Follow
Henrik Plate
Henrik Plate
Security Researcher, Endor Labs
Verified email at endor.ai
Title
Cited by
Cited by
Year
Backstabber’s knife collection: A review of open source software supply chain attacks
M Ohm, H Plate, A Sykosch, M Meier
Detection of Intrusions and Malware, and Vulnerability Assessment: 17th …, 2020
1692020
A manually-curated dataset of fixes to vulnerabilities of open-source software
SE Ponta, H Plate, A Sabetta, M Bezzi, C Dangremont
2019 IEEE/ACM 16th International Conference on Mining Software Repositories …, 2019
1212019
Impact assessment for vulnerabilities in open-source software libraries
H Plate, SE Ponta, A Sabetta
2015 IEEE International Conference on Software Maintenance and Evolution …, 2015
1072015
Vulnerable open source dependencies: Counting those that matter
I Pashchenko, H Plate, SE Ponta, A Sabetta, F Massacci
Proceedings of the 12th ACM/IEEE International Symposium on Empirical …, 2018
1022018
Beyond metadata: Code-centric and usage-based analysis of known vulnerabilities in open-source software
SE Ponta, H Plate, A Sabetta
2018 IEEE International Conference on Software Maintenance and Evolution …, 2018
912018
Detection, assessment and mitigation of vulnerabilities in open source dependencies
SE Ponta, H Plate, A Sabetta
Empirical Software Engineering 25 (5), 3175-3215, 2020
762020
SoK: Taxonomy of Attacks on Open-Source Software Supply Chains
P Ladisa, H Plate, M Martinez, O Barais
2023 IEEE Symposium on Security and Privacy (SP), 167-184, 2022
672022
Towards Using Source Code Repositories to Identify Software Supply Chain Attacks
DL Vu, I Pashchenko, F Massacci, H Plate, A Sabetta
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
562020
Typosquatting and Combosquatting Attacks on the Python Ecosystem
DL Vu, I Pashchenko, F Massacci, H Plate, A Sabetta
2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2020
522020
Vuln4real: A methodology for counting actually vulnerable dependencies
I Pashchenko, H Plate, SE Ponta, A Sabetta, F Massacci
IEEE Transactions on Software Engineering 48 (5), 1592-1609, 2020
472020
Comparing encrypted documents having structured data
MA Rahaman, A Schaad, H Plate, Y Roudier
US Patent 8,726,151, 2014
452014
LastPyMile: identifying the discrepancy between sources and packages
DL Vu, F Massacci, I Pashchenko, H Plate, A Sabetta
Proceedings of the 29th ACM Joint Meeting on European Software Engineering …, 2021
392021
Code-based Vulnerability Detection in Node. js Applications: How far are we?
B Chinthanet, SE Ponta, H Plate, A Sabetta, RG Kula, T Ishio, ...
Proceedings of the 35th IEEE/ACM International Conference on Automated …, 2020
352020
Software dependency management through declarative constraints
H Plate
US Patent 9,558,017, 2017
342017
Mining social networks for software vulnerabilities monitoring
S Trabelsi, H Plate, A Abida, MMB Aoun, A Zouaoui, C Missaoui, S Gharbi, ...
2015 7th International Conference on New Technologies, Mobility and Security …, 2015
322015
Assessing vulnerability impact using call graphs
H Plate, S Ponta, A Sabetta
US Patent 9,792,200, 2017
292017
Tracing of collaborative workflows
CRJ Hebert, LY Gomez, F Montagut, H Plate, CSP Ulmer
US Patent 8,819,131, 2014
262014
Standardized configuration checklists for software development
H Plate
US Patent 8,782,603, 2014
252014
Prioritization of software patches
H Plate, S Ponta, A Sabetta
US Patent 9,959,111, 2018
192018
Identifying challenges for oss vulnerability scanners-a study & test suite
A Dann, H Plate, B Hermann, SE Ponta, E Bodden
IEEE Transactions on Software Engineering 48 (9), 3613-3625, 2021
142021
The system can't perform the operation now. Try again later.
Articles 1–20