Display options
Share it on
Full text links
View full text

L Neil, S Mittal, A Joshi - 2018 IEEE International Conference …, 2018 - ieeexplore.ieee.org

Mining threat intelligence about open-source projects and libraries from code repository issues and bug reports.

Louis Stokes Alliances for Minority Participation AND Program Evaluation

Joshi, Mittal

GSID: 1ExXOpcp30sJ

Excerpt

Open-Source Projects and Libraries are being used in software development while also bearing multiple security vulnerabilities. This use of third party ecosystem creates a new kind of attack surface for a product in development. An intelligent attacker can attack a product by exploiting one of the vulnerabilities present in linked projects and libraries. In this paper, we mine threat intelligence about open source projects and libraries from bugs and issues reported on public code repositories. We also track library and project dependencies for …

Similar articles

Cited by