Henrik Plate

Orcid: 0000-0001-8862-3488

According to our database1, Henrik Plate authored at least 31 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Less Is More: A Mixed-Methods Study on Security-Sensitive API Calls in Java for Better Dependency Selection.
CoRR, 2024

2023
SoK: Taxonomy of Attacks on Open-Source Software Supply Chains.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

2022
Vuln4Real: A Methodology for Counting Actually Vulnerable Dependencies.
IEEE Trans. Software Eng., 2022

Identifying Challenges for OSS Vulnerability Scanners - A Study & Test Suite.
IEEE Trans. Software Eng., 2022

Taxonomy of Attacks on Open-Source Software Supply Chains.
CoRR, 2022

Identifying Challenges for OSS Vulnerability Scanners - A Study & Test Suite (Short Summary).
Proceedings of the Software Engineering 2022, 2022

Towards the Detection of Malicious Java Packages.
Proceedings of the 2022 ACM Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses, 2022

Risk Explorer for Software Supply Chains: Understanding the Attack Surface of Open-Source based Software Development.
Proceedings of the 2022 ACM Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses, 2022

2021
VulnEx: Exploring Open-Source Software Vulnerabilities in Large Development Organizations to Understand Risk Exposure.
Proceedings of the IEEE Symposium on Visualization for Cyber Security, 2021

LastPyMile: identifying the discrepancy between sources and packages.
Proceedings of the ESEC/FSE '21: 29th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2021

The Used, the Bloated, and the Vulnerable: Reducing the Attack Surface of an Industrial Application.
Proceedings of the IEEE International Conference on Software Maintenance and Evolution, 2021

2020
Detection, assessment and mitigation of vulnerabilities in open source dependencies.
Empir. Softw. Eng., 2020

Cobbles and Potholes - On the Bumpy Road to Secure Software Supply Chains - Abstract.
Proceedings of the 1st Eclipse Research International Conference on Security, Artificial Intelligence and Modeling for the next generation Internet of Things, Virtual Event, September 17th - to, 2020

Code-Based Vulnerability Detection in Node.js Applications: How far are we?
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, 2020

Typosquatting and Combosquatting Attacks on the Python Ecosystem.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020

Backstabber's Knife Collection: A Review of Open Source Software Supply Chain Attacks.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2020

Towards Using Source Code Repositories to Identify Software Supply Chain Attacks.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
A manually-curated dataset of fixes to vulnerabilities of open-source software.
Proceedings of the 16th International Conference on Mining Software Repositories, 2019

2018
Beyond Metadata: Code-Centric and Usage-Based Analysis of Known Vulnerabilities in Open-Source Software.
Proceedings of the 2018 IEEE International Conference on Software Maintenance and Evolution, 2018

Vulnerable open source dependencies: counting those that matter.
Proceedings of the 12th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, 2018

2015
Monitoring Software Vulnerabilities through Social Networks Analysis.
Proceedings of the SECRYPT 2015, 2015

Mining social networks for software vulnerabilities monitoring.
Proceedings of the 7th International Conference on New Technologies, Mobility and Security, 2015

Impact assessment for vulnerabilities in open-source software libraries.
Proceedings of the 2015 IEEE International Conference on Software Maintenance and Evolution, 2015

2014
Increasing Trust in the Cloud through Configuration Validation.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2014 Workshops, 2014

2012
Policy and Security Configuration Management.
Proceedings of the Trust, Privacy and Security in Digital Business, 2012

Detection of Configuration Vulnerabilities in Distributed (Web) Environments.
Proceedings of the Security and Privacy in Communication Networks, 2012

Transversal Policy Conflict Detection.
Proceedings of the Engineering Secure Software and Systems - 4th International Symposium, 2012

Configuration Assessment as a Service.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2012

Policy Chain for Securing Service Oriented Architectures.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2012

2009
Towards Secure Content Based Dissemination of XML Documents.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2007
Collaborative Workflow Management for eGovernment.
Proceedings of the 18th International Workshop on Database and Expert Systems Applications (DEXA 2007), 2007


  Loading...