POSIX abstractions in modern operating systems: The old, the new, and the missing V Atlidakis, J Andrus, R Geambasu, D Mitropoulos, J Nieh Proceedings of the Eleventh European Conference on Computer Systems, 1-17, 2016 | 64 | 2016 |
VulinOSS: a dataset of security vulnerabilities in open-source systems A Gkortzis, D Mitropoulos, D Spinellis Proceedings of the 15th International conference on mining software …, 2018 | 57 | 2018 |
Defending against web application attacks: approaches, challenges and implications D Mitropoulos, P Louridas, M Polychronakis, AD Keromytis IEEE Transactions on Dependable and Secure Computing 16 (2), 188-203, 2017 | 54 | 2017 |
SDriver: Location-specific signatures prevent SQL injection attacks D Mitropoulos, D Spinellis computers & security 28 (3-4), 121-129, 2009 | 44 | 2009 |
The bug catalog of the maven ecosystem D Mitropoulos, V Karakoidas, P Louridas, G Gousios, D Spinellis Proceedings of the 11th Working Conference on Mining Software Repositories …, 2014 | 43 | 2014 |
How to train your browser: Preventing XSS attacks using contextual script fingerprints D Mitropoulos, K Stroggylos, D Spinellis, AD Keromytis ACM Transactions on Privacy and Security (TOPS) 19 (1), 1-31, 2016 | 29 | 2016 |
Pycg: Practical call graph generation in python V Salis, T Sotiropoulos, P Louridas, D Spinellis, D Mitropoulos 2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE …, 2021 | 27 | 2021 |
Charting the API minefield using software telemetry data M Kechagia, D Mitropoulos, D Spinellis Empirical Software Engineering 20 (6), 1785-1830, 2015 | 26 | 2015 |
Fatal injection: a survey of modern code injection attack countermeasures D Mitropoulos, D Spinellis PeerJ Computer Science 3, e136, 2017 | 21 | 2017 |
Dismal Code: Studying the Evolution of Security Bugs. D Mitropoulos, V Karakoidas, P Louridas, G Gousios, D Spinellis LASER, 37-48, 2013 | 20 | 2013 |
Measuring the occurrence of security-related bugs through software evolution D Mitropoulos, G Gousios, D Spinellis 2012 16th Panhellenic Conference on Informatics, 117-122, 2012 | 18 | 2012 |
Time present and time past: analyzing the evolution of JavaScript code in the wild D Mitropoulos, P Louridas, V Salis, D Spinellis 2019 IEEE/ACM 16th International Conference on Mining Software Repositories …, 2019 | 17 | 2019 |
Countering code injection attacks: a unified approach D Mitropoulos, V Karakoidas, P Louridas, D Spinellis Information Management & Computer Security 19 (3), 177-194, 2011 | 17 | 2011 |
Practical fault detection in puppet programs T Sotiropoulos, D Mitropoulos, D Spinellis Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020 | 16 | 2020 |
Fortifying applications against XPath injection attacks D Mitropoulos, V Karakoidas, D Spinellis | 16 | 2009 |
A type-safe embedding of SQL into Java using the extensible compiler framework J% V Karakoidas, D Mitropoulos, P Louridas, D Spinellis Computer Languages, Systems & Structures 41, 1-20, 2015 | 15 | 2015 |
CrossVul: a cross-language vulnerability dataset with commit data G Nikitopoulos, K Dritsa, P Louridas, D Mitropoulos Proceedings of the 29th ACM Joint Meeting on European Software Engineering …, 2021 | 12 | 2021 |
Generating the blueprints of the Java ecosystem V Karakoidas, D Mitropoulos, P Louridas, G Gousios, D Spinellis 2015 IEEE/ACM 12th Working Conference on Mining Software Repositories, 510-513, 2015 | 11 | 2015 |
Data-oriented differential testing of object-relational mapping systems T Sotiropoulos, S Chaliasos, V Atlidakis, D Mitropoulos, D Spinellis 2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE …, 2021 | 9 | 2021 |
Blogs M Kay, D Mitropoulos, W Richter, L Oehlberg, L Rosen XRDS: Crossroads, The ACM Magazine for Students 19 (1), 11-13, 2012 | 9 | 2012 |