Asm2vec: Boosting static representation robustness for binary clone search against code obfuscation and compiler optimization

SHH Ding, BCM Fung… - 2019 ieee symposium on …, 2019 - ieeexplore.ieee.org
Reverse engineering is a manually intensive but necessary technique for understanding the
inner workings of new malware, finding vulnerabilities in existing systems, and detecting …

Digital innovation and institutional entrepreneurship: Chief Digital Officer perspectives of their emerging role

S Tumbas, N Berente, J Brocke - Journal of Information …, 2018 - journals.sagepub.com
In this study, we explore the role of Chief Digital Officer (CDO) through the perspectives of
CDOs in thirty-five organizations. In enacting their emerging role, CDOs must navigate the …

Why do developers use trivial packages? an empirical case study on npm

R Abdalkareem, O Nourry, S Wehaibi… - Proceedings of the …, 2017 - dl.acm.org
Code reuse is traditionally seen as good practice. Recent trends have pushed the concept of
code reuse to an extreme, by using packages that implement simple and trivial tasks, which …

Open source collaboration in digital entrepreneurship

YK Lin, LM Maruping - Organization Science, 2022 - pubsonline.informs.org
Emerging digital technologies give rise to digital entrepreneurship and the widespread
phenomenon of open source collaboration (OSC) on GitHub for entrepreneurial pursuits …

Copy, transform, combine: exploring the remix as a form of innovation

CM Flath, S Friesike, M Wirth… - Journal of Information …, 2017 - journals.sagepub.com
The reuse of existing knowledge is an indispensable part of the creation of novel ideas. In
the creative domain knowledge reuse is a common practice known as “remixing”. With the …

Third-party library dependency for large-scale SCA in the C/C++ ecosystem: How far are we?

L Jiang, H Yuan, Q Tang, S Nie, S Wu… - Proceedings of the 32nd …, 2023 - dl.acm.org
Existing software composition analysis (SCA) techniques for the C/C++ ecosystem tend to
identify the reused components through feature matching between target software project …

Kam1n0: Mapreduce-based assembly clone search for reverse engineering

SHH Ding, BCM Fung, P Charland - Proceedings of the 22nd ACM …, 2016 - dl.acm.org
Assembly code analysis is one of the critical processes for detecting and proving software
plagiarism and software patent infringements when the source code is unavailable. It is also …

Problem‐formulation and problem‐solving in self‐organized communities: How modes of communication shape project behaviors in the free open‐source software …

NJ Foss, L Frederiksen, F Rullani - Strategic management …, 2016 - Wiley Online Library
Research summary: Building on the problem‐solving perspective, we study behaviors
related to projects and the communication‐based antecedents of such behaviors in the free …

On the impact of using trivial packages: an empirical case study on npm and PyPI

R Abdalkareem, V Oda, S Mujahid, E Shihab - Empirical Software …, 2020 - Springer
Code reuse has traditionally been encouraged since it enables one to avoid re-inventing the
wheel. Due to the npm left-pad package incident where a trivial package led to the …

On the extent and nature of software reuse in open source java projects

L Heinemann, F Deissenboeck, M Gleirscher… - Top Productivity through …, 2011 - Springer
Code repositories on the Internet provide a tremendous amount of freely available open
source code that can be reused for building new software. It has been argued that only …