ISSTA 2024
Mon 16 - Fri 20 September 2024 Vienna, Austria
co-located with ISSTA/ECOOP 2024

This program is tentative and subject to change.

Fri 20 Sep 2024 15:50 - 16:10 at EI 10 Fritz Paschke - Analysis of Code Origin

Open source software brings benefits to the software community, but also introduces legal risks caused by license violations, which result in serious consequences such as lawsuits and financial losses. To mitigate legal risks, some approaches have been proposed to identify licenses, detect license incompatibilities and inconsistencies, and recommend licenses. As far as we know, however, there is no prior work to understand modification terms in open source licenses or to detect and fix violations of modification terms.

To bridge this gap, we first empirically characterize modification terms in 48 open source licenses. These licenses all require certain forms of ``notice'' to describe the modifications made to the original work. Inspired by our study, we then design LIVO to automatically detect and fix violations of modification terms in open source licenses during forking. Our evaluation has shown the effectiveness and efficiency of LIVO. 18 pull requests for fixing modification term violations have received positive responses. 8 have been merged.

This program is tentative and subject to change.

Fri 20 Sep

Displayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change

15:30 - 16:30
Analysis of Code OriginTechnical Papers at EI 10 Fritz Paschke
15:30
20m
Talk
Enhancing Robustness of Code Authorship Attribution through Expert Feature Knowledge
Technical Papers
XiaoweiGuo Huazhong University of Science and Technology, Cai Fu Huazhong University of Science and Technology, Juan Chen Xihua University, China, Hongle Liu Huazhong University of Science and Technology, Lansheng Han Huazhong University of Science and Technology, Wenjin Li NSFOCUS Technologies Group
DOI
15:50
20m
Talk
Your "Notice" is Missing: Detecting and Fixing Violations of Modification Terms in Open Source Licenses during Forking
Technical Papers
Kaifeng Huang Tongji University, Yingfeng Xia Fudan University, Bihuan Chen Fudan University, Siyang He Fudan University, Huazheng Zeng Fudan University, Zhuotong Zhou Fudan University, Jin Guo Fudan University, Xin Peng Fudan University
16:10
20m
Talk
DeLink: Source File Information Recovery in Binaries
Technical Papers
Zhe Lang Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS; School of Cyber Security, University of Chinese Academy of Sciences, Zhengzi Xu Nanyang Technological University, Xiaohui Chen Institute of Information Engineering, CAS; School of Cyber Security, University of Chinese Academy of Sciences, lvshichao College of Cyberspace Security, Chinese Academy of Sciences, Zhanwei Song Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS; School of Cyber Security, University of Chinese Academy of Sciences, zhiqiang shi Institute of Information Engineering, Chinese Academy of Sciences, School of Cyber Security, University of Chinese Academy of Sciences,, Limin Sun Institute of Information Engineering, Chinese Academy of Sciences, School of Cyber Security, University of Chinese Academy of Sciences,