Search for persons
X
?
Proceedings of the 2023 Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses ,
3
The Hitchhiker's Guide to Malicious Third-Party Dependencie:
, In:
?
Proceedings of the 39th Annual Computer Security Applications Conference ,
4
On the Feasibility of Cross-Language Detection of Malicious..:
, In:
?
Proceedings of the 2022 ACM Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses ,
5
Towards the Detection of Malicious Java Packages:
, In:
?
Proceedings of the 2022 ACM Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses ,
7
Risk Explorer for Software Supply Chains : Understanding..:
, In:
?
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering ,
10
Code-based vulnerability detection in Node.js applications ..:
, In:
?
2019 IEEE/ACM 16th International Conference on Mining Software Repositories (MSR) ,
11
A Manually-Curated Dataset of Fixes to Vulnerabilities of O..:
, In:
?
Proceedings of the 12th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement ,
12
Vulnerable open source dependencies : counting those tha..:
, In:
?
Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy ,
13
Aegis : Automatic Enforcement of Security Policies in Wo..:
, In:
?
Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies ,
14