Demystifying dependency bugs in deep learning stack K Huang, B Chen, S Wu, J Cao, L Ma, X Peng Proceedings of the 31st ACM Joint European Software Engineering Conference …, 2023 | 15 | 2023 |
Identifying Affected Libraries and Their Ecosystems for Open Source Software Vulnerabilities S Wu, W Song, K Huang, B Chen, X Peng Proceedings of the IEEE/ACM 46th International Conference on Software …, 2024 | 7 | 2024 |
Magneto: A Step-Wise Approach to Exploit Vulnerabilities in Dependent Libraries via LLM-Empowered Directed Fuzzing Z Zhou, Y Yang, S Wu, Y Huang, B Chen, X Peng Proceedings of the 39th IEEE/ACM International Conference on Automated …, 2024 | 2 | 2024 |
SpiderScan: Practical Detection of Malicious NPM Packages Based on Graph-Based Behavior Modeling and Matching Y Huang, R Wang, W Zheng, Z Zhou, S Wu, S Ke, B Chen, S Gao, X Peng Proceedings of the 39th IEEE/ACM International Conference on Automated …, 2024 | 2 | 2024 |
Vision: Identifying Affected Library Versions for Open Source Software Vulnerabilities S Wu, R Wang, K Huang, Y Cao, W Song, Z Zhou, Y Huang, B Chen, ... Proceedings of the 39th IEEE/ACM International Conference on Automated …, 2024 | 1 | 2024 |
Lifting the Veil on the Large Language Model Supply Chain: Composition, Risks, and Mitigations K Huang, B Chen, Y Lu, S Wu, D Wang, Y Huang, H Jiang, Z Zhou, J Cao, ... arXiv preprint arXiv:2410.21218, 2024 | | 2024 |