Although using third-party libraries has become prevalent in contemporary software development, developers often struggle to update their dependencies. Prior works acknowledge that due to the migration effort, priority and other issues cause lags in the migration process. The common assumption is that developers should drop all other activities and prioritize fixing the vulnerability. Our objective is to understand developer behavior when facing high-risk vulnerabilities in their code. We explore the prolific case of the Log4Shell, a vulnerability that has the highest severity rating ever, which received widespread media attention. Using a mixed-method approach, we analyze 219 GitHub Pull Requests (PR) and 354 issues belonging to 53 Maven ...
Context: Coordination is a fundamental tenet of software engineering. Coordination is required also ...
Software security plays a crucial role in the modern world governed by software. And while closed so...
Ideally, developers would always release code without bugs. Given the impossibility of achieving thi...
Traceability is one of the crucial features of a software application. Logging is considered one of ...
Modern software development involves the usage of external third-party software projects as direct d...
Software vulnerabilities are weaknesses in source code that can be potentially exploited to cause lo...
The critical remote-code-execution (RCE) Log4Shell is a severe vulnerability that was disclosed to t...
There is little or no information available on what actually happens when a software vulnerability i...
The massive demand of software systems brought about a growth in efficiency in software creation. As...
Known security vulnerabilities are introduced in software systems as a result of depending on third-...
Third-party library reuse has become common practice in contemporary software development, as it inc...
On 9 December 2021, the world was made aware of a new vulnerability identified as CVE-2021-44228, af...
Software vulnerabilities are the root cause of many computer system security failures. This disserta...
To what extent do investments in secure software engineering pay off? Right now, many development co...
Dependency maintenance is a critically important part of software development as vulnerabilities and...
Context: Coordination is a fundamental tenet of software engineering. Coordination is required also ...
Software security plays a crucial role in the modern world governed by software. And while closed so...
Ideally, developers would always release code without bugs. Given the impossibility of achieving thi...
Traceability is one of the crucial features of a software application. Logging is considered one of ...
Modern software development involves the usage of external third-party software projects as direct d...
Software vulnerabilities are weaknesses in source code that can be potentially exploited to cause lo...
The critical remote-code-execution (RCE) Log4Shell is a severe vulnerability that was disclosed to t...
There is little or no information available on what actually happens when a software vulnerability i...
The massive demand of software systems brought about a growth in efficiency in software creation. As...
Known security vulnerabilities are introduced in software systems as a result of depending on third-...
Third-party library reuse has become common practice in contemporary software development, as it inc...
On 9 December 2021, the world was made aware of a new vulnerability identified as CVE-2021-44228, af...
Software vulnerabilities are the root cause of many computer system security failures. This disserta...
To what extent do investments in secure software engineering pay off? Right now, many development co...
Dependency maintenance is a critically important part of software development as vulnerabilities and...
Context: Coordination is a fundamental tenet of software engineering. Coordination is required also ...
Software security plays a crucial role in the modern world governed by software. And while closed so...
Ideally, developers would always release code without bugs. Given the impossibility of achieving thi...