Zobrazeno 1 - 10
of 215
pro vyhledávání: '"P. Pretschner"'
Industrial applications heavily rely on open-source software (OSS) libraries, which provide various benefits. But, they can also present a substantial risk if a vulnerability or attack arises and the community fails to promptly address the issue and
Externí odkaz:
http://arxiv.org/abs/2404.17403
Employees work in increasingly digital environments that enable advanced analytics. Yet, they lack oversight over the systems that process their data. That means that potential analysis errors or hidden biases are hard to uncover. Recent data protect
Externí odkaz:
http://arxiv.org/abs/2305.09813
Employee data can be used to facilitate work, but their misusage may pose risks for individuals. Inverse transparency therefore aims to track all usages of personal data, allowing individuals to monitor them to ensure accountability for potential mis
Externí odkaz:
http://arxiv.org/abs/2304.11033
Publikováno v:
IEEE/ACM International Conference on Automation of Software Test (AST), May 15--16, 2023, Melbourne, AU
Insecure default values in software settings can be exploited by attackers to compromise the system that runs the software. As a countermeasure, there exist security-configuration guides specifying in detail which values are secure. However, most adm
Externí odkaz:
http://arxiv.org/abs/2303.05901
Autor:
Bludau, Peter, Pretschner, Alexander
Just-in-time defect prediction assigns a defect risk to each new change to a software repository in order to prioritize review and testing efforts. Over the last decades different approaches were proposed in literature to craft more accurate predicti
Externí odkaz:
http://arxiv.org/abs/2209.13978
Publikováno v:
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering (ASE '20), September 21--25, 2020, Virtual Event, Australia
Hardening is the process of configuring IT systems to ensure the security of the systems' components and data they process or store. The complexity of contemporary IT infrastructures, however, renders manual security hardening and maintenance a daunt
Externí odkaz:
http://arxiv.org/abs/2209.08936
Publikováno v:
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering (ASE '22), October 10--14, 2022, Rochester, MI, USA
To secure computer infrastructure, we need to configure all security-relevant settings. We need security experts to identify security-relevant settings, but this process is time-consuming and expensive. Our proposed solution uses state-of-the-art nat
Externí odkaz:
http://arxiv.org/abs/2209.08853
Publikováno v:
Proceedings of the Twelveth ACM Conference on Data and Application Security and Privacy (CODASPY '22), April 24--27, 2022, Baltimore, MD, USA
Security Hardening is the process of configuring IT systems to ensure the security of the systems' components and data they process or store. In many cases, so-called security-configuration guides are used as a basis for security hardening. These gui
Externí odkaz:
http://arxiv.org/abs/2209.08824
Increasingly digital workplaces enable advanced people analytics (PA) that can improve work, but also implicate privacy risks for employees. These systems often depend on employees sharing their data voluntarily. Thus, to leverage the potential benef
Externí odkaz:
http://arxiv.org/abs/2209.05387
Autor:
Bludau, Peter, Pretschner, Alexander
The SZZ algorithm represents a standard way to identify bug fixing commits as well as inducing counterparts. It forms the basis for data sets used in numerous empirical studies. Since its creation, multiple extensions have been proposed to enhance it
Externí odkaz:
http://arxiv.org/abs/2206.09967