The AVANTSSAR platform for the automated validation of trust and security of service-oriented architectures A Armando, W Arsac, T Avanesov, M Barletta, A Calvi, A Cappai, ... Tools and Algorithms for the Construction and Analysis of Systems: 18th …, 2012 | 143 | 2012 |
A manually-curated dataset of fixes to vulnerabilities of open-source software SE Ponta, H Plate, A Sabetta, M Bezzi, C Dangremont 2019 IEEE/ACM 16th International Conference on Mining Software Repositories …, 2019 | 118 | 2019 |
Vulnerable open source dependencies: Counting those that matter I Pashchenko, H Plate, SE Ponta, A Sabetta, F Massacci Proceedings of the 12th ACM/IEEE international symposium on empirical …, 2018 | 115 | 2018 |
Impact assessment for vulnerabilities in open-source software libraries H Plate, SE Ponta, A Sabetta 2015 IEEE International Conference on Software Maintenance and Evolution …, 2015 | 111 | 2015 |
Beyond Metadata: Code-centric and Usage-based Analysis of Known Vulnerabilities in Open-source Software SE Ponta, H Plate, A Sabetta | 101 | 2018 |
Detection, assessment and mitigation of vulnerabilities in open source dependencies SE Ponta, H Plate, A Sabetta Empirical Software Engineering 25 (5), 3175-3215, 2020 | 86 | 2020 |
Model checking of security-sensitive business processes A Armando, SE Ponta International Workshop on Formal Aspects in Security and Trust, 66-80, 2009 | 62 | 2009 |
Security validation of business processes via model-checking W Arsac, L Compagna, G Pellegrino, SE Ponta International Symposium on Engineering Secure Software and Systems, 29-42, 2011 | 61 | 2011 |
Vuln4real: A methodology for counting actually vulnerable dependencies I Pashchenko, H Plate, SE Ponta, A Sabetta, F Massacci IEEE Transactions on Software Engineering 48 (5), 1592-1609, 2020 | 56 | 2020 |
Code-based vulnerability detection in node. js applications: How far are we? B Chinthanet, SE Ponta, H Plate, A Sabetta, RG Kula, T Ishio, ... Proceedings of the 35th IEEE/ACM international conference on automated …, 2020 | 40 | 2020 |
Assessing vulnerability impact using call graphs H Plate, S Ponta, A Sabetta US Patent 9,792,200, 2017 | 31 | 2017 |
A manually-curated dataset of fixes to vulnerabilities of open-source software. In 2019 IEEE/ACM 16th International Conference on Mining Software Repositories (MSR) SE Ponta, H Plate, A Sabetta, M Bezzi, C Dangremont IEEE, 383ś387, 2019 | 28 | 2019 |
Model checking authorization requirements in business processes A Armando, SE Ponta Computers & Security 40, 1-22, 2014 | 28 | 2014 |
Identifying challenges for oss vulnerability scanners-a study & test suite A Dann, H Plate, B Hermann, SE Ponta, E Bodden IEEE Transactions on Software Engineering 48 (9), 3613-3625, 2021 | 25 | 2021 |
Multi-context exploit test management A Sabetta, L Compagna, S Ponta, S Dashevskyi, D Dos Santos, ... US Patent 9,811,668, 2017 | 21 | 2017 |
Prioritization of software patches H Plate, S Ponta, A Sabetta US Patent 9,959,111, 2018 | 19 | 2018 |
Aegis: Automatic enforcement of security policies in workflow-driven web applications L Compagna, DR dos Santos, SE Ponta, S Ranise Proceedings of the Seventh ACM on Conference on Data and Application …, 2017 | 17 | 2017 |
Cerberus: Automated synthesis of enforcement mechanisms for security-sensitive business processes L Compagna, DR Dos Santos, SE Ponta, S Ranise International Conference on Tools and Algorithms for the Construction and …, 2016 | 16 | 2016 |
The used, the bloated, and the vulnerable: Reducing the attack surface of an industrial application SE Ponta, W Fischer, H Plate, A Sabetta 2021 IEEE International Conference on Software Maintenance and Evolution …, 2021 | 15 | 2021 |
Towards the detection of malicious java packages P Ladisa, H Plate, M Martinez, O Barais, SE Ponta Proceedings of the 2022 ACM Workshop on Software Supply Chain Offensive …, 2022 | 14 | 2022 |