Large language model supply chain: A research agenda

S Wang, Y Zhao, X Hou, H Wang - ACM Transactions on Software …, 2024‏ - dl.acm.org
The rapid advancement of large language models (LLMs) has revolutionized artificial
intelligence, introducing unprecedented capabilities in natural language processing and …

Reusing deep learning models: Challenges and directions in software engineering

JC Davis, P Jajal, W Jiang… - 2023 IEEE John …, 2023‏ - ieeexplore.ieee.org
Deep neural networks (DNNs) achieve state-of-the-art performance in many areas, including
computer vision, system configuration, and question-answering. However, DNNs are …

{SoK}: What Don't We Know? Understanding Security Vulnerabilities in {SNARKs}

S Chaliasos, J Ernstberger, D Theodore… - 33rd USENIX Security …, 2024‏ - usenix.org
Zero-knowledge proofs (ZKPs) have evolved from being a theoretical concept providing
privacy and verifiability to having practical, real-world implementations, with SNARKs …

" always contribute back": A qualitative study on security challenges of the open source supply chain

D Wermke, JH Klemmer, N Wöhler… - … IEEE Symposium on …, 2023‏ - ieeexplore.ieee.org
Open source components are ubiquitous in companies' setups, processes, and software.
Utilizing these external components as building blocks enables companies to leverage the …

An empirical study of malicious code in pypi ecosystem

W Guo, Z Xu, C Liu, C Huang, Y Fang… - 2023 38th IEEE/ACM …, 2023‏ - ieeexplore.ieee.org
PyPI provides a convenient and accessible package management platform to developers,
enabling them to quickly implement specific functions and improve work efficiency. However …

“We Feel Like We're Winging It:” A Study on Navigating Open-Source Dependency Abandonment

C Miller, C Kästner, B Vasilescu - Proceedings of the 31st ACM Joint …, 2023‏ - dl.acm.org
While lots of research has explored how to prevent maintainers from abandoning the open-
source projects that serve as our digital infras-tructure, there are very few insights on …

Everyone for themselves? a qualitative study about individual security setups of open source software contributors

S Amft, S Höltervennhoff, R Panskus… - … IEEE Symposium on …, 2024‏ - ieeexplore.ieee.org
To increase open-source software supply chain security, protecting the development
environment of contributors against attacks is crucial. For example, contributors must protect …

Fostering agricultural transformation through AI: an open-source AI architecture exploiting the MLOps paradigm

AC Cob-Parro, Y Lalangui, R Lazcano - Agronomy, 2024‏ - mdpi.com
As the global population is expected to reach 10 billion by 2050, the agricultural sector faces
the challenge of achieving an increase of 60% in food production without using much more …

Just another copy and paste? Comparing the security vulnerabilities of ChatGPT generated code and StackOverflow answers

S Hamer, M d'Amorim, L Williams - 2024 IEEE Security and …, 2024‏ - ieeexplore.ieee.org
Sonatype's 2023 report found that 97% of developers and security leads integrate
generative Artificial Intelligence (AI), particularly Large Language Models (LLMs), into their …

An empirical study of artifacts and security risks in the pre-trained model supply chain

W Jiang, N Synovic, R Sethi, A Indarapu… - Proceedings of the …, 2022‏ - dl.acm.org
Deep neural networks achieve state-of-the-art performance on many tasks, but require
increasingly complex architectures and costly training procedures. Engineers can reduce …