{"id":"https://openalex.org/W2947384482","doi":"https://doi.org/10.1007/978-3-030-22888-0_13","title":"A Double-Edged Sword? Software Reuse and Potential Security Vulnerabilities","display_name":"A Double-Edged Sword? Software Reuse and Potential Security Vulnerabilities","publication_year":2019,"publication_date":"2019-01-01","ids":{"openalex":"https://openalex.org/W2947384482","doi":"https://doi.org/10.1007/978-3-030-22888-0_13","mag":"2947384482"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-030-22888-0_13","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-030-22888-0_13","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://pure.rug.nl/ws/files/121204188/Gkortzis2019_Chapter_ADouble_EdgedSwordSoftwareReus.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5040947335","display_name":"Antonios Gkortzis","orcid":"https://orcid.org/0000-0002-7628-1780"},"institutions":[{"id":"https://openalex.org/I73142707","display_name":"Athens University of Economics and Business","ror":"https://ror.org/03s262162","country_code":"GR","type":"education","lineage":["https://openalex.org/I73142707"]}],"countries":["GR"],"is_corresponding":true,"raw_author_name":"Antonios Gkortzis","raw_affiliation_strings":["Department of Management Science and Technology, Athens University of Economics and Business, Athens, Greece"],"affiliations":[{"raw_affiliation_string":"Department of Management Science and Technology, Athens University of Economics and Business, Athens, Greece","institution_ids":["https://openalex.org/I73142707"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008359300","display_name":"Daniel Feitosa","orcid":"https://orcid.org/0000-0001-9371-232X"},"institutions":[{"id":"https://openalex.org/I169381384","display_name":"University of Groningen","ror":"https://ror.org/012p63287","country_code":"NL","type":"education","lineage":["https://openalex.org/I169381384"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Daniel Feitosa","raw_affiliation_strings":["Data Research Centre, University of Groningen, Groningen, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Data Research Centre, University of Groningen, Groningen, The Netherlands","institution_ids":["https://openalex.org/I169381384"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5021948425","display_name":"Diomidis Spinellis","orcid":"https://orcid.org/0000-0003-4231-1897"},"institutions":[{"id":"https://openalex.org/I73142707","display_name":"Athens University of Economics and Business","ror":"https://ror.org/03s262162","country_code":"GR","type":"education","lineage":["https://openalex.org/I73142707"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Diomidis Spinellis","raw_affiliation_strings":["Department of Management Science and Technology, Athens University of Economics and Business, Athens, Greece"],"affiliations":[{"raw_affiliation_string":"Department of Management Science and Technology, Athens University of Economics and Business, Athens, Greece","institution_ids":["https://openalex.org/I73142707"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5040947335"],"corresponding_institution_ids":["https://openalex.org/I73142707"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":3.6702,"has_fulltext":true,"cited_by_count":19,"citation_normalized_percentile":{"value":0.92942086,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"187","last_page":"203"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9847000241279602,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/secure-coding","display_name":"Secure coding","score":0.8262995481491089},{"id":"https://openalex.org/keywords/reuse","display_name":"Reuse","score":0.7615377902984619},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7357276678085327},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6302980780601501},{"id":"https://openalex.org/keywords/code-reuse","display_name":"Code reuse","score":0.61717289686203},{"id":"https://openalex.org/keywords/vetting","display_name":"Vetting","score":0.5490541458129883},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.5475637912750244},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5401540994644165},{"id":"https://openalex.org/keywords/software-development","display_name":"Software development","score":0.5279849171638489},{"id":"https://openalex.org/keywords/code-review","display_name":"Code review","score":0.4845932722091675},{"id":"https://openalex.org/keywords/security-bug","display_name":"Security bug","score":0.46782320737838745},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.41592204570770264},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.3904792368412018},{"id":"https://openalex.org/keywords/static-program-analysis","display_name":"Static program analysis","score":0.38930028676986694},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.17006495594978333},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.1343626081943512},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.1315421760082245},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.12898224592208862},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.09627518057823181}],"concepts":[{"id":"https://openalex.org/C22680326","wikidata":"https://www.wikidata.org/wiki/Q7444867","display_name":"Secure coding","level":5,"score":0.8262995481491089},{"id":"https://openalex.org/C206588197","wikidata":"https://www.wikidata.org/wiki/Q846574","display_name":"Reuse","level":2,"score":0.7615377902984619},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7357276678085327},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6302980780601501},{"id":"https://openalex.org/C2778583558","wikidata":"https://www.wikidata.org/wiki/Q771245","display_name":"Code reuse","level":3,"score":0.61717289686203},{"id":"https://openalex.org/C2777230681","wikidata":"https://www.wikidata.org/wiki/Q7923820","display_name":"Vetting","level":2,"score":0.5490541458129883},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.5475637912750244},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5401540994644165},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.5279849171638489},{"id":"https://openalex.org/C150292731","wikidata":"https://www.wikidata.org/wiki/Q1342704","display_name":"Code review","level":5,"score":0.4845932722091675},{"id":"https://openalex.org/C131275738","wikidata":"https://www.wikidata.org/wiki/Q7445023","display_name":"Security bug","level":5,"score":0.46782320737838745},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.41592204570770264},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.3904792368412018},{"id":"https://openalex.org/C137287247","wikidata":"https://www.wikidata.org/wiki/Q1329550","display_name":"Static program analysis","level":4,"score":0.38930028676986694},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.17006495594978333},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.1343626081943512},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.1315421760082245},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.12898224592208862},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.09627518057823181},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C548081761","wikidata":"https://www.wikidata.org/wiki/Q180388","display_name":"Waste management","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1007/978-3-030-22888-0_13","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-030-22888-0_13","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:pure.rug.nl:publications/b86a116d-0ece-43e3-a181-de90f8a3f990","is_oa":true,"landing_page_url":"https://research.rug.nl/en/publications/b86a116d-0ece-43e3-a181-de90f8a3f990","pdf_url":"https://pure.rug.nl/ws/files/121204188/Gkortzis2019_Chapter_ADouble_EdgedSwordSoftwareReus.pdf","source":{"id":"https://openalex.org/S4306400420","display_name":"University of Groningen research database (University of Groningen / Centre for Information Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I169381384","host_organization_name":"University of Groningen","host_organization_lineage":["https://openalex.org/I169381384"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"Gkortzis, A, Feitosa, D & Spinellis, D 2019, A Double-Edged Sword? Software Reuse and Potential Security Vulnerabilities. in Proceedings of the 18th International Conference on Software and Systems Reuse (ICSR '19). Lecture Notes in Computer Science, vol. 11602, Springer, pp. 187-203, 18th International Conference on Software and Systems Reuse, Cincinnati, Ohio, United States, 26/06/2019. https://doi.org/10.1007/978-3-030-22888-0_13","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:pure.rug.nl:openaire_cris_publications/b86a116d-0ece-43e3-a181-de90f8a3f990","is_oa":true,"landing_page_url":"https://hdl.handle.net/11370/b86a116d-0ece-43e3-a181-de90f8a3f990","pdf_url":null,"source":{"id":"https://openalex.org/S4306400420","display_name":"University of Groningen research database (University of Groningen / Centre for Information Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I169381384","host_organization_name":"University of Groningen","host_organization_lineage":["https://openalex.org/I169381384"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Gkortzis, A, Feitosa, D & Spinellis, D 2019, A Double-Edged Sword? Software Reuse and Potential Security Vulnerabilities. in Proceedings of the 18th International Conference on Software and Systems Reuse (ICSR '19). Lecture Notes in Computer Science, vol. 11602, Springer, pp. 187-203, 18th International Conference on Software and Systems Reuse, Cincinnati, Ohio, United States, 26/06/2019. https://doi.org/10.1007/978-3-030-22888-0_13","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":{"id":"pmh:oai:pure.rug.nl:publications/b86a116d-0ece-43e3-a181-de90f8a3f990","is_oa":true,"landing_page_url":"https://research.rug.nl/en/publications/b86a116d-0ece-43e3-a181-de90f8a3f990","pdf_url":"https://pure.rug.nl/ws/files/121204188/Gkortzis2019_Chapter_ADouble_EdgedSwordSoftwareReus.pdf","source":{"id":"https://openalex.org/S4306400420","display_name":"University of Groningen research database (University of Groningen / Centre for Information Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I169381384","host_organization_name":"University of Groningen","host_organization_lineage":["https://openalex.org/I169381384"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"Gkortzis, A, Feitosa, D & Spinellis, D 2019, A Double-Edged Sword? Software Reuse and Potential Security Vulnerabilities. in Proceedings of the 18th International Conference on Software and Systems Reuse (ICSR '19). Lecture Notes in Computer Science, vol. 11602, Springer, pp. 187-203, 18th International Conference on Software and Systems Reuse, Cincinnati, Ohio, United States, 26/06/2019. https://doi.org/10.1007/978-3-030-22888-0_13","raw_type":"info:eu-repo/semantics/publishedVersion"},"sustainable_development_goals":[{"score":0.41999998688697815,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G8059770990","display_name":"Developer-Centric Knowledge Mining from Large Open-Source Software Repositories","funder_award_id":"732223","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G8318064016","display_name":null,"funder_award_id":"Horizon","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"}],"funders":[{"id":"https://openalex.org/F4320320300","display_name":"European Commission","ror":"https://ror.org/00k4n6c32"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2947384482.pdf","grobid_xml":"https://content.openalex.org/works/W2947384482.grobid-xml"},"referenced_works_count":30,"referenced_works":["https://openalex.org/W19752705","https://openalex.org/W1505299987","https://openalex.org/W1833911422","https://openalex.org/W1913969462","https://openalex.org/W1986453394","https://openalex.org/W2036049607","https://openalex.org/W2043837581","https://openalex.org/W2077127398","https://openalex.org/W2083882002","https://openalex.org/W2087527532","https://openalex.org/W2092317965","https://openalex.org/W2107024044","https://openalex.org/W2110785760","https://openalex.org/W2121528215","https://openalex.org/W2122414758","https://openalex.org/W2122505621","https://openalex.org/W2125343911","https://openalex.org/W2136173752","https://openalex.org/W2249595199","https://openalex.org/W2327231718","https://openalex.org/W2559885217","https://openalex.org/W2889097348","https://openalex.org/W2891448528","https://openalex.org/W2898686857","https://openalex.org/W2962874578","https://openalex.org/W2963321189","https://openalex.org/W3121596715","https://openalex.org/W3140103367","https://openalex.org/W4233152543","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W1978034799","https://openalex.org/W4384518368","https://openalex.org/W2007984522","https://openalex.org/W2150933192","https://openalex.org/W125279808","https://openalex.org/W4239788664","https://openalex.org/W2155353733","https://openalex.org/W2504659933","https://openalex.org/W2557302400","https://openalex.org/W2947384482"],"abstract_inverted_index":null,"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":3}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
