Do bugs foreshadow vulnerabilities? a study of the chromium project
F Camilo, A Meneely… - 2015 IEEE/ACM 12th …, 2015 - ieeexplore.ieee.org
As developers face ever-increasing pressure to engineer secure software, researchers are
building an understanding of security-sensitive bugs (ie Vulnerabilities). Research into …
building an understanding of security-sensitive bugs (ie Vulnerabilities). Research into …
Mitigating persistence of open-source vulnerabilities in maven ecosystem
Vulnerabilities from third-party libraries (TPLs) have been unveiled to threaten the Maven
ecosystem in the long term. Despite patches being released promptly after vulnerabilities …
ecosystem in the long term. Despite patches being released promptly after vulnerabilities …
Do bugs foreshadow vulnerabilities? An in-depth study of the chromium project
As developers face an ever-increasing pressure to engineer secure software, researchers
are building an understanding of security-sensitive bugs (ie vulnerabilities). Research into …
are building an understanding of security-sensitive bugs (ie vulnerabilities). Research into …
The bug catalog of the maven ecosystem
Examining software ecosystems can provide the research community with data regarding
artifacts, processes, and communities. We present a dataset obtained from the Maven …
artifacts, processes, and communities. We present a dataset obtained from the Maven …
Time present and time past: analyzing the evolution of JavaScript code in the wild
JavaScript is one of the web's key building blocks. It is used by the majority of web sites and
it is supported by all modern browsers. We present the first large-scale study of client-side …
it is supported by all modern browsers. We present the first large-scale study of client-side …
Evaluating the effects of cyber-attacks on cyber physical systems using a hardware-in-the-loop simulation testbed
Cyber-Physical Systems (CPS) consist of embedded computers with sensing and actuation
capability, and are integrated into and tightly coupled with a physical system. Because the …
capability, and are integrated into and tightly coupled with a physical system. Because the …
[PDF][PDF] Can reducing faults prevent vulnerabilities?
Can Reducing Faults Prevent Vulnerabilities? Page 1 Preprint: Kuhn, R., Raunak, M. and
Kacker, R., 2018. Can Reducing Faults Prevent Vulnerabilities?. Computer, 51(7), pp.82-85 …
Kacker, R., 2018. Can Reducing Faults Prevent Vulnerabilities?. Computer, 51(7), pp.82-85 …
Raising security awareness using cybersecurity challenges in embedded programming courses
Security bugs are errors in code that, when exploited, can lead to serious software
vulnerabilities. These bugs could allow an attacker to take over an application and steal …
vulnerabilities. These bugs could allow an attacker to take over an application and steal …
Metrics-driven evaluation of cybersecurity for critical railway infrastructure
In the past couple of years, railway infrastructure has been growing more connected,
resembling more of a traditional Cyber-Physical System [1] model. Due to the tightly coupled …
resembling more of a traditional Cyber-Physical System [1] model. Due to the tightly coupled …
Employing different program analysis methods to study bug evolution
C Mitropoulos - Proceedings of the 2019 27th ACM Joint Meeting on …, 2019 - dl.acm.org
The evolution of software bugs has been a well-studied topic in software engineering. We
used three different program analysis tools to examine the different versions of two popular …
used three different program analysis tools to examine the different versions of two popular …