On the relationship between similar requirements and similar software: A case study in the railway domain

M Abbas, A Ferrari, A Shatnawi, E Enoiu… - Requirements …, 2023‏ - Springer
Recommender systems for requirements are typically built on the assumption that similar
requirements can be used as proxies to retrieve similar software. When a stakeholder …

ModX: binary level partially imported third-party library detection via program modularization and semantic matching

C Yang, Z Xu, H Chen, Y Liu, X Gong… - Proceedings of the 44th …, 2022‏ - dl.acm.org
With the rapid growth of software, using third-party libraries (TPLs) has become increasingly
popular. The prosperity of the library usage has provided the software engineers with a …

CENTRIS: A precise and scalable approach for identifying modified open-source software reuse

S Woo, S Park, S Kim, H Lee… - 2021 IEEE/ACM 43rd …, 2021‏ - ieeexplore.ieee.org
Open-source software (OSS) is widely reused as it provides convenience and efficiency in
software development. Despite evident benefits, unmanaged OSS components can …

{V1SCAN}: Discovering 1-day Vulnerabilities in Reused {C/C++} Open-source Software Components Using Code Classification Techniques

S Woo, E Choi, H Lee, H Oh - 32nd USENIX Security Symposium …, 2023‏ - usenix.org
We present V1SCAN, an effective approach for discovering 1-day vulnerabilities in reused
C/C++ open-source software (OSS) components. Reusing third-party OSS has many …

Open-source tools and benchmarks for code-clone detection: past, present, and future trends

A Walker, T Cerny, E Song - ACM SIGAPP Applied Computing Review, 2020‏ - dl.acm.org
A fragment of source code that is identical or similar to another is a code-clone. Code-clones
make it difficult to maintain applications as they create multiple points within the code that …

ARCTURUS: Full Coverage Binary Similarity Analysis with Reachability-guided Emulation

A Zhou, Y Hu, X Xu, C Zhang - ACM Transactions on Software …, 2024‏ - dl.acm.org
Binary code similarity analysis is extremely useful, since it provides rich information about an
unknown binary, such as revealing its functionality and identifying reused libraries. Robust …

Osldetector: Identifying open-source libraries through binary analysis

D Zhang, P Luo, W Tang, M Zhou - Proceedings of the 35th IEEE/ACM …, 2020‏ - dl.acm.org
Using open-source libraries can provide rich functions and reduce development cost.
However, some critical issues have also been caused such as license conflicts and …

PromeTrans: Bootstrap binary functionality classification with knowledge transferred from pre-trained models

Z Sha, C Zhang, H Wang, Z Gao, B Zhang… - Empirical Software …, 2025‏ - Springer
Pre-trained models have witnessed significant progress in nature language (including
source code) and binary code comprehension. However, none of them are suitable for …

[HTML][HTML] CrossCode2Vec: A unified representation across source and binary functions for code similarity detection

G Yu, J An, J Lyu, W Huang, W Fan, Y Cheng, A Sui - Neurocomputing, 2025‏ - Elsevier
Code similarity detection identifies code by analyzing similarities in syntax, semantics, and
structure, which includes types of tasks: source-to-source, binary-to-binary, and source-to …

BBDetector: A precise and scalable third-party library detection in binary executables with fine-grained function-level features

X Zhu, J Wang, Z Fang, X Yin, S Liu - Applied Sciences, 2022‏ - mdpi.com
Third-party library (TPL) reuse may introduce vulnerable or malicious code and expose the
software, which exposes them to potential risks. Thus, it is essential to identify third-party …