Cited By
View all- Rahman AParnin C(2023)Detecting and Characterizing Propagation of Security Weaknesses in Puppet-Based Infrastructure ManagementIEEE Transactions on Software Engineering10.1109/TSE.2023.326596249:6(3536-3553)Online publication date: 1-Jun-2023
- Pan ZChen YChen YShen YLi Y(2022)LogInjector: Detecting Web Application Log Injection VulnerabilitiesApplied Sciences10.3390/app1215768112:15(7681)Online publication date: 30-Jul-2022
- Wu JZhao JFu J(2022)A Static Method to Discover Deserialization Gadget Chains in Java ProgramsProceedings of the 2022 2nd International Conference on Control and Intelligent Robotics10.1145/3548608.3559310(800-805)Online publication date: 24-Jun-2022
- Show More Cited By