Stebėti
Henrik Plate
Henrik Plate
Security Researcher, Endor Labs
Patvirtintas el. paštas endor.ai
Pavadinimas
Cituota
Cituota
Metai
Backstabber’s knife collection: A review of open source software supply chain attacks
M Ohm, H Plate, A Sykosch, M Meier
Detection of Intrusions and Malware, and Vulnerability Assessment: 17th …, 2020
1782020
A manually-curated dataset of fixes to vulnerabilities of open-source software
SE Ponta, H Plate, A Sabetta, M Bezzi, C Dangremont
2019 IEEE/ACM 16th International Conference on Mining Software Repositories …, 2019
1242019
Vulnerable open source dependencies: Counting those that matter
I Pashchenko, H Plate, SE Ponta, A Sabetta, F Massacci
Proceedings of the 12th ACM/IEEE International Symposium on Empirical …, 2018
1082018
Impact assessment for vulnerabilities in open-source software libraries
H Plate, SE Ponta, A Sabetta
2015 IEEE International Conference on Software Maintenance and Evolution …, 2015
1082015
Beyond metadata: Code-centric and usage-based analysis of known vulnerabilities in open-source software
SE Ponta, H Plate, A Sabetta
2018 IEEE International Conference on Software Maintenance and Evolution …, 2018
952018
SoK: Taxonomy of Attacks on Open-Source Software Supply Chains
P Ladisa, H Plate, M Martinez, O Barais
2023 IEEE Symposium on Security and Privacy (SP), 167-184, 2022
822022
Detection, assessment and mitigation of vulnerabilities in open source dependencies
SE Ponta, H Plate, A Sabetta
Empirical Software Engineering 25 (5), 3175-3215, 2020
792020
Towards Using Source Code Repositories to Identify Software Supply Chain Attacks
DL Vu, I Pashchenko, F Massacci, H Plate, A Sabetta
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
572020
Typosquatting and Combosquatting Attacks on the Python Ecosystem
DL Vu, I Pashchenko, F Massacci, H Plate, A Sabetta
2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2020
542020
Vuln4real: A methodology for counting actually vulnerable dependencies
I Pashchenko, H Plate, SE Ponta, A Sabetta, F Massacci
IEEE Transactions on Software Engineering 48 (5), 1592-1609, 2020
512020
Comparing encrypted documents having structured data
MA Rahaman, A Schaad, H Plate, Y Roudier
US Patent 8,726,151, 2014
452014
LastPyMile: identifying the discrepancy between sources and packages
DL Vu, F Massacci, I Pashchenko, H Plate, A Sabetta
Proceedings of the 29th ACM Joint Meeting on European Software Engineering …, 2021
422021
Code-based Vulnerability Detection in Node. js Applications: How far are we?
B Chinthanet, SE Ponta, H Plate, A Sabetta, RG Kula, T Ishio, ...
Proceedings of the 35th IEEE/ACM International Conference on Automated …, 2020
352020
Software dependency management through declarative constraints
H Plate
US Patent 9,558,017, 2017
352017
Mining social networks for software vulnerabilities monitoring
S Trabelsi, H Plate, A Abida, MMB Aoun, A Zouaoui, C Missaoui, S Gharbi, ...
2015 7th International Conference on New Technologies, Mobility and Security …, 2015
332015
Assessing vulnerability impact using call graphs
H Plate, S Ponta, A Sabetta
US Patent 9,792,200, 2017
292017
Tracing of collaborative workflows
CRJ Hebert, LY Gomez, F Montagut, H Plate, CSP Ulmer
US Patent 8,819,131, 2014
262014
Standardized configuration checklists for software development
H Plate
US Patent 8,782,603, 2014
252014
Prioritization of software patches
H Plate, S Ponta, A Sabetta
US Patent 9,959,111, 2018
192018
Identifying challenges for oss vulnerability scanners-a study & test suite
A Dann, H Plate, B Hermann, SE Ponta, E Bodden
IEEE Transactions on Software Engineering 48 (9), 3613-3625, 2021
162021
Sistema negali atlikti operacijos. Bandykite vėliau dar kartą.
Straipsniai 1–20