| |
Ali Babar, Muhammad
|
MSR4P&S '22: "Mining Software Repositories ..."
Mining Software Repositories for Security: Data Quality Issues Lessons from Trenches (Keynote)
Muhammad Ali Babar
(University of Adelaide, Australia)
@InProceedings{MSR4P&S22p1,
author = {Muhammad Ali Babar},
title = {Mining Software Repositories for Security: Data Quality Issues Lessons from Trenches (Keynote)},
booktitle = {Proc.\ MSR4P&S},
publisher = {ACM},
pages = {1-0},
doi = {10.1145/3549035.3570192},
year = {2022},
}
Publisher's Version
|
| |
Codabux, Zadia
|
MSR4P&S '22: "An Exploratory Study on the ..."
An Exploratory Study on the Relationship of Smells and Design Issues with Software Vulnerabilities
Sahrima Jannat Oishwee, Zadia Codabux, and Natalia Stakhanova
(University of Saskatchewan, Canada)
@InProceedings{MSR4P&S22p28,
author = {Sahrima Jannat Oishwee and Zadia Codabux and Natalia Stakhanova},
title = {An Exploratory Study on the Relationship of Smells and Design Issues with Software Vulnerabilities},
booktitle = {Proc.\ MSR4P&S},
publisher = {ACM},
pages = {28-27},
doi = {10.1145/3549035.3561182},
year = {2022},
}
Publisher's Version
|
| |
Mirakhorli, Mehdi
|
MSR4P&S '22: "Counterfeit Object-Oriented ..."
Counterfeit Object-Oriented Programming Vulnerabilities: An Empirical Study in Java
Joanna C. S. Santos, Xueling Zhang, and Mehdi Mirakhorli
(University of Notre Dame, USA; Rochester Institute of Technology, USA)
@InProceedings{MSR4P&S22p37,
author = {Joanna C. S. Santos and Xueling Zhang and Mehdi Mirakhorli},
title = {Counterfeit Object-Oriented Programming Vulnerabilities: An Empirical Study in Java},
booktitle = {Proc.\ MSR4P&S},
publisher = {ACM},
pages = {37-36},
doi = {10.1145/3549035.3561183},
year = {2022},
}
Publisher's Version
|
| |
Østvold, Bjarte M.
|
MSR4P&S '22: "Assessing Software Privacy ..."
Assessing Software Privacy using the Privacy Flow-Graph
Feiyang Tang and Bjarte M. Østvold
(Norwegian Computing Center, Norway)
@InProceedings{MSR4P&S22p19,
author = {Feiyang Tang and Bjarte M. Østvold},
title = {Assessing Software Privacy using the Privacy Flow-Graph},
booktitle = {Proc.\ MSR4P&S},
publisher = {ACM},
pages = {19-18},
doi = {10.1145/3549035.3561185},
year = {2022},
}
Publisher's Version
|
| |
Oishwee, Sahrima Jannat |
MSR4P&S '22: "An Exploratory Study on the ..."
An Exploratory Study on the Relationship of Smells and Design Issues with Software Vulnerabilities
Sahrima Jannat Oishwee, Zadia Codabux, and Natalia Stakhanova
(University of Saskatchewan, Canada)
@InProceedings{MSR4P&S22p28,
author = {Sahrima Jannat Oishwee and Zadia Codabux and Natalia Stakhanova},
title = {An Exploratory Study on the Relationship of Smells and Design Issues with Software Vulnerabilities},
booktitle = {Proc.\ MSR4P&S},
publisher = {ACM},
pages = {28-27},
doi = {10.1145/3549035.3561182},
year = {2022},
}
Publisher's Version
|
| |
Rahimi, Mona
|
MSR4P&S '22: "Mining Software Repositories ..."
Mining Software Repositories for Patternizing Attack-and-Defense Co-Evolution
Samiha Shimmi and Mona Rahimi
(Northern Illinois University, USA)
@InProceedings{MSR4P&S22p10,
author = {Samiha Shimmi and Mona Rahimi},
title = {Mining Software Repositories for Patternizing Attack-and-Defense Co-Evolution},
booktitle = {Proc.\ MSR4P&S},
publisher = {ACM},
pages = {10-9},
doi = {10.1145/3549035.3561181},
year = {2022},
}
Publisher's Version
|
| |
Santos, Joanna C. S.
|
MSR4P&S '22: "Counterfeit Object-Oriented ..."
Counterfeit Object-Oriented Programming Vulnerabilities: An Empirical Study in Java
Joanna C. S. Santos, Xueling Zhang, and Mehdi Mirakhorli
(University of Notre Dame, USA; Rochester Institute of Technology, USA)
@InProceedings{MSR4P&S22p37,
author = {Joanna C. S. Santos and Xueling Zhang and Mehdi Mirakhorli},
title = {Counterfeit Object-Oriented Programming Vulnerabilities: An Empirical Study in Java},
booktitle = {Proc.\ MSR4P&S},
publisher = {ACM},
pages = {37-36},
doi = {10.1145/3549035.3561183},
year = {2022},
}
Publisher's Version
MSR4P&S '22: "SecurityEval Dataset: Mining ..."
SecurityEval Dataset: Mining Vulnerability Examples to Evaluate Machine Learning-Based Code Generation Techniques
Mohammed Latif Siddiq and Joanna C. S. Santos
(University of Notre Dame, USA)
@InProceedings{MSR4P&S22p46,
author = {Mohammed Latif Siddiq and Joanna C. S. Santos},
title = {SecurityEval Dataset: Mining Vulnerability Examples to Evaluate Machine Learning-Based Code Generation Techniques},
booktitle = {Proc.\ MSR4P&S},
publisher = {ACM},
pages = {46-45},
doi = {10.1145/3549035.3561184},
year = {2022},
}
Publisher's Version
|
| |
Shimmi, Samiha |
MSR4P&S '22: "Mining Software Repositories ..."
Mining Software Repositories for Patternizing Attack-and-Defense Co-Evolution
Samiha Shimmi and Mona Rahimi
(Northern Illinois University, USA)
@InProceedings{MSR4P&S22p10,
author = {Samiha Shimmi and Mona Rahimi},
title = {Mining Software Repositories for Patternizing Attack-and-Defense Co-Evolution},
booktitle = {Proc.\ MSR4P&S},
publisher = {ACM},
pages = {10-9},
doi = {10.1145/3549035.3561181},
year = {2022},
}
Publisher's Version
|
| |
Siddiq, Mohammed Latif |
MSR4P&S '22: "SecurityEval Dataset: Mining ..."
SecurityEval Dataset: Mining Vulnerability Examples to Evaluate Machine Learning-Based Code Generation Techniques
Mohammed Latif Siddiq and Joanna C. S. Santos
(University of Notre Dame, USA)
@InProceedings{MSR4P&S22p46,
author = {Mohammed Latif Siddiq and Joanna C. S. Santos},
title = {SecurityEval Dataset: Mining Vulnerability Examples to Evaluate Machine Learning-Based Code Generation Techniques},
booktitle = {Proc.\ MSR4P&S},
publisher = {ACM},
pages = {46-45},
doi = {10.1145/3549035.3561184},
year = {2022},
}
Publisher's Version
|
| |
Stakhanova, Natalia |
MSR4P&S '22: "An Exploratory Study on the ..."
An Exploratory Study on the Relationship of Smells and Design Issues with Software Vulnerabilities
Sahrima Jannat Oishwee, Zadia Codabux, and Natalia Stakhanova
(University of Saskatchewan, Canada)
@InProceedings{MSR4P&S22p28,
author = {Sahrima Jannat Oishwee and Zadia Codabux and Natalia Stakhanova},
title = {An Exploratory Study on the Relationship of Smells and Design Issues with Software Vulnerabilities},
booktitle = {Proc.\ MSR4P&S},
publisher = {ACM},
pages = {28-27},
doi = {10.1145/3549035.3561182},
year = {2022},
}
Publisher's Version
|
| |
Tang, Feiyang
|
MSR4P&S '22: "Assessing Software Privacy ..."
Assessing Software Privacy using the Privacy Flow-Graph
Feiyang Tang and Bjarte M. Østvold
(Norwegian Computing Center, Norway)
@InProceedings{MSR4P&S22p19,
author = {Feiyang Tang and Bjarte M. Østvold},
title = {Assessing Software Privacy using the Privacy Flow-Graph},
booktitle = {Proc.\ MSR4P&S},
publisher = {ACM},
pages = {19-18},
doi = {10.1145/3549035.3561185},
year = {2022},
}
Publisher's Version
|
| |
Zhang, Xueling
|
MSR4P&S '22: "Counterfeit Object-Oriented ..."
Counterfeit Object-Oriented Programming Vulnerabilities: An Empirical Study in Java
Joanna C. S. Santos, Xueling Zhang, and Mehdi Mirakhorli
(University of Notre Dame, USA; Rochester Institute of Technology, USA)
@InProceedings{MSR4P&S22p37,
author = {Joanna C. S. Santos and Xueling Zhang and Mehdi Mirakhorli},
title = {Counterfeit Object-Oriented Programming Vulnerabilities: An Empirical Study in Java},
booktitle = {Proc.\ MSR4P&S},
publisher = {ACM},
pages = {37-36},
doi = {10.1145/3549035.3561183},
year = {2022},
}
Publisher's Version
|