Vulnerabilities and Security Patches Detection in OSS: A Survey

R Lin, Y Fu, W Yi, J Yang, J Cao, Z Dong, F Xie… - ACM Computing …, 2024 - dl.acm.org
Over the past decade, Open Source Software (OSS) has experienced rapid growth and
widespread adoption, attributed to its openness and editability. However, this expansion has …

Understanding the threats of upstream vulnerabilities to downstream projects in the maven ecosystem

Y Wu, Z Yu, M Wen, Q Li, D Zou… - 2023 IEEE/ACM 45th …, 2023 - ieeexplore.ieee.org
Modern software systems are increasingly relying on dependencies from the ecosystem. A
recent estimation shows that around 35% of an open-source project's code come from its …

Identifying vulnerable third-party libraries from textual descriptions of vulnerabilities and libraries

T Chen, L Li, B Shan, G Liang, D Li, Q Wang… - arXiv preprint arXiv …, 2023 - arxiv.org
To avoid potential risks posed by vulnerabilities in third-party libraries, security researchers
maintain databases containing vulnerability reports, eg, the National Vulnerability Database …

Insight: Exploring cross-ecosystem vulnerability impacts

M Xu, Y Wang, SC Cheung, H Yu, Z Zhu - Proceedings of the 37th IEEE …, 2022 - dl.acm.org
Vulnerabilities, referred to as CLV issues, are induced by cross-language invocations of
vulnerable libraries. Such issues greatly increase the attack surface of Python/Java projects …

Benchmarking Software Vulnerability Detection Techniques: A Survey

Y Bi, J Huang, P Liu, L Wang - arXiv preprint arXiv:2303.16362, 2023 - arxiv.org
Software vulnerabilities can have serious consequences, which is why many techniques
have been proposed to defend against them. Among these, vulnerability detection …

Enhancing Security through Modularization: A Counterfactual Analysis of Vulnerability Propagation and Detection Precision

MM Abdollahpour, J Dietrich… - 2024 IEEE International …, 2024 - ieeexplore.ieee.org
In today's software development landscape, the use of third-party libraries is near-
ubiquitous; leveraging third-party libraries can significantly accelerate development …

Vulnerability Root Cause Function Locating For Java Vulnerabilities

L Zhang - Proceedings of the 2024 IEEE/ACM 46th International …, 2024 - dl.acm.org
Software Composition Analysis has emerged as an essential solution for mitigating
vulnerabilities within the dependencies of software projects. Reachability analysis has been …

A map-based model-driven testing framework for automated driving systems

Y Tang - 2022 - dr.ntu.edu.sg
Scenario-based testing has been the primary evaluation approach to the functional safety of
Automated Driving Systems (ADSs). Scenarios can be classified as functional, logical, and …

[PDF][PDF] The Role of Modularization in Minimizing Vulnerability Propagation and Enhancing SCA Precision

MM Abdollahpour - 2024 - uwspace.uwaterloo.ca
In today's software development landscape, the use of third-party libraries is nearubiquitous;
leveraging third-party libraries can significantly accelerate development, allowing teams to …

Vulnerability Management of Open-Source Libraries

ML Kumar, KS Krishna - 2023 - diva-portal.org
Background: The proliferation of using open-source libraries in software development has
brought numerous benefits, including access to a wide range of reusable code and …