[HTML][HTML] Just-in-time software vulnerability detection: Are we there yet?

F Lomio, E Iannone, A De Lucia, F Palomba… - Journal of Systems and …, 2022 - Elsevier
Background: Software vulnerabilities are weaknesses in source code that might be exploited
to cause harm or loss. Previous work has proposed a number of automated machine …

Sok: Taxonomy of attacks on open-source software supply chains

P Ladisa, H Plate, M Martinez… - 2023 IEEE Symposium …, 2023 - ieeexplore.ieee.org
The widespread dependency on open-source software makes it a fruitful target for malicious
actors, as demonstrated by recurring attacks. The complexity of today's open-source supply …

Do developers update their library dependencies? An empirical study on the impact of security advisories on library migration

RG Kula, DM German, A Ouni, T Ishio… - Empirical Software …, 2018 - Springer
Third-party library reuse has become common practice in contemporary software
development, as it includes several benefits for developers. Library dependencies are …

A Survey on Software Vulnerability Exploitability Assessment

S Elder, MR Rahman, G Fringer, K Kapoor… - ACM Computing …, 2024 - dl.acm.org
Knowing the exploitability and severity of software vulnerabilities helps practitioners
prioritize vulnerability mitigation efforts. Researchers have proposed and evaluated many …

A qualitative study of dependency management and its security implications

I Pashchenko, DL Vu, F Massacci - … of the 2020 ACM SIGSAC conference …, 2020 - dl.acm.org
Several large scale studies on the Maven, NPM, and Android ecosystems point out that
many developers do not often update their vulnerable software libraries thus exposing the …

An empirical study of usages, updates and risks of third-party libraries in java projects

Y Wang, B Chen, K Huang, B Shi, C Xu… - 2020 IEEE …, 2020 - ieeexplore.ieee.org
Third-party libraries play a key role in software development as they can relieve developers
of the heavy burden of re-implementing common functionalities. However, third-party …

[HTML][HTML] Detection, assessment and mitigation of vulnerabilities in open source dependencies

SE Ponta, H Plate, A Sabetta - Empirical Software Engineering, 2020 - Springer
Open source software (OSS) libraries are widely used in the industry to speed up the
development of software products. However, these libraries are subject to an ever …

A manually-curated dataset of fixes to vulnerabilities of open-source software

SE Ponta, H Plate, A Sabetta, M Bezzi… - 2019 IEEE/ACM 16th …, 2019 - ieeexplore.ieee.org
Advancing our understanding of software vulnerabilities, automating their identification, the
analysis of their impact, and ultimately their mitigation is necessary to enable the …

Vulnerable open source dependencies: Counting those that matter

I Pashchenko, H Plate, SE Ponta, A Sabetta… - Proceedings of the 12th …, 2018 - dl.acm.org
Background: Vulnerable dependencies are a known problem in today's open-source
software ecosystems because OSS libraries are highly interconnected and developers do …

A comparative study of vulnerability reporting by software composition analysis tools

N Imtiaz, S Thorn, L Williams - Proceedings of the 15th ACM/IEEE …, 2021 - dl.acm.org
Background: Modern software uses many third-party libraries and frameworks as
dependencies. Known vulnerabilities in these dependencies are a potential security risk …