Zobrazeno 1 - 10
of 24
pro vyhledávání: '"Henrik Plate"'
Publikováno v:
IEEE Transactions on Software Engineering. 48:3613-3625
Publikováno v:
IEEE Transactions on Software Engineering
Vulnerable dependencies are a known problem in today's free open-source software ecosystems because FOSS libraries are highly interconnected, and developers do not always update their dependencies. Our paper proposes Vuln4Real, the methodology for co
Publikováno v:
Empirical Software Engineering. 25:3175-3215
Open source software (OSS) libraries are widely used in the industry to speed up the development of software products. However, these libraries are subject to an ever-increasing number of vulnerabilities that are publicly disclosed. It is thus crucia
Replication package for the ESEC/FSE 2021 paper "LastPyMile: Identifying the discrepancy between sources and packages"
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::330730d5fa90f620719a742ae9e65323
Publikováno v:
ICSME
Software reuse may result in software bloat when significant portions of application dependencies are effectively unused. Several tools exist to remove unused (byte)code from an application or its dependencies, thus producing smaller artifacts and, p
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::c11a15c5c8abe5fbdd14524c08ccd804
Publikováno v:
CCS
Increasing popularity of third-party package repositories, like NPM, PyPI, or RubyGems, makes them an attractive target for software supply chain attacks. By injecting malicious code into legitimate packages, attackers were known to gain more than 10
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::d4788dcc80c58d3e9e27cfd804c0bc65
http://hdl.handle.net/11572/282636
http://hdl.handle.net/11572/282636
Publikováno v:
EuroS&P Workshops
Limited automated controls integrated into the Python Package Index (PyPI) package uploading process make PyPI an attractive target for attackers to trick developers into using malicious packages. Several times this goal has been achieved via the com
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::03ea4c3cd1a8286276a58e40d99ba2d1
https://ieeexplore.ieee.org/document/9229803/authors
https://ieeexplore.ieee.org/document/9229803/authors
Autor:
Serena Elisa Ponta, Antonino Sabetta, Takashi Ishio, Henrik Plate, Bodin Chinthanet, Kenichi Matsumoto, Raula Gaikovina Kula
Publikováno v:
ASE
With one of the largest available collection of reusable packages, the JavaScript runtime environment Node.js is one of the most popular programming application. With recent work showing evidence that known vulnerabilities are prevalent in both open
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::b8e873ebbd10f99c450637301a22b10e
Publikováno v:
Detection of Intrusions and Malware, and Vulnerability Assessment ISBN: 9783030526825
DIMVA
DIMVA
A software supply chain attack is characterized by the injection of malicious code into a software package in order to compromise dependent systems further down the chain. Recent years saw a number of supply chain attacks that leverage the increasing
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::3691ee75355ede721c55e4d1c89e3a8c
https://doi.org/10.1007/978-3-030-52683-2_2
https://doi.org/10.1007/978-3-030-52683-2_2
Publikováno v:
MSR
Advancing our understanding of software vulnerabilities, automating their identification, the analysis of their impact, and ultimately their mitigation is necessary to enable the development of software that is more secure. While operating a vulnerab
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::48bbba7e72d1bf1c2b236b11e0f029b3