Zobrazeno 1 - 10
of 471
pro vyhledávání: '"Massacci, P"'
Software security mainly studies vulnerability detection: is my code vulnerable today? This hinders risk estimation, so new approaches are emerging to forecast the occurrence of future vulnerabilities. While useful, these approaches are coarse-graine
Externí odkaz:
http://arxiv.org/abs/2411.11202
Autor:
Nicoletti, Stefano M., Lopuhaä-Zwakenberg, Milan, Stoelinga, Mariëlle, Massacci, Fabio, Budde, Carlos E.
The landscape of cyber threats grows more complex by the day. Advanced Persistent Threats carry out systematic attack campaigns against which cybersecurity practitioners must defend. Examples of such organized attacks are operations Dream Job, Wocao,
Externí odkaz:
http://arxiv.org/abs/2410.06692
The use of AI technologies is percolating into the secure development of software-based systems, with an increasing trend of composing AI-based subsystems (with uncertain levels of performance) into automated pipelines. This presents a fundamental re
Externí odkaz:
http://arxiv.org/abs/2407.14540
Autor:
Klemmer, Jan H., Horstmann, Stefan Albert, Patnaik, Nikhil, Ludden, Cordelia, Burton Jr., Cordell, Powers, Carson, Massacci, Fabio, Rahman, Akond, Votipka, Daniel, Lipford, Heather Richter, Rashid, Awais, Naiakshina, Alena, Fahl, Sascha
Following the recent release of AI assistants, such as OpenAI's ChatGPT and GitHub Copilot, the software industry quickly utilized these tools for software development tasks, e.g., generating code or consulting AI for advice. While recent research ha
Externí odkaz:
http://arxiv.org/abs/2405.06371
Analyzing and Mitigating (with LLMs) the Security Misconfigurations of Helm Charts from Artifact Hub
Background: Helm is a package manager that allows defining, installing, and upgrading applications with Kubernetes (K8s), a popular container orchestration platform. A Helm chart is a collection of files describing all dependencies, resources, and pa
Externí odkaz:
http://arxiv.org/abs/2403.09537
Context: Software of different functional categories, such as text processing vs. networking, has different profiles in terms of metrics like security and updates. Using popularity to compare e.g. Java vs. Python libraries might give a skewed perspec
Externí odkaz:
http://arxiv.org/abs/2403.06300
Publikováno v:
IEEE Transactions on Information Forensics and Security, 2023
[Context] Researchers analyze underground forums to study abuse and cybercrime activities. Due to the size of the forums and the domain expertise required to identify criminal discussions, most approaches employ supervised machine learning techniques
Externí odkaz:
http://arxiv.org/abs/2308.09413
Autor:
Massacci, Fabio, Di Tizio, Giorgio
Publikováno v:
Communications of the ACM 66, 1 (2023)
A dilemma worth Shakespeare's Hamlet is increasingly haunting companies and security researchers: ``to update or not to update, this is the question``. From the perspective of recommended common practices by software vendors the answer is unambiguous
Externí odkaz:
http://arxiv.org/abs/2306.07355
Making sure that users understand privacy policies that impact them is a key challenge for a real GDPR deployment. Research studies are mostly carried in English, but in Europe and elsewhere, users speak a language that is not English. Replicating st
Externí odkaz:
http://arxiv.org/abs/2302.05355
Autor:
Elisa Albini, Francesca Leoni, Francesca Romana Massacci, Silvia Pieralisi, Serenella Orsini, Francesca Blasi, Alessandra Di Gregorio, Sonia Nina Coccitto, Marzia Cinthi, Gloria D'Achille, Gianluca Morroni, Carmen Maresca, Eleonora Scoccia, Du Xiang-Dang, Eleonora Giovanetti, Andrea Brenciani, Chiara Francesca Magistrali
Publikováno v:
Applied Food Research, Vol 4, Iss 2, Pp 100604- (2024)
Seafood is a crucial global food source, but its role as a reservoir for antibiotic-resistant pathogens is concerning. This study focuses on the prevalence of antibiotic resistance in retail seafood, using Enterococcus spp. as an indicator. Seven cat
Externí odkaz:
https://doaj.org/article/3c6c27eb45d145f2b7ba26e267a96942