共 18 条
[1]
When Do Changes Induce Software Vulnerabilities?
[J].
2017 IEEE 3RD INTERNATIONAL CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (CIC),
2017,
:59-66
[2]
Alomar N, 2020, PROCEEDINGS OF THE SIXTEENTH SYMPOSIUM ON USABLE PRIVACY AND SECURITY (SOUPS 2020), P319
[3]
Frei S., 2006, P 2006 SIGCOMM WORKS, P131
[4]
Discovering Bug Patterns in Java']JavaScript
[J].
FSE'16: PROCEEDINGS OF THE 2016 24TH ACM SIGSOFT INTERNATIONAL SYMPOSIUM ON FOUNDATIONS OF SOFTWARE ENGINEERING,
2016,
:144-156
[5]
The Challenges of Labeling Vulnerability-Contributing Commits
[J].
2019 IEEE 30TH INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING WORKSHOPS (ISSREW 2019),
2019,
:270-275
[6]
How Do Developers Act on Static Analysis Alerts? An Empirical Study of Coverity Usage
[J].
2019 IEEE 30TH INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING (ISSRE),
2019,
:323-333
[7]
Kim S, 2006, IEEE INT CONF AUTOM, P81
[8]
A Large-Scale Empirical Study of Security Patches
[J].
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2017,
:2201-2215
[9]
Meneely Andrew, 2013, 2013 ACM / IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM), P65, DOI 10.1109/ESEM.2013.19