Stebėti
Serena Elisa Ponta
Serena Elisa Ponta
SAP Security Research
Patvirtintas el. paštas sap.com
Pavadinimas
Cituota
Cituota
Metai
The AVANTSSAR platform for the automated validation of trust and security of service-oriented architectures
A Armando, W Arsac, T Avanesov, M Barletta, A Calvi, A Cappai, ...
Tools and Algorithms for the Construction and Analysis of Systems: 18th …, 2012
1442012
Vulnerable open source dependencies: Counting those that matter
I Pashchenko, H Plate, SE Ponta, A Sabetta, F Massacci
Proceedings of the 12th ACM/IEEE international symposium on empirical …, 2018
1282018
A manually-curated dataset of fixes to vulnerabilities of open-source software
SE Ponta, H Plate, A Sabetta, M Bezzi, C Dangremont
2019 IEEE/ACM 16th International Conference on Mining Software Repositories …, 2019
1272019
Impact assessment for vulnerabilities in open-source software libraries
H Plate, SE Ponta, A Sabetta
2015 IEEE International Conference on Software Maintenance and Evolution …, 2015
1192015
Beyond Metadata: Code-centric and Usage-based Analysis of Known Vulnerabilities in Open-source Software
SE Ponta, H Plate, A Sabetta
1102018
Detection, assessment and mitigation of vulnerabilities in open source dependencies
SE Ponta, H Plate, A Sabetta
Empirical Software Engineering 25 (5), 3175-3215, 2020
942020
Model checking of security-sensitive business processes
A Armando, SE Ponta
International Workshop on Formal Aspects in Security and Trust, 66-80, 2009
632009
Security validation of business processes via model-checking
W Arsac, L Compagna, G Pellegrino, SE Ponta
International Symposium on Engineering Secure Software and Systems, 29-42, 2011
622011
Vuln4real: A methodology for counting actually vulnerable dependencies
I Pashchenko, H Plate, SE Ponta, A Sabetta, F Massacci
IEEE Transactions on Software Engineering 48 (5), 1592-1609, 2020
612020
Code-based vulnerability detection in node. js applications: How far are we?
B Chinthanet, SE Ponta, H Plate, A Sabetta, RG Kula, T Ishio, ...
Proceedings of the 35th IEEE/ACM international conference on automated …, 2020
392020
A manually-curated dataset of fixes to vulnerabilities of open-source software. In 2019 IEEE/ACM 16th International Conference on Mining Software Repositories (MSR)
SE Ponta, H Plate, A Sabetta, M Bezzi, C Dangremont
IEEE, 383ś387, 2019
332019
Identifying challenges for oss vulnerability scanners-a study & test suite
A Dann, H Plate, B Hermann, SE Ponta, E Bodden
IEEE Transactions on Software Engineering 48 (9), 3613-3625, 2021
312021
Assessing vulnerability impact using call graphs
H Plate, S Ponta, A Sabetta
US Patent 9,792,200, 2017
292017
Model checking authorization requirements in business processes
A Armando, SE Ponta
Computers & Security 40, 1-22, 2014
292014
Multi-context exploit test management
A Sabetta, L Compagna, S Ponta, S Dashevskyi, D Dos Santos, ...
US Patent 9,811,668, 2017
202017
Prioritization of software patches
H Plate, S Ponta, A Sabetta
US Patent 9,959,111, 2018
192018
Aegis: Automatic enforcement of security policies in workflow-driven web applications
L Compagna, DR dos Santos, SE Ponta, S Ranise
Proceedings of the Seventh ACM on Conference on Data and Application …, 2017
182017
Towards the detection of malicious java packages
P Ladisa, H Plate, M Martinez, O Barais, SE Ponta
Proceedings of the 2022 ACM Workshop on Software Supply Chain Offensive …, 2022
172022
Cerberus: Automated synthesis of enforcement mechanisms for security-sensitive business processes
L Compagna, DR Dos Santos, SE Ponta, S Ranise
International Conference on Tools and Algorithms for the Construction and …, 2016
162016
The used, the bloated, and the vulnerable: Reducing the attack surface of an industrial application
SE Ponta, W Fischer, H Plate, A Sabetta
2021 IEEE International Conference on Software Maintenance and Evolution …, 2021
152021
Sistema negali atlikti operacijos. Bandykite vėliau dar kartą.
Straipsniai 1–20