Colocated @ SANER 2024 (Rovaniemi, Finland)
# |
Authors |
Paper Title |
W1 |
Anastasia Terzi and Matina Bibi |
Managing Security Vulnerabilities Introduced by Third-Party Dependencies in JavaScript Applications |
W2 |
Zachary Wadhams, Ann Marie Reinhold and Clemente Izurieta |
Automating Static Code Analysis Through CI/CD Pipeline Integration |
W3 |
Feiyang Tang and Bjarte M. Østvold |
Finding Privacy-relevant Source Code |
W4 |
Bernd Gruner, Sebastian Thomas Heckner, Tim Sonnekalb, Badr-Eddine Bouhlal and Clemens-Alexander Brust |
Finding a Needle in a Haystack: Threat Analysis in Open-Source Projects |
W5 |
Eric O’Donoghue, Ann Marie Reinhold and Clemente Izurieta |
Assessing Security Risks of Software Supply Chains Using Software Bill of Materials |
Colocated @ ESEC/FSE 2022 (Singapore, Online)
# |
Authors |
Title/PrePrint Link |
W1 |
Samiha Shimmi, Mona Rahimi |
Software Repositories for Patternizing Attack-and-Defense Co-Evolution. |
W2 |
Feiyang Tang, Bjarte M. Østvold |
Assessing Software Privacy using the Privacy Flow-Graph |
W3 |
Sahrima Jannat Oishwee, Zadia Codabux, Natalia Stakhanova |
An Exploratory Study on the Relationship of Smells and Design Issues with Software Vulnerabilities |
W4 |
Joanna Cecilia da Silva Santos, Xueling Zhang, Mehdi Mirakhorli |
Counterfeit-Object Oriented Programming Vulnerabilities: An Empirical Study in Java |
W5 |
Mohammed Latif Siddiq, Joanna Cecilia da Silva Santos |
SecurityEval Dataset: Mining Vulnerability Examples to Evaluate Machine Learning-Based Code Generation Techniques [ Preprint ] |