Backstabber’s knife collection: A review of open source software supply chain attacks M Ohm, H Plate, A Sykosch, M Meier Detection of Intrusions and Malware, and Vulnerability Assessment: 17th …, 2020 | 194 | 2020 |
A manually-curated dataset of fixes to vulnerabilities of open-source software SE Ponta, H Plate, A Sabetta, M Bezzi, C Dangremont 2019 IEEE/ACM 16th International Conference on Mining Software Repositories …, 2019 | 113 | 2019 |
Vulnerable open source dependencies: Counting those that matter I Pashchenko, H Plate, SE Ponta, A Sabetta, F Massacci Proceedings of the 12th ACM/IEEE International Symposium on Empirical …, 2018 | 111 | 2018 |
Impact assessment for vulnerabilities in open-source software libraries H Plate, SE Ponta, A Sabetta 2015 IEEE International Conference on Software Maintenance and Evolution …, 2015 | 108 | 2015 |
Beyond metadata: Code-centric and usage-based analysis of known vulnerabilities in open-source software SE Ponta, H Plate, A Sabetta 2018 IEEE International Conference on Software Maintenance and Evolution …, 2018 | 98 | 2018 |
SoK: Taxonomy of Attacks on Open-Source Software Supply Chains P Ladisa, H Plate, M Martinez, O Barais 2023 IEEE Symposium on Security and Privacy (SP), 167-184, 2022 | 93 | 2022 |
Detection, assessment and mitigation of vulnerabilities in open source dependencies SE Ponta, H Plate, A Sabetta Empirical Software Engineering 25 (5), 3175-3215, 2020 | 83 | 2020 |
Towards Using Source Code Repositories to Identify Software Supply Chain Attacks DL Vu, I Pashchenko, F Massacci, H Plate, A Sabetta Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020 | 56 | 2020 |
Vuln4real: A methodology for counting actually vulnerable dependencies I Pashchenko, H Plate, SE Ponta, A Sabetta, F Massacci IEEE Transactions on Software Engineering 48 (5), 1592-1609, 2020 | 53 | 2020 |
Typosquatting and Combosquatting Attacks on the Python Ecosystem DL Vu, I Pashchenko, F Massacci, H Plate, A Sabetta 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2020 | 53 | 2020 |
LastPyMile: identifying the discrepancy between sources and packages DL Vu, F Massacci, I Pashchenko, H Plate, A Sabetta Proceedings of the 29th ACM Joint Meeting on European Software Engineering …, 2021 | 46 | 2021 |
Comparing encrypted documents having structured data MA Rahaman, A Schaad, H Plate, Y Roudier US Patent 8,726,151, 2014 | 45 | 2014 |
Code-based Vulnerability Detection in Node. js Applications: How far are we? B Chinthanet, SE Ponta, H Plate, A Sabetta, RG Kula, T Ishio, ... Proceedings of the 35th IEEE/ACM International Conference on Automated …, 2020 | 38 | 2020 |
Software dependency management through declarative constraints H Plate US Patent 9,558,017, 2017 | 36 | 2017 |
Mining social networks for software vulnerabilities monitoring S Trabelsi, H Plate, A Abida, MMB Aoun, A Zouaoui, C Missaoui, S Gharbi, ... 2015 7th International Conference on New Technologies, Mobility and Security …, 2015 | 33 | 2015 |
Assessing vulnerability impact using call graphs H Plate, S Ponta, A Sabetta US Patent 9,792,200, 2017 | 29 | 2017 |
A manually-curated dataset of fixes to vulnerabilities of open-source software. In 2019 IEEE/ACM 16th International Conference on Mining Software Repositories (MSR) SE Ponta, H Plate, A Sabetta, M Bezzi, C Dangremont IEEE, 2019 | 27 | 2019 |
Tracing of collaborative workflows CRJ Hebert, LY Gomez, F Montagut, H Plate, CSP Ulmer US Patent 8,819,131, 2014 | 27 | 2014 |
Standardized configuration checklists for software development H Plate US Patent 8,782,603, 2014 | 25 | 2014 |
Identifying challenges for oss vulnerability scanners-a study & test suite A Dann, H Plate, B Hermann, SE Ponta, E Bodden IEEE Transactions on Software Engineering 48 (9), 3613-3625, 2021 | 19 | 2021 |