Follow
Ivan Pashchenko
Ivan Pashchenko
Research Assistant Professor, University of Trento
Verified email at unitn.it - Homepage
Title
Cited by
Cited by
Year
Vulnerable open source dependencies: Counting those that matter
I Pashchenko, H Plate, SE Ponta, A Sabetta, F Massacci
Proceedings of the 12th ACM/IEEE International Symposium on Empirical …, 2018
612018
A qualitative study of dependency management and its security implications
I Pashchenko, DL Vu, F Massacci
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
302020
Typosquatting and combosquatting attacks on the python ecosystem
DL Vu, I Pashchenko, F Massacci, H Plate, A Sabetta
2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2020
232020
Vuln4real: A methodology for counting actually vulnerable dependencies
I Pashchenko, H Plate, SE Ponta, A Sabetta, F Massacci
IEEE Transactions on Software Engineering, 2020
212020
Towards using source code repositories to identify software supply chain attacks
DL Vu, I Pashchenko, F Massacci, H Plate, A Sabetta
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
192020
Lastpymile: identifying the discrepancy between sources and packages
DL Vu, F Massacci, I Pashchenko, H Plate, A Sabetta
Proceedings of the 29th ACM Joint Meeting on European Software Engineering …, 2021
132021
Delta-bench: differential benchmark for static analysis security testing tools
I Pashchenko, S Dashevskyi, F Massacci
2017 ACM/IEEE International Symposium on Empirical Software Engineering and …, 2017
132017
A fine-grained data set and analysis of tangling in bug fixing commits
S Herbold, A Trautsch, B Ledel, A Aghamohammadi, TA Ghaleb, ...
Empirical Software Engineering 27 (6), 1-49, 2022
82022
Large-scale manual validation of bug fixing commits: A fine-grained analysis of tangling
S Herbold, A Trautsch, B Ledel, A Aghamohammadi, TA Ghaleb, ...
arXiv preprint arXiv:2011.06244, 2020
72020
Technical leverage in a software ecosystem: Development opportunities and security risks
F Massacci, I Pashchenko
2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE …, 2021
62021
TaintBench: Automatic real-world malware benchmarking of Android taint analyses
L Luo, F Pauck, G Piskachev, M Benz, I Pashchenko, M Mory, E Bodden, ...
Empirical Software Engineering 27 (1), 1-41, 2022
32022
Secure software development in the era of fluid multi-party open software and services
I Pashchenko, R Scandariato, A Sabetta, F Massacci
2021 IEEE/ACM 43rd International Conference on Software Engineering: New …, 2021
32021
FOSS version differentiation as a benchmark for static analysis security testing tools
I Pashchenko
Proceedings of the 2017 11th Joint Meeting on Foundations of Software …, 2017
32017
Please hold on: more time= more patches? Automated program repair as anytime algorithms
DL Vu, I Pashchenko, F Massacci
2021 IEEE/ACM International Workshop on Automated Program Repair (APR), 9-10, 2021
22021
Preliminary Findings on FOSS Dependencies and Security: A Qualitative Study on Developers’ Attitudes and Experience
I Pashchenko, DL Vu, F Massacci
2020 IEEE/ACM 42nd International Conference on Software Engineering …, 2020
22020
Decision Support of Security Assessment of Software Vulnerabilities in Industrial Practice
I Pashchenko
University of Trento, 2019
22019
Technical Leverage: Dependencies Are a Mixed Blessing.
F Massacci, I Pashchenko
IEEE Secur. Priv. 19 (3), 58-62, 2021
12021
Lightweight Parsing and Slicing for Bug Identification in C
L Mecenero, R Paramitha, I Pashchenko, F Massacci
Proceedings of the 17th International Conference on Availability …, 2022
2022
Security Maturity Self-Assessment Framework for Software Development Lifecycle
R Brasoveanu, Y Karabulut, I Pashchenko
Proceedings of the 17th International Conference on Availability …, 2022
2022
Machine Learning for Source Code Vulnerability Detection: What Works and What Isn't There Yet
T Marjanov, I Pashchenko, F Massacci
IEEE Security & Privacy, 2-18, 2022
2022
The system can't perform the operation now. Try again later.
Articles 1–20