[HTML][HTML] Future forums: A methodology for exploring, gamifying, and raising security awareness of code-citizens

T Georgiou, L Baillie, O Chatzifoti, SC Chan - International Journal of …, 2023‏ - Elsevier
Future Forums are multiphase user centered design workshops, with the early phases
aiming to initiate discussions, that then leads to the co-design of game elements centered …

What happens when we fuzz? Investigating OSS-fuzz bug history

BN Keller, BS Meyers, A Meneely - 2023 IEEE/ACM 20th …, 2023‏ - ieeexplore.ieee.org
BACKGROUND: Software engineers must be vigilant in preventing and correcting
vulnerabilities and other critical bugs. In servicing this need, numerous tools and techniques …

Scpatcher: mining crowd security discussions to enrich secure coding practices

Z Jiang, L Shi, G Yang, Q Wang - 2023 38th IEEE/ACM …, 2023‏ - ieeexplore.ieee.org
Secure coding practices (SCPs) have been proposed to guide software developers to write
code securely to prevent potential security vulnerabilities. Yet, they are typically one …

PatUntrack: Automated Generating Patch Examples for Issue Reports without Tracked Insecure Code

Z Jiang, L Shi, G Yang, Q Wang - Proceedings of the 39th IEEE/ACM …, 2024‏ - dl.acm.org
Security patches are essential for enhancing the stability and robustness of projects in the
open-source software community. While vulnerabilities are officially expected to be patched …

Predicting pragmatic discourse features in the language of adults with autism spectrum disorder

C Yang, D Liu, Q Yang, Z Liu… - Proceedings of the …, 2021‏ - pmc.ncbi.nlm.nih.gov
Individuals with autism spectrum disorder (ASD) experience difficulties in social aspects of
communication, but the linguistic characteristics associated with deficits in discourse and …

An automated post-mortem analysis of vulnerability relationships using natural language word embeddings

BS Meyers, A Meneely - Procedia Computer Science, 2021‏ - Elsevier
The daily activities of cybersecurity experts and software engineers—code reviews, issue
tracking, vulnerability reporting—are constantly contributing to a massive wealth of security …