Approximating Attack Surfaces with Stack Traces C Theisen, K Herzig, P Morrison, B Murphy, L Williams Companion Proceedings of the 37th International Conference on Software …, 2015 | 71 | 2015 |
Attack surface definitions: A systematic literature review C Theisen, N Munaiah, M Al-Zyoud, JC Carver, A Meneely, L Williams Information and Software Technology 104, 94-103, 2018 | 64 | 2018 |
Improving vulnerability inspection efficiency using active learning Z Yu, C Theisen, L Williams, T Menzies IEEE Transactions on Software Engineering 47 (11), 2401-2420, 2019 | 51 | 2019 |
Risk-based attack surface approximation: how much data is enough? C Theisen, K Herzig, B Murphy, L Williams Software Engineering: Software Engineering in Practice Track (ICSE-SEIP …, 2017 | 27 | 2017 |
Better together: Comparing vulnerability prediction models C Theisen, L Williams Information and Software Technology 119, 106204, 2020 | 23 | 2020 |
Software security education at scale C Theisen, L Williams, K Oliver, E Murphy-Hill Software Engineering Companion (ICSE-C), IEEE/ACM International Conference …, 2016 | 14 | 2016 |
Software Engineering Research at the International Conference on Software Engineering in 2016 C Theisen, M Dunaiski, L Williams, W Visser ACM SIGSOFT Software Engineering Notes 42 (4), 1-7, 2018 | 12 | 2018 |
A Case Study of Software Security Red Teams at Microsoft J Smith, C Theisen, T Barik 2020 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC …, 2020 | 11 | 2020 |
Writing good software engineering research papers: revisited C Theisen, M Dunaiski, L Williams, W Visser Software Engineering Companion (ICSE-C), 2017 IEEE/ACM 39th International …, 2017 | 11 | 2017 |
Strengthening the Evidence that Attack Surfaces Can Be Approximated with Stack Traces C Theisen, L Williams North Carolina State University. Dept. of Computer Science, 2015 | 7 | 2015 |
Cost-aware vulnerability prediction: the HARMLESS approach Z Yu, C Theisen, H Sohn, L Williams, T Menzies CoRR abs/1803.06545, 2018 | 6 | 2018 |
Teaching Secure Software Development Through an Online Course C Theisen, T Zhu, K Oliver, L Williams Secure Software Engineering in DevOps and Agile Development 1977, 2017 | 5 | 2017 |
How bad is it, really? an analysis of severity scores for vulnerabilities: poster C Theisen, L Williams Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the …, 2018 | 3 | 2018 |
Automated attack surface approximation C Theisen Proceedings of the 2015 10th Joint Meeting on Foundations of Software …, 2015 | 3 | 2015 |
BP: Profiling Vulnerabilities on the Attack Surface C Theisen, H Sohn, D Tripp, L Williams 2018 IEEE Cybersecurity Development (SecDev), 110-119, 2018 | 2 | 2018 |
Reusing stack traces: automated attack surface approximation C Theisen Proceedings of the 38th International Conference on Software Engineering …, 2016 | 1 | 2016 |
Risk-Based Attack Surface Approximation C Theisen ACM Student Research Competition Grand Finals, 2016 | 1 | 2016 |
Poster: Risk-based attack surface approximation C Theisen, L Williams Proceedings of the Symposium and Bootcamp on the Science of Security, 121-123, 2016 | | 2016 |
Stack traces reveal attack surfaces C Theisen, L Williams Perspectives on Data Science for Software Engineering, 73-76, 2016 | | 2016 |