Publications
    - Reset

Defensive Publications are a method for the open source community to prevent the issuance of low quality software patents. These publications serve as evidence to disclose to the examiner what is new and innovative within the technology. Through Linux Defenders, developers collaborate with our team to ensure that these publications are effective in protecting the freedom to create, invent and operate.

Publication Date Title Tags
April 07, 2014 Discovering, verifying and visualizing dependencies between dynamically linked software components for researching build configuration, open source license compliance and security
The method in this document describes how these dependencies can be found for binaries that use the ELF format (Executable and Linking Format), which is the binary format used on the Unix(-like) systems mentioned before.
security visualization Linux FreeBSD BSD Unix QNX Solaris ELF software software development dynamic linking open source license compliance defect discovery reverse engineering
January 31, 2012 Finding Software License Violations Through Binary Code Clone Detection
Software released in binary form frequently uses third-party packages without respecting their licensing terms. Such license violations are often accidental, for example when vendors receive binary code from their suppliers with no indication of its provenance.
Linux FreeBSD BSD Unix software open source license compliance binary code license violations