L Bottner, A Hermann, J Eppler,
T Thüm… - Proceedings of the 7th …, 2023 - dl.acm.org
Vulnerable or malicious third-party components introduce vulnerabilities into the software
supply chain. Software Composition Analysis (SCA) is a method to identify direct and …