default search action
Henrik Plate
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i12]Imranur Rahman, Ranidya Paramitha, Henrik Plate, Dominik Wermke, Laurie A. Williams:
Less Is More: A Mixed-Methods Study on Security-Sensitive API Calls in Java for Better Dependency Selection. CoRR abs/2408.02846 (2024) - 2023
- [c26]Piergiorgio Ladisa, Henrik Plate, Matias Martinez, Olivier Barais:
SoK: Taxonomy of Attacks on Open-Source Software Supply Chains. SP 2023: 1509-1526 - 2022
- [j3]Ivan Pashchenko, Henrik Plate, Serena Elisa Ponta, Antonino Sabetta, Fabio Massacci:
Vuln4Real: A Methodology for Counting Actually Vulnerable Dependencies. IEEE Trans. Software Eng. 48(5): 1592-1609 (2022) - [j2]Andreas Dann, Henrik Plate, Ben Hermann, Serena Elisa Ponta, Eric Bodden:
Identifying Challenges for OSS Vulnerability Scanners - A Study & Test Suite. IEEE Trans. Software Eng. 48(9): 3613-3625 (2022) - [c25]Piergiorgio Ladisa, Henrik Plate, Matias Martinez, Olivier Barais, Serena Elisa Ponta:
Risk Explorer for Software Supply Chains: Understanding the Attack Surface of Open-Source based Software Development. SCORED@CCS 2022: 35-36 - [c24]Piergiorgio Ladisa, Henrik Plate, Matias Martinez, Olivier Barais, Serena Elisa Ponta:
Towards the Detection of Malicious Java Packages. SCORED@CCS 2022: 63-72 - [c23]Andreas Dann, Henrik Plate, Ben Hermann, Serena Elisa Ponta, Eric Bodden:
Identifying Challenges for OSS Vulnerability Scanners - A Study & Test Suite (Short Summary). Software Engineering 2022: 21-23 - [i11]Piergiorgio Ladisa, Henrik Plate, Matias Martinez, Olivier Barais:
Taxonomy of Attacks on Open-Source Software Supply Chains. CoRR abs/2204.04008 (2022) - [i10]Piergiorgio Ladisa, Henrik Plate, Matias Martinez, Olivier Barais, Serena Elisa Ponta:
Towards the Detection of Malicious Java Packages. CoRR abs/2210.03998 (2022) - 2021
- [c22]Serena Elisa Ponta, Wolfram Fischer, Henrik Plate, Antonino Sabetta:
The Used, the Bloated, and the Vulnerable: Reducing the Attack Surface of an Industrial Application. ICSME 2021: 555-558 - [c21]Duc-Ly Vu, Fabio Massacci, Ivan Pashchenko, Henrik Plate, Antonino Sabetta:
LastPyMile: identifying the discrepancy between sources and packages. ESEC/SIGSOFT FSE 2021: 780-792 - [c20]Frederik L. Dennig, Eren Cakmak, Henrik Plate, Daniel A. Keim:
VulnEx: Exploring Open-Source Software Vulnerabilities in Large Development Organizations to Understand Risk Exposure. VizSec 2021: 79-83 - [i9]Serena Elisa Ponta, Wolfram Fischer, Henrik Plate, Antonino Sabetta:
The Used, the Bloated, and the Vulnerable: Reducing the Attack Surface of an Industrial Application. CoRR abs/2108.05115 (2021) - [i8]Frederik L. Dennig, Eren Cakmak, Henrik Plate, Daniel A. Keim:
VulnEx: Exploring Open-Source Software Vulnerabilities in Large Development Organizations to Understand Risk Exposure. CoRR abs/2108.06259 (2021) - 2020
- [j1]Serena Elisa Ponta, Henrik Plate, Antonino Sabetta:
Detection, assessment and mitigation of vulnerabilities in open source dependencies. Empir. Softw. Eng. 25(5): 3175-3215 (2020) - [c19]Duc-Ly Vu, Ivan Pashchenko, Fabio Massacci, Henrik Plate, Antonino Sabetta:
Towards Using Source Code Repositories to Identify Software Supply Chain Attacks. CCS 2020: 2093-2095 - [c18]Marc Ohm, Henrik Plate, Arnold Sykosch, Michael Meier:
Backstabber's Knife Collection: A Review of Open Source Software Supply Chain Attacks. DIMVA 2020: 23-43 - [c17]Duc-Ly Vu, Ivan Pashchenko, Fabio Massacci, Henrik Plate, Antonino Sabetta:
Typosquatting and Combosquatting Attacks on the Python Ecosystem. EuroS&P Workshops 2020: 509-514 - [c16]Bodin Chinthanet, Serena Elisa Ponta, Henrik Plate, Antonino Sabetta, Raula Gaikovina Kula, Takashi Ishio, Kenichi Matsumoto:
Code-Based Vulnerability Detection in Node.js Applications: How far are we? ASE 2020: 1199-1203 - [c15]Henrik Plate:
Cobbles and Potholes - On the Bumpy Road to Secure Software Supply Chains - Abstract. SAM IoT 2020: 1 - [i7]Marc Ohm, Henrik Plate, Arnold Sykosch, Michael Meier:
Backstabber's Knife Collection: A Review of Open Source Software Supply Chain Attacks. CoRR abs/2005.09535 (2020) - [i6]Bodin Chinthanet, Serena Elisa Ponta, Henrik Plate, Antonino Sabetta, Raula Gaikovina Kula, Takashi Ishio, Kenichi Matsumoto:
Code-based Vulnerability Detection in Node.js Applications: How far are we? CoRR abs/2008.04568 (2020)
2010 – 2019
- 2019
- [c14]Serena Elisa Ponta, Henrik Plate, Antonino Sabetta, Michele Bezzi, Cédric Dangremont:
A manually-curated dataset of fixes to vulnerabilities of open-source software. MSR 2019: 383-387 - [i5]Serena Elisa Ponta, Henrik Plate, Antonino Sabetta, Michele Bezzi, Cédric Dangremont:
A Manually-Curated Dataset of Fixes to Vulnerabilities of Open-Source Software. CoRR abs/1902.02595 (2019) - 2018
- [c13]Ivan Pashchenko, Henrik Plate, Serena Elisa Ponta, Antonino Sabetta, Fabio Massacci:
Vulnerable open source dependencies: counting those that matter. ESEM 2018: 42:1-42:10 - [c12]Serena Elisa Ponta, Henrik Plate, Antonino Sabetta:
Beyond Metadata: Code-Centric and Usage-Based Analysis of Known Vulnerabilities in Open-Source Software. ICSME 2018: 449-460 - [i4]Serena Elisa Ponta, Henrik Plate, Antonino Sabetta:
Beyond Metadata: Code-centric and Usage-based Analysis of Known Vulnerabilities in Open-source Software. CoRR abs/1806.05893 (2018) - [i3]Ivan Pashchenko, Henrik Plate, Serena Elisa Ponta, Antonino Sabetta, Fabio Massacci:
Vulnerable Open Source Dependencies: Counting Those That Matter. CoRR abs/1808.09753 (2018) - 2015
- [c11]Henrik Plate, Serena Elisa Ponta, Antonino Sabetta:
Impact assessment for vulnerabilities in open-source software libraries. ICSME 2015: 411-420 - [c10]Slim Trabelsi, Henrik Plate, Amine Abida, M. Marouane Ben Aoun, Anis Zouaoui, Chedy Missaoui, Sofien Gharbi, Alaeddine Ayari:
Mining social networks for software vulnerabilities monitoring. NTMS 2015: 1-7 - [c9]Slim Trabelsi, Henrik Plate, Amine Abida, M. Marouane Ben Aoun, Anis Zouaoui, Chedy Missaoui, Sofien Gharbi, Alaeddine Ayari:
Monitoring Software Vulnerabilities through Social Networks Analysis. SECRYPT 2015: 236-242 - [i2]Henrik Plate, Serena Elisa Ponta, Antonino Sabetta:
Impact assessment for vulnerabilities in open-source software libraries. CoRR abs/1504.04971 (2015) - 2014
- [c8]Matteo Maria Casalino, Henrik Plate, Serena Elisa Ponta:
Increasing Trust in the Cloud through Configuration Validation. OTM Workshops 2014: 210-216 - 2012
- [c7]Matteo Maria Casalino, Henrik Plate, Serena Elisa Ponta:
Configuration Assessment as a Service. DPM/SETOP 2012: 217-226 - [c6]Wihem Arsac, Annett Laube, Henrik Plate:
Policy Chain for Securing Service Oriented Architectures. DPM/SETOP 2012: 303-317 - [c5]Matteo Maria Casalino, Henrik Plate, Slim Trabelsi:
Transversal Policy Conflict Detection. ESSoS 2012: 30-37 - [c4]Matteo Maria Casalino, Michele Mangili, Henrik Plate, Serena Elisa Ponta:
Detection of Configuration Vulnerabilities in Distributed (Web) Environments. SecureComm 2012: 131-148 - [c3]Henrik Plate:
Policy and Security Configuration Management. TrustBus 2012: 229-231 - [i1]Matteo Maria Casalino, Michele Mangili, Henrik Plate, Serena Elisa Ponta:
Detection of Configuration Vulnerabilities in Distributed (Web) Environments. CoRR abs/1206.6757 (2012)
2000 – 2009
- 2009
- [c2]Mohammad Ashiqur Rahaman, Henrik Plate, Yves Roudier, Andreas Schaad:
Towards Secure Content Based Dissemination of XML Documents. IAS 2009: 721-724 - 2007
- [c1]Christian Wolter, Henrik Plate, Cédric Hébert:
Collaborative Workflow Management for eGovernment. DEXA Workshops 2007: 845-849
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-14 02:02 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint