Pycg: Practical call graph generation in python V Salis, T Sotiropoulos, P Louridas, D Spinellis, D Mitropoulos 2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE …, 2021 | 86 | 2021 |
VulinOSS: a dataset of security vulnerabilities in open-source systems A Gkortzis, D Mitropoulos, D Spinellis Proceedings of the 15th International conference on mining software …, 2018 | 84 | 2018 |
Defending against web application attacks: Approaches, challenges and implications D Mitropoulos, P Louridas, M Polychronakis, AD Keromytis IEEE Transactions on Dependable and Secure Computing 16 (2), 188-203, 2017 | 80 | 2017 |
POSIX abstractions in modern operating systems: The old, the new, and the missing V Atlidakis, J Andrus, R Geambasu, D Mitropoulos, J Nieh Proceedings of the Eleventh European Conference on Computer Systems, 1-17, 2016 | 76 | 2016 |
CrossVul: a cross-language vulnerability dataset with commit data G Nikitopoulos, K Dritsa, P Louridas, D Mitropoulos Proceedings of the 29th ACM Joint Meeting on European Software Engineering …, 2021 | 63 | 2021 |
The bug catalog of the maven ecosystem D Mitropoulos, V Karakoidas, P Louridas, G Gousios, D Spinellis Proceedings of the 11th Working Conference on Mining Software Repositories …, 2014 | 44 | 2014 |
SDriver: Location-specific signatures prevent SQL injection attacks D Mitropoulos, D Spinellis computers & security 28 (3-4), 121-129, 2009 | 44 | 2009 |
Fatal injection: A survey of modern code injection attack countermeasures D Mitropoulos, D Spinellis PeerJ Computer Science 3, e136, 2017 | 33 | 2017 |
How to train your browser: Preventing XSS attacks using contextual script fingerprints D Mitropoulos, K Stroggylos, D Spinellis, AD Keromytis ACM Transactions on Privacy and Security (TOPS) 19 (1), 1-31, 2016 | 32 | 2016 |
Practical fault detection in puppet programs T Sotiropoulos, D Mitropoulos, D Spinellis Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020 | 31 | 2020 |
Smart contract and defi security: Insights from tool evaluations and practitioner surveys S Chaliasos, MA Charalambous, L Zhou, R Galanopoulou, A Gervais, ... arXiv preprint arXiv:2304.02981, 2023 | 28 | 2023 |
Well-typed programs can go wrong: A study of typing-related bugs in jvm compilers S Chaliasos, T Sotiropoulos, GP Drosos, C Mitropoulos, D Mitropoulos, ... Proceedings of the ACM on Programming Languages 5 (OOPSLA), 1-30, 2021 | 28 | 2021 |
Finding typing compiler bugs S Chaliasos, T Sotiropoulos, D Spinellis, A Gervais, B Livshits, ... Proceedings of the 43rd ACM SIGPLAN International Conference on Programming …, 2022 | 26 | 2022 |
Charting the API minefield using software telemetry data M Kechagia, D Mitropoulos, D Spinellis Empirical Software Engineering 20, 1785-1830, 2015 | 26 | 2015 |
Data-oriented differential testing of object-relational mapping systems T Sotiropoulos, S Chaliasos, V Atlidakis, D Mitropoulos, D Spinellis 2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE …, 2021 | 22 | 2021 |
Smart Contract and DeFi Security Tools: Do They Meet the Needs of Practitioners? S Chaliasos, MA Charalambous, L Zhou, R Galanopoulou, A Gervais, ... Proceedings of the 46th IEEE/ACM International Conference on Software …, 2024 | 21 | 2024 |
Dismal code: Studying the evolution of security bugs D Mitropoulos, V Karakoidas, P Louridas, G Gousios, D Spinellis LASER 2013 (LASER 2013), 37-48, 2013 | 20 | 2013 |
Time present and time past: analyzing the evolution of JavaScript code in the wild D Mitropoulos, P Louridas, V Salis, D Spinellis 2019 IEEE/ACM 16th International Conference on Mining Software Repositories …, 2019 | 19 | 2019 |
Measuring the occurrence of security-related bugs through software evolution D Mitropoulos, G Gousios, D Spinellis 2012 16th Panhellenic Conference on Informatics, 117-122, 2012 | 18 | 2012 |
Countering code injection attacks: a unified approach D Mitropoulos, V Karakoidas, P Louridas, D Spinellis Information Management & Computer Security 19 (3), 177-194, 2011 | 18 | 2011 |