Y Wu, Z Yu, M Wen, Q Li, D Zou… - 2023 IEEE/ACM 45th …, 2023 - ieeexplore.ieee.org
Modern software systems are increasingly relying on dependencies from the ecosystem. A recent estimation shows that around 35% of an open-source project's code come from its …
T Chen, L Li, B Shan, G Liang, D Li, Q Wang… - arXiv preprint arXiv …, 2023 - arxiv.org
To avoid potential risks posed by vulnerabilities in third-party libraries, security researchers maintain databases containing vulnerability reports, eg, the National Vulnerability Database …
M Xu, Y Wang, SC Cheung, H Yu, Z Zhu - Proceedings of the 37th IEEE …, 2022 - dl.acm.org
Vulnerabilities, referred to as CLV issues, are induced by cross-language invocations of vulnerable libraries. Such issues greatly increase the attack surface of Python/Java projects …
Y Bi, J Huang, P Liu, L Wang - arXiv preprint arXiv:2303.16362, 2023 - arxiv.org
Software vulnerabilities can have serious consequences, which is why many techniques have been proposed to defend against them. Among these, vulnerability detection …
In today's software development landscape, the use of third-party libraries is near- ubiquitous; leveraging third-party libraries can significantly accelerate development …
L Zhang - Proceedings of the 2024 IEEE/ACM 46th International …, 2024 - dl.acm.org
Software Composition Analysis has emerged as an essential solution for mitigating vulnerabilities within the dependencies of software projects. Reachability analysis has been …
Scenario-based testing has been the primary evaluation approach to the functional safety of Automated Driving Systems (ADSs). Scenarios can be classified as functional, logical, and …
In today's software development landscape, the use of third-party libraries is nearubiquitous; leveraging third-party libraries can significantly accelerate development, allowing teams to …
Background: The proliferation of using open-source libraries in software development has brought numerous benefits, including access to a wide range of reusable code and …