Folgen
Serena Elisa Ponta
Serena Elisa Ponta
SAP Security Research
Bestätigte E-Mail-Adresse bei sap.com
Titel
Zitiert von
Zitiert von
Jahr
The AVANTSSAR platform for the automated validation of trust and security of service-oriented architectures
A Armando, W Arsac, T Avanesov, M Barletta, A Calvi, A Cappai, ...
Tools and Algorithms for the Construction and Analysis of Systems: 18th …, 2012
1402012
A manually-curated dataset of fixes to vulnerabilities of open-source software
SE Ponta, H Plate, A Sabetta, M Bezzi, C Dangremont
2019 IEEE/ACM 16th International Conference on Mining Software Repositories …, 2019
1252019
Vulnerable open source dependencies: Counting those that matter
I Pashchenko, H Plate, SE Ponta, A Sabetta, F Massacci
Proceedings of the 12th ACM/IEEE international symposium on empirical …, 2018
1102018
Impact assessment for vulnerabilities in open-source software libraries
H Plate, SE Ponta, A Sabetta
2015 IEEE International Conference on Software Maintenance and Evolution …, 2015
1092015
Beyond Metadata: Code-centric and Usage-based Analysis of Known Vulnerabilities in Open-source Software
SE Ponta, H Plate, A Sabetta
952018
Detection, assessment and mitigation of vulnerabilities in open source dependencies
SE Ponta, H Plate, A Sabetta
Empirical Software Engineering 25 (5), 3175-3215, 2020
812020
Model checking of security-sensitive business processes
A Armando, SE Ponta
International Workshop on Formal Aspects in Security and Trust, 66-80, 2009
632009
Security validation of business processes via model-checking
W Arsac, L Compagna, G Pellegrino, SE Ponta
International Symposium on Engineering Secure Software and Systems, 29-42, 2011
612011
Vuln4real: A methodology for counting actually vulnerable dependencies
I Pashchenko, H Plate, SE Ponta, A Sabetta, F Massacci
IEEE Transactions on Software Engineering 48 (5), 1592-1609, 2020
532020
Code-based vulnerability detection in node. js applications: How far are we?
B Chinthanet, SE Ponta, H Plate, A Sabetta, RG Kula, T Ishio, ...
Proceedings of the 35th IEEE/ACM International Conference on Automated …, 2020
372020
Assessing vulnerability impact using call graphs
H Plate, S Ponta, A Sabetta
US Patent 9,792,200, 2017
292017
Model checking authorization requirements in business processes
A Armando, SE Ponta
Computers & Security 40, 1-22, 2014
272014
Multi-context exploit test management
A Sabetta, L Compagna, S Ponta, S Dashevskyi, D Dos Santos, ...
US Patent 9,811,668, 2017
202017
Prioritization of software patches
H Plate, S Ponta, A Sabetta
US Patent 9,959,111, 2018
192018
Identifying challenges for oss vulnerability scanners-a study & test suite
A Dann, H Plate, B Hermann, SE Ponta, E Bodden
IEEE Transactions on Software Engineering 48 (9), 3613-3625, 2021
182021
Aegis: Automatic enforcement of security policies in workflow-driven web applications
L Compagna, DR dos Santos, SE Ponta, S Ranise
Proceedings of the Seventh ACM on Conference on Data and Application …, 2017
182017
Cerberus: Automated synthesis of enforcement mechanisms for security-sensitive business processes
L Compagna, DR Dos Santos, SE Ponta, S Ranise
International Conference on Tools and Algorithms for the Construction and …, 2016
152016
The used, the bloated, and the vulnerable: Reducing the attack surface of an industrial application
SE Ponta, W Fischer, H Plate, A Sabetta
2021 IEEE International Conference on Software Maintenance and Evolution …, 2021
132021
Software patch evaluator
H Plate, S Ponta, A Sabetta
US Patent 9,880,832, 2018
132018
Towards the detection of malicious java packages
P Ladisa, H Plate, M Martinez, O Barais, SE Ponta
Proceedings of the 2022 ACM Workshop on Software Supply Chain Offensive …, 2022
122022
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20