All Stories

  1. Log-related Coding Patterns to Conduct Postmortems of Attacks in Supervised Learning-based Projects
  2. Vulnerability discovery strategies used in software projects
  3. Characterizing co-located insecure coding patterns in infrastructure as code scripts