CrossVul: a cross-language vulnerability dataset with commit data | 3 | 0.38 | 2021 |
A Replication Package for PyCG: Practical Call Graph Generation in Python | 0 | 0.34 | 2021 |
PyCG: Practical Call Graph Generation in Python | 0 | 0.34 | 2021 |
Replication Package for Article: Data-Oriented Differential Testing of Object-Relational Mapping Systems | 0 | 0.34 | 2021 |
Well-typed programs can go wrong: a study of typing-related bugs in JVM compilers | 0 | 0.34 | 2021 |
Data-Oriented Differential Testing of Object-Relational Mapping Systems | 1 | 0.36 | 2021 |
Practical fault detection in puppet programs | 3 | 0.42 | 2020 |
A model for detecting faults in build specifications | 1 | 0.35 | 2020 |
Pdguard: An Architecture For The Control And Secure Processing Of Personal Data | 0 | 0.34 | 2020 |
Defending Against Web Application Attacks: Approaches, Challenges and Implications | 1 | 0.37 | 2019 |
Detecting Missing Dependencies and Notifiers in Puppet Programs. | 0 | 0.34 | 2019 |
Pythia: Identifying Dangerous Data-flows in Django-based Applications | 0 | 0.34 | 2019 |
Time present and time past: analyzing the evolution of JavaScript code in the wild | 1 | 0.35 | 2019 |
VulinOSS: a dataset of security vulnerabilities in open-source systems. | 5 | 0.48 | 2018 |
Aspects of the History of Computing in Modern Greece. | 0 | 0.34 | 2018 |
How 1 million app calls can tell you a bit about malware. | 0 | 0.34 | 2017 |
Fatal injection: a survey of modern code injection attack countermeasures. | 0 | 0.34 | 2017 |
POSIX abstractions in modern operating systems: the old, the new, and the missing. | 9 | 0.64 | 2016 |
How to Train Your Browser: Preventing XSS Attacks Using Contextual Script Fingerprints. | 5 | 0.43 | 2016 |
POSIX Has Become Outdated. | 0 | 0.34 | 2016 |
Charting the API minefield using software telemetry data | 12 | 0.58 | 2015 |
A type-safe embedding of SQL into Java using the extensible compiler framework J% | 6 | 0.42 | 2015 |
On the evolution of security bugs. | 0 | 0.34 | 2015 |
Securing Legacy Code with the TRACER Platform | 0 | 0.34 | 2014 |
TRACER: A Platform for Securing Legacy Code. | 0 | 0.34 | 2014 |
The Vulnerability Dataset of a Large Software Ecosystem | 1 | 0.35 | 2014 |
The bug catalog of the maven ecosystem | 11 | 0.67 | 2014 |
Security bugs in large software ecosystems | 0 | 0.34 | 2013 |
Data security in the cloud environment | 0 | 0.34 | 2013 |
Improving the quality of APIs through the analysis of software crash reports. | 0 | 0.34 | 2013 |
Dismal Code: Studying the Evolution of Security Bugs. | 4 | 0.53 | 2013 |
Blogs | 0 | 0.34 | 2012 |
Measuring the Occurrence of Security-Related Bugs through Software Evolution | 7 | 0.71 | 2012 |
Better safe than sorry: backup your backups | 0 | 0.34 | 2012 |
Countering Code Injection Attacks: A Unified Approach | 6 | 0.44 | 2011 |
Cyberdiversity: Measures and Initial Results | 1 | 0.37 | 2010 |
SDriver: Location-specific signatures prevent SQL injection attacks | 9 | 0.48 | 2009 |
Fortifying Applications Against Xpath Injection Attacks. | 4 | 0.37 | 2009 |