Publications
    - Reset

Defensive Publications are a method for the open source community to prevent the issuance of low quality software patents. These publications serve as evidence to disclose to the examiner what is new and innovative within the technology. Through Linux Defenders, developers collaborate with our team to ensure that these publications are effective in protecting the freedom to create, invent and operate.

Publication Date Title Tags
October 20, 2014 Discovering Code Cloning in Software Source Code by Fingerprinting
This document describes a simple code clone detection method that extracts string constants and other idenfitiers (function names, method names, variable names, etc.) from source code and compares these identifiers to a knowledgebase with identifiers extracted from publicly available open source software with the aim of finding copied code.
Linux FreeBSD Unix software software development *BSD Android Java open source code clone detection
April 07, 2014 Discovering, verifying and visualizing dependencies between dynamically linked software components for researching build configuration, open source license compliance and security
The method in this document describes how these dependencies can be found for binaries that use the ELF format (Executable and Linking Format), which is the binary format used on the Unix(-like) systems mentioned before.
security visualization Linux FreeBSD BSD Unix QNX Solaris ELF software software development dynamic linking open source license compliance defect discovery reverse engineering
January 31, 2012 Finding Software License Violations Through Binary Code Clone Detection
Software released in binary form frequently uses third-party packages without respecting their licensing terms. Such license violations are often accidental, for example when vendors receive binary code from their suppliers with no indication of its provenance.
Linux FreeBSD BSD Unix software open source license compliance binary code license violations