2021
DOI: 10.1007/s10664-021-09959-3
|View full text |Cite
|
Sign up to set email alerts
|

Out of sight, out of mind? How vulnerable dependencies affect open-source projects

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 32 publications
(8 citation statements)
references
References 57 publications
0
8
0
Order By: Relevance
“…However, patching may not be as effective as removal. Scholars have found that developers are often tardy at updating SDR because of dependency complexity and passive legacy function management (Alfadel et al, 2023; Kula et al, 2018; Prana et al, 2021).…”
Section: Hypothesis Developmentmentioning
confidence: 99%
“…However, patching may not be as effective as removal. Scholars have found that developers are often tardy at updating SDR because of dependency complexity and passive legacy function management (Alfadel et al, 2023; Kula et al, 2018; Prana et al, 2021).…”
Section: Hypothesis Developmentmentioning
confidence: 99%
“…Several tools [11][12][13][14] have been proposed to address dependency conflicts and redundant dependencies in Python programs and Jar files. Li et al and Prana et al [15,16] studied dependency conflicts and dependency vulnerability respectively. To our knowledge, only Ye [2] paid attention to the build dependency and provides a way to sort the build order of source packages of Linux distributions.…”
Section: General Dependency (Gd)mentioning
confidence: 99%
“…Many existing works and tools have been proposed to demystify the impact of TPL vulnerabilities in different ecosystems. Some researchers [26,38,39,41] investigate the vulnerability impact and their life spans from the perspective of ecosystems, some researchers [31,34,35,42,50] conduct empirical studies on technical lags from the perspective of user projects (i.e., the delays of upgrading vulnerable dependencies). Tools like SCA (Software Composition Analysis) [24] are also proposed to identify TPL vulnerabilities in user projects.…”
Section: Introductionmentioning
confidence: 99%