{"id":"https://openalex.org/W3125574727","doi":"https://doi.org/10.1145/3324884.3415303","title":"OSLDetector","display_name":"OSLDetector","publication_year":2020,"publication_date":"2020-12-21","ids":{"openalex":"https://openalex.org/W3125574727","doi":"https://doi.org/10.1145/3324884.3415303","mag":"3125574727"},"language":"en","primary_location":{"id":"doi:10.1145/3324884.3415303","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3324884.3415303","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1145/3324884.3415303","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100456043","display_name":"Dan Zhang","orcid":"https://orcid.org/0000-0002-7592-3200"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Dan Zhang","raw_affiliation_strings":["Tsinghua University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101643492","display_name":"Ping Luo","orcid":"https://orcid.org/0000-0002-8167-1900"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ping Luo","raw_affiliation_strings":["Tsinghua University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025873597","display_name":"W. Tang","orcid":"https://orcid.org/0000-0002-8866-7074"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Tang","raw_affiliation_strings":["Tsinghua University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5071579968","display_name":"Min Zhou","orcid":"https://orcid.org/0000-0002-4679-0488"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Min Zhou","raw_affiliation_strings":["Tsinghua University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100456043"],"corresponding_institution_ids":["https://openalex.org/I99065089"],"apc_list":null,"apc_paid":null,"fwci":1.6014,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.88439444,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1312","last_page":"1315"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8226578235626221},{"id":"https://openalex.org/keywords/license","display_name":"License","score":0.765702486038208},{"id":"https://openalex.org/keywords/novelty","display_name":"Novelty","score":0.6686869859695435},{"id":"https://openalex.org/keywords/open-source","display_name":"Open source","score":0.5859907865524292},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.5039646029472351},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4862338602542877},{"id":"https://openalex.org/keywords/source-code","display_name":"Source code","score":0.47702547907829285},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.4761921465396881},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.43142861127853394},{"id":"https://openalex.org/keywords/matching","display_name":"Matching (statistics)","score":0.41573694348335266},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.394339919090271},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.3385835289955139},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.3262961804866791},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.32480737566947937},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.08638858795166016}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8226578235626221},{"id":"https://openalex.org/C2780560020","wikidata":"https://www.wikidata.org/wiki/Q79719","display_name":"License","level":2,"score":0.765702486038208},{"id":"https://openalex.org/C2778738651","wikidata":"https://www.wikidata.org/wiki/Q16546687","display_name":"Novelty","level":2,"score":0.6686869859695435},{"id":"https://openalex.org/C3018397939","wikidata":"https://www.wikidata.org/wiki/Q3644502","display_name":"Open source","level":3,"score":0.5859907865524292},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.5039646029472351},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4862338602542877},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.47702547907829285},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.4761921465396881},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.43142861127853394},{"id":"https://openalex.org/C165064840","wikidata":"https://www.wikidata.org/wiki/Q1321061","display_name":"Matching (statistics)","level":2,"score":0.41573694348335266},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.394339919090271},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.3385835289955139},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.3262961804866791},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.32480737566947937},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.08638858795166016},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C27206212","wikidata":"https://www.wikidata.org/wiki/Q34178","display_name":"Theology","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3324884.3415303","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3324884.3415303","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3324884.3415303","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3324884.3415303","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":5,"referenced_works":["https://openalex.org/W2024671287","https://openalex.org/W2232162935","https://openalex.org/W2766078311","https://openalex.org/W2946712736","https://openalex.org/W2962688040"],"related_works":["https://openalex.org/W3081674575","https://openalex.org/W4287673983","https://openalex.org/W2113128227","https://openalex.org/W632256878","https://openalex.org/W4211197663","https://openalex.org/W2491403535","https://openalex.org/W3123068371","https://openalex.org/W2479811461","https://openalex.org/W2104915799","https://openalex.org/W4311938462"],"abstract_inverted_index":{"Using":[0],"open-source":[1,34],"libraries":[2,35,48,111],"can":[3,81,97],"provide":[4,83],"rich":[5],"functions":[6],"and":[7,23,31,64,88,100,115,121,132,141],"reduce":[8],"development":[9],"cost.":[10],"However,":[11],"some":[12],"critical":[13],"issues":[14],"have":[15],"also":[16,82],"been":[17],"caused":[18],"such":[19,60],"as":[20,61],"license":[21,119],"conflicts":[22],"vulnerability":[24],"risks.":[25],"In":[26],"this":[27],"paper,":[28],"we":[29,108],"design":[30],"implement":[32],"an":[33,67],"detection":[36],"tool":[37,80],"OSLDetector":[38,138],"which":[39],"uses":[40],"methods":[41,59],"of":[42,58,76,86,106,130,134],"matching":[43],"features":[44,63],"to":[45,71],"detect":[46],"third-party":[47],"for":[49],"multi-platform":[50],"software":[51],"in":[52],"binaries.":[53],"We":[54],"took":[55],"a":[56,128],"series":[57],"filtering":[62],"novelty":[65],"building":[66],"internal":[68],"clone":[69],"forest":[70],"cope":[72],"with":[73,127],"the":[74,84,104],"challenge":[75],"feature":[77],"duplication.":[78],"The":[79,124],"conflict":[85],"licenses":[87],"identify":[89],"possible":[90],"corresponding":[91],"vulnerabilities,":[92],"so":[93],"these":[94],"potential":[95],"risks":[96],"be":[98],"resolved":[99],"avoided.":[101],"To":[102],"evaluate":[103],"efficiency":[105],"OSLDetector,":[107],"collect":[109],"5K":[110],"containing":[112],"9K":[113],"versions":[114],"manage":[116],"their":[117],"respective":[118],"type":[120],"existing":[122],"vulnerabilities.":[123],"experimental":[125],"results":[126],"precision":[129],"96%":[131],"recall":[133],"92.3%":[135],"show":[136],"that":[137],"is":[139],"effective":[140],"outperforms":[142],"similar":[143],"tools.":[144]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2021-02-01T00:00:00"}
