0
Order By: Relevance
“…Since multiple libraries are compiled into a fused binary, more popular features will be accumulated. When detecting against a larger database, more false positives could be reported [30].…”
Section: Limitations Of Existing Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Since multiple libraries are compiled into a fused binary, more popular features will be accumulated. When detecting against a larger database, more false positives could be reported [30].…”
Section: Limitations Of Existing Workmentioning
confidence: 99%
“…A Siamese architecture [3] that contains one shared-parameter function embedding network (i.e., Structure2vec) is applied as shown in Figure 3. More technical details about Gemini can be found in its original paper [30].…”
Section: Function Embeddingmentioning
confidence: 99%
See 1 more Smart Citation
“…Exact matching techniques [96,115] fail once the code scales beyond an order of magnitude of ten instructions, and FFTs scale up to thousands. The near duplicate codes these techniques require is highly unlikely, even when implementations are copy-and-pasted [135].…”
Section: Current Schemesmentioning
confidence: 99%
“…For instance, Google Android GMS [123] and Google Android Library [124] share the same root package "com.google.android". Besides, TPL files can also depend on other TPLs, which also are called nested TPLs [125]. This type of TPLs usually has several parallel root packages, while these interdependent parts together constitute one TPL [27].…”
Section: • Module Decouplingmentioning
confidence: 99%