An empirical study of pre-trained model reuse in the hugging face deep learning model registry

W Jiang, N Synovic, M Hyatt… - 2023 IEEE/ACM 45th …, 2023 - ieeexplore.ieee.org
Deep Neural Networks (DNNs) are being adopted as components in software systems.
Creating and specializing DNNs from scratch has grown increasingly difficult as state-of-the …

Demystifying the vulnerability propagation and its evolution via dependency trees in the npm ecosystem

C Liu, S Chen, L Fan, B Chen, Y Liu… - Proceedings of the 44th …, 2022 - dl.acm.org
Third-party libraries with rich functionalities facilitate the fast development of JavaScript
software, leading to the explosive growth of the NPM ecosystem. However, it also brings …

Empirical analysis of security vulnerabilities in python packages

M Alfadel, DE Costa, E Shihab - Empirical Software Engineering, 2023 - Springer
Software ecosystems play an important role in modern software development, providing an
open platform of reusable packages that speed up and facilitate development tasks …

Research directions in software supply chain security

L Williams, G Benedetti, S Hamer, R Paramitha… - ACM Transactions on …, 2024 - dl.acm.org
Reusable software libraries, frameworks, and components, such as those provided by open-
source ecosystems and third-party suppliers, accelerate digital innovation. However, recent …

Practical automated detection of malicious npm packages

A Sejfia, M Schäfer - Proceedings of the 44th international conference …, 2022 - dl.acm.org
The npm registry is one of the pillars of the JavaScript and Type-Script ecosystems, hosting
over 1.7 million packages ranging from simple utility libraries to complex frameworks and …

Sok: Analysis of software supply chain security by establishing secure design properties

C Okafor, TR Schorlemmer, S Torres-Arias… - Proceedings of the 2022 …, 2022 - dl.acm.org
This paper systematizes knowledge about secure software supply chain patterns. It identifies
four stages of a software supply chain attack and proposes three security properties crucial …

Towards understanding third-party library dependency in c/c++ ecosystem

W Tang, Z Xu, C Liu, J Wu, S Yang, Y Li… - Proceedings of the 37th …, 2022 - dl.acm.org
Third-party libraries (TPLs) are frequently reused in software to reduce development cost
and the time to market. However, external library dependencies may introduce …

Software supply chain: review of attacks, risk assessment strategies and security controls

B Gokkaya, L Aniello, B Halak - arxiv preprint arxiv:2305.14157, 2023 - arxiv.org
The software product is a source of cyber-attacks that target organizations by using their
software supply chain as a distribution vector. As the reliance of software projects on open …

Maltracker: A fine-grained npm malware tracker copiloted by llm-enhanced dataset

Z Yu, M Wen, X Guo, H ** - Proceedings of the 33rd ACM SIGSOFT …, 2024 - dl.acm.org
As the largest package registry, Node Package Manager (NPM) has become the prime
target for various supply chain attacks recently and has been flooded with numerous …

On the outdatedness of workflows in the GitHub Actions ecosystem

A Decan, T Mens, HO Delicheh - Journal of Systems and Software, 2023 - Elsevier
GitHub Actions was introduced as a way to automate CI/CD workflows in GitHub, the largest
social coding platform. Thanks to its deep integration into GitHub, GitHub Actions can be …