Colocated @ SANER 2024 (Rovaniemi, Finland)
| # |
Authors |
Paper Title |
| W1 |
Anastasia Terzi and Matina Bibi |
Managing Security Vulnerabilities Introduced by Third-Party Dependencies in JavaScript Applications |
| W2 |
Zachary Wadhams, Ann Marie Reinhold and Clemente Izurieta |
Automating Static Code Analysis Through CI/CD Pipeline Integration |
| W3 |
Feiyang Tang and Bjarte M. Østvold |
Finding Privacy-relevant Source Code |
| W4 |
Bernd Gruner, Sebastian Thomas Heckner, Tim Sonnekalb, Badr-Eddine Bouhlal and Clemens-Alexander Brust |
Finding a Needle in a Haystack: Threat Analysis in Open-Source Projects |
| W5 |
Eric O’Donoghue, Ann Marie Reinhold and Clemente Izurieta |
Assessing Security Risks of Software Supply Chains Using Software Bill of Materials |
Colocated @ ESEC/FSE 2022 (Singapore, Online)
| # |
Authors |
Title/PrePrint Link |
| W1 |
Samiha Shimmi, Mona Rahimi |
Software Repositories for Patternizing Attack-and-Defense Co-Evolution. |
| W2 |
Feiyang Tang, Bjarte M. Østvold |
Assessing Software Privacy using the Privacy Flow-Graph |
| W3 |
Sahrima Jannat Oishwee, Zadia Codabux, Natalia Stakhanova |
An Exploratory Study on the Relationship of Smells and Design Issues with Software Vulnerabilities |
| W4 |
Joanna Cecilia da Silva Santos, Xueling Zhang, Mehdi Mirakhorli |
Counterfeit-Object Oriented Programming Vulnerabilities: An Empirical Study in Java |
| W5 |
Mohammed Latif Siddiq, Joanna Cecilia da Silva Santos |
SecurityEval Dataset: Mining Vulnerability Examples to Evaluate Machine Learning-Based Code Generation Techniques [ Preprint ] |