{"id":"https://openalex.org/W4405181372","doi":"https://doi.org/10.1145/3658644.3691407","title":"Poster: Protecting Source Code Privacy When Hunting Bugs","display_name":"Poster: Protecting Source Code Privacy When Hunting Bugs","publication_year":2024,"publication_date":"2024-12-02","ids":{"openalex":"https://openalex.org/W4405181372","doi":"https://doi.org/10.1145/3658644.3691407"},"language":"en","primary_location":{"id":"doi:10.1145/3658644.3691407","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3658644.3691407","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3658644.3691407","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3658644.3691407","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5104051330","display_name":"Jian Wu","orcid":"https://orcid.org/0009-0004-3581-6832"},"institutions":[{"id":"https://openalex.org/I881766915","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760","country_code":"CN","type":"education","lineage":["https://openalex.org/I881766915"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jielun Wu","raw_affiliation_strings":["State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China","institution_ids":["https://openalex.org/I881766915"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5034844386","display_name":"Qingkai Shi","orcid":"https://orcid.org/0000-0002-8297-8998"},"institutions":[{"id":"https://openalex.org/I881766915","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760","country_code":"CN","type":"education","lineage":["https://openalex.org/I881766915"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qingkai Shi","raw_affiliation_strings":["State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China","institution_ids":["https://openalex.org/I881766915"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5104051330"],"corresponding_institution_ids":["https://openalex.org/I881766915"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.25141368,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"5030","last_page":"5032"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/vendor","display_name":"Vendor","score":0.8285946846008301},{"id":"https://openalex.org/keywords/source-code","display_name":"Source code","score":0.792289137840271},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.781805694103241},{"id":"https://openalex.org/keywords/debugging","display_name":"Debugging","score":0.6250553131103516},{"id":"https://openalex.org/keywords/software-quality","display_name":"Software quality","score":0.6066550016403198},{"id":"https://openalex.org/keywords/static-program-analysis","display_name":"Static program analysis","score":0.5432473421096802},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5218885540962219},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5136505961418152},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.49153098464012146},{"id":"https://openalex.org/keywords/code-review","display_name":"Code review","score":0.47086966037750244},{"id":"https://openalex.org/keywords/software-bug","display_name":"Software bug","score":0.4465378522872925},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.359164834022522},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.3277199864387512},{"id":"https://openalex.org/keywords/software-development","display_name":"Software development","score":0.31341421604156494},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.20238515734672546},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.07228600978851318},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.06469219923019409}],"concepts":[{"id":"https://openalex.org/C2777338717","wikidata":"https://www.wikidata.org/wiki/Q1762621","display_name":"Vendor","level":2,"score":0.8285946846008301},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.792289137840271},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.781805694103241},{"id":"https://openalex.org/C168065819","wikidata":"https://www.wikidata.org/wiki/Q845566","display_name":"Debugging","level":2,"score":0.6250553131103516},{"id":"https://openalex.org/C117447612","wikidata":"https://www.wikidata.org/wiki/Q1412670","display_name":"Software quality","level":4,"score":0.6066550016403198},{"id":"https://openalex.org/C137287247","wikidata":"https://www.wikidata.org/wiki/Q1329550","display_name":"Static program analysis","level":4,"score":0.5432473421096802},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5218885540962219},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5136505961418152},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.49153098464012146},{"id":"https://openalex.org/C150292731","wikidata":"https://www.wikidata.org/wiki/Q1342704","display_name":"Code review","level":5,"score":0.47086966037750244},{"id":"https://openalex.org/C1009929","wikidata":"https://www.wikidata.org/wiki/Q179550","display_name":"Software bug","level":3,"score":0.4465378522872925},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.359164834022522},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.3277199864387512},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.31341421604156494},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.20238515734672546},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.07228600978851318},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.06469219923019409},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3658644.3691407","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3658644.3691407","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3658644.3691407","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3658644.3691407","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3658644.3691407","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3658644.3691407","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4405181372.pdf","grobid_xml":"https://content.openalex.org/works/W4405181372.grobid-xml"},"referenced_works_count":14,"referenced_works":["https://openalex.org/W1614668525","https://openalex.org/W2033029512","https://openalex.org/W2059278087","https://openalex.org/W2146182821","https://openalex.org/W2621026180","https://openalex.org/W2794889478","https://openalex.org/W2956055894","https://openalex.org/W2979566992","https://openalex.org/W3000686460","https://openalex.org/W3133304533","https://openalex.org/W3215234832","https://openalex.org/W4206394013","https://openalex.org/W4206639582","https://openalex.org/W4394999238"],"related_works":["https://openalex.org/W2019257047","https://openalex.org/W3153702491","https://openalex.org/W2969257295","https://openalex.org/W3008981372","https://openalex.org/W2206096527","https://openalex.org/W2789660410","https://openalex.org/W4400488007","https://openalex.org/W2129714608","https://openalex.org/W2070111972","https://openalex.org/W2775582007"],"abstract_inverted_index":{"When":[0],"proving":[1],"to":[2,21,41,85,122,147],"a":[3,7,16,33,73,104,117,124,130,167,196],"third":[4,29,97],"party":[5,30],"that":[6,27,76,103,161,182],"software":[8,17,54,79,118],"system":[9],"is":[10,102,110,139],"of":[11,53,95,106,142,190,199],"high":[12],"quality":[13],"or":[14,35,65],"bug-free,":[15],"vendor":[18,119],"may":[19],"have":[20],"reveal":[22,123],"the":[23,28,43,51,57,86,92,96,140,149,188],"source":[24,47,58,82,107,126,143],"code":[25,39,48,59,83,108,127,144],"such":[26],"can":[31,77,185],"use":[32],"public":[34],"their":[36],"own":[37],"static":[38,176],"analyzer":[40],"check":[42],"code.":[44],"However,":[45],"revealing":[46],"seriously":[49],"damages":[50],"interests":[52],"vendors":[55,80],"as":[56],"often":[60],"contains":[61],"core":[62],"technical":[63],"details":[64],"even":[66],"secrets.":[67],"In":[68],"this":[69,154],"work,":[70],"we":[71,157],"propose":[72,158],"win-win":[74,155],"solution":[75],"help":[78],"protect":[81],"privacy":[84],"greatest":[87],"extent":[88],"and,":[89],"meanwhile,":[90],"maximize":[91],"bug-detection":[93],"capability":[94],"party.":[98],"Our":[99],"key":[100],"idea":[101],"majority":[105],"information":[109,128,137,165,192],"not":[111],"useful":[112],"for":[113],"bug":[114,177],"detection.":[115,178],"Thus,":[116],"only":[120,195],"needs":[121],"little":[125],"---":[129,146],"stripped":[131],"binary":[132,169],"together":[133],"with":[134],"minimal":[135,197],"debug":[136,164,191],"(which":[138],"carrier":[141],"information)":[145],"prove":[148],"software's":[150],"quality.":[151],"To":[152],"realize":[153],"solution,":[156],"an":[159],"approach":[160,184],"minimizes":[162],"critical":[163],"in":[166],"non-stripped":[168],"while":[170],"maintaining":[171],"its":[172],"positive":[173],"impact":[174],"on":[175],"Evaluation":[179],"results":[180],"demonstrate":[181],"our":[183],"significantly":[186],"reduce":[187],"size":[189],"and":[193],"retain":[194],"amount":[198],"source-level":[200],"private":[201],"information.":[202]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
