A qualitative study of dependency management and its security implications I Pashchenko, DL Vu, F Massacci Proceedings of the 2020 ACM SIGSAC conference on computer and communications …, 2020 | 97 | 2020 |
HIT4Mal: Hybrid image transformation for malware classification DL Vu, TK Nguyen, TV Nguyen, TN Nguyen, F Massacci, PH Phung Transactions on Emerging Telecommunications Technologies, 2019 | 92 | 2019 |
A convolutional transformation network for malware classification DL Vu, TK Nguyen, TV Nguyen, TN Nguyen, F Massacci, PH Phung 2019 6th NAFOSTED conference on information and computer science (NICS), 234-239, 2019 | 69 | 2019 |
Typosquatting and combosquatting attacks on the python ecosystem DL Vu, I Pashchenko, F Massacci, H Plate, A Sabetta 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2020 | 59 | 2020 |
Towards using source code repositories to identify software supply chain attacks DL Vu, I Pashchenko, F Massacci, H Plate, A Sabetta Proceedings of the 2020 ACM SIGSAC conference on computer and communications …, 2020 | 58 | 2020 |
LastPyMile: Identifying the Discrepancy between Sources and Packages DL Vu, I Pashchenko, F Massacci, H Plate, A Sabetta In Proceedings of the 29th ACM Joint Meeting on European Software …, 2021 | 51 | 2021 |
On the feasibility of detecting injections in malicious npm packages S Scalco, R Paramitha, DL Vu, F Massacci Proceedings of the 17th International Conference on Availability …, 2022 | 25 | 2022 |
py2src: Towards the Automatic (and Reliable) Identification of Sources for PyPI Package DL Vu 2021 36th IEEE/ACM International Conference on Automated Software …, 2021 | 13 | 2021 |
Bad Snakes: Understanding and Improving Python Package Index Malware Scanning DL Vu, Z Newman, JS Meyers Proceedings of the 2023 IEEE/ACM International Conference on Software …, 2023 | 11 | 2023 |
Mac-A-Mal: macOS malware analysis framework resistant to anti evasion techniques DP Pham, DL Vu, F Massacci Journal of Computer Virology and Hacking Techniques 15, 249-257, 2019 | 9 | 2019 |
A benchmark comparison of python malware detection approaches DL Vu, Z Newman, JS Meyers arXiv preprint arXiv:2209.13288, 2022 | 7 | 2022 |
An efficient neural network model for time series forecasting of malware TK Nguyen, DL Vu, SO Hwang Journal of Intelligent & Fuzzy Systems, 1-1, 2018 | 6 | 2018 |
A fork of Bandit tool with patterns to identifying malicious python code DL Vu | 5 | 2022 |
APR4Vul: an empirical study of automatic program repair techniques on real-world Java vulnerabilities QC Bui, R Paramitha, DL Vu, F Massacci, R Scandariato Empirical software engineering 29 (1), 18, 2024 | 4 | 2024 |
Please hold on: more time= more patches? Automated program repair as anytime algorithms DL Vu, I Pashchenko, F Massacci 2021 IEEE/ACM International Workshop on Automated Program Repair (APR), 2021 | 4 | 2021 |
Lastpymile replication package DL Vu, I Pashchenko, F Massacci, H Plate, A Sabetta https://doi.org/10.5281/zenodo.4899935, 2021 | 3 | 2021 |
Preliminary Findings on FOSS Dependencies and Security: A Qualitative Study on Developers’ Attitudes and Experience I Pashchenko, DL Vu, F Massacci 2020 IEEE/ACM 42nd International Conference on Software Engineering …, 2020 | 3 | 2020 |
DeepMal: Deep Convolutional and Recurrent Neural Networks for Malware Classification DL Vu, NT Kha, SO Hwang Technical Report, 2017 | 3 | 2017 |
Towards Understanding and Securing the OSS Supply Chain DL Vu Ph.D. Thesis, University of Trento, Italy, 2022 | 2* | 2022 |
Effective feature selection based on MANOVA TK Nguyen, DL Vu, SO Hwang International Journal of Internet Technology and Secured Transactions 10 (4 …, 2020 | 2 | 2020 |