All Stories

  1. Stop Using Vulnerability Counts to Measure Software Security
  2. An Investigation into Open Source Fairness Tool Sustainability
  3. "Just Use Rust": A Best-Case Historical Study of Open Source Vulnerabilities in C
  4. Evaluating Keystroke Dynamics Performance in e-Commerce
  5. WIP: ChatVis: Enhancing Academic Team Collaboration through WhatsApp Chat Analytics
  6. Taxonomy-Based Human Error Assessment for Senior Software Engineering Students
  7. What Happens When We Fuzz? Investigating OSS-Fuzz Bug History
  8. Examining Penetration Tester Behavior in the Collegiate Penetration Testing Competition
  9. Who are Vulnerability Reporters?
  10. An Automated Post-Mortem Analysis of Vulnerability Relationships using Natural Language Word Embeddings
  11. Characterizing Attacker Behavior in a Cybersecurity Penetration Testing Competition
  12. Data-Driven Insights from Vulnerability Discovery Metrics
  13. Pragmatic Characteristics of Security Conversations: An Exploratory Linguistic Analysis
  14. Attack surface definitions: A systematic literature review
  15. A dataset for identifying actionable feedback in collaborative software development
  16. A Domain-Independent Model for Identifying Security Requirements
  17. Examining the relationship between security metrics and user ratings of mobile apps: a case study
  18. The impact of cross-platform development approaches for mobile applications from the user's perspective
  19. Vulnerability severity scoring and bounties: why the disconnect?
  20. Beyond the Attack Surface
  21. Do bugs foreshadow vulnerabilities? An in-depth study of the chromium project
  22. Actionable metrics are better metrics
  23. Security cannot be measured
  24. An insider threat activity in a software security course
  25. Do Bugs Foreshadow Vulnerabilities? A Study of the Chromium Project
  26. Analyzing Security Data
  27. An empirical investigation of socio-technical code review metrics and security vulnerabilities
  28. Teaching Web Engineering using a project component
  29. When a Patch Goes Bad: Exploring the Properties of Vulnerability-Contributing Commits
  30. Vulnerability of the Day: Concrete demonstrations for software engineering undergraduates
  31. Interactive churn metrics
  32. Validating software metrics
  33. Evaluating Complexity, Code Churn, and Developer Activity Metrics as Indicators of Software Vulnerabilities
  34. Does adding manpower also affect quality?
  35. Socio-technical developer networks
  36. Challenges for protecting the privacy of health information
  37. Strengthening the empirical analysis of the relationship between Linus' Law and software security
  38. Improving developer activity metrics with issue tracking annotations
  39. Protection Poker: The New Software Security "Game";
  40. On the Use of Issue Tracking Annotations for Improving Developer Activity Metrics
  41. Secure open source collaboration
  42. On preparing students for distributed software development with a synchronous, collaborative development platform
  43. Protection Poker: Structuring Software Security Risk Assessment and Knowledge Transfer
  44. Predicting failures with developer networks and social network analysis
  45. ROSE
  46. Fifteen compilers in fifteen days