Cited By
View all- Lorch RLarraz DTinelli CChowdhury O(2024)A Comprehensive, Automated Security Analysis of the Uptane Automotive Over-the-Air Update FrameworkProceedings of the 27th International Symposium on Research in Attacks, Intrusions and Defenses10.1145/3678890.3678927(594-612)Online publication date: 30-Sep-2024
- Li XGu YQiao CZhang ZLiu DYing LDuan HGao XLuo BLiao XXu JKirda ELie D(2024)Toward Understanding the Security of Plugins in Continuous Integration ServicesProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3670366(482-496)Online publication date: 2-Dec-2024
- Malka JRoychoudhury APaiva AAbreu RStorey M(2024)Increasing trust in the open source supply chain with reproducible builds and functional package managementProceedings of the 2024 IEEE/ACM 46th International Conference on Software Engineering: Companion Proceedings10.1145/3639478.3639806(184-186)Online publication date: 14-Apr-2024
- Show More Cited By