Laurie Williams
North Carolina State University
H-index: 77
North America-United States
Top articles of Laurie Williams
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Shifting the Lens: Detecting Malware in npm Ecosystem with Large Language Models | arXiv preprint arXiv:2403.12196 | Nusrat Zahan Philipp Burckhardt Mikola Lysenko Feross Aboukhadijeh Laurie Williams | 2024/3/18 |
Proactive Software Supply Chain Risk Management Framework (P-SSCRM) Version 1 | arXiv preprint arXiv:2404.12300 | Laurie Williams Sammy Migues Jamie Boote Ben Hutchison | 2024/4/18 |
Mining Temporal Attack Patterns from Cyberthreat Intelligence Reports | arXiv preprint arXiv:2401.01883 | Md Rayhanur Rahman Brandon Wroblewski Quinn Matthews Brantley Morgan Tim Menzies | 2024/1/3 |
Narrowing the Software Supply Chain Attack Vectors: The SSDF Is Wonderful but not Enough | IEEE Security & Privacy | Laurie Williams | 2024/4/2 |
Attackers reveal their arsenal: An investigation of adversarial techniques in CTI reports | arXiv preprint arXiv:2401.01865 | Md Rayhanur Rahman Setu Kumar Basak Rezvan Mahdavi Hezaveh Laurie Williams | 2024/1/3 |
AssetHarvester: A Static Analysis Tool for Detecting Assets Protected by Secrets in Software Artifacts | arXiv preprint arXiv:2403.19072 | Setu Kumar Basak K Virgil English Ken Ogura Vitesh Kambara Bradley Reaves | 2024/3/28 |
A Survey on Software Vulnerability Exploitability Assessment | Sarah Elder Rayhanur Rahman Gage Fringer Kunal Kapoor Laurie Williams | 2024 | |
Characterizing Dependency Update Practice of NPM, PyPI and Cargo Packages | arXiv preprint arXiv:2403.17382 | Imranur Rahman Nusrat Zahan Stephen Magill William Enck Laurie Williams | 2024/3/26 |
Just another copy and paste? Comparing the security vulnerabilities of ChatGPT generated code and StackOverflow answers | arXiv preprint arXiv:2403.15600 | Sivana Hamer Marcelo d'Amorim Laurie Williams | 2024/3/22 |
What Challenges Do Developers Face About Checked-in Secrets in Software Artifacts? | Setu Kumar Basak Lorenzo Neil Bradley Reaves Laurie Williams | 2023/5/14 | |
S3C2 Summit 2202-09: Industry Secure Suppy Chain Summit | arXiv preprint arXiv:2307.15642 | Mindy Tran Yasemin Acar Michel Cucker William Enck Alexandros Kapravelos | 2023/7/28 |
Empirical Evaluation of Secure Development Processes | Dagstuhl Reports | Adam Shostack Matthew Smith Sam Weber Mary Ellen Zurko | 2020/2 |
Software bills of materials are required. are we there yet? | Nusrat Zahan Elizabeth Lin Mahzabin Tamanna William Enck Laurie Williams | 2023/4/14 | |
Openssf scorecard: On the path toward ecosystem-wide automated security metrics | IEEE Security & Privacy | Nusrat Zahan Parth Kanakiya Brian Hambleton Shohanuzzaman Shohan Laurie Williams | 2023/6/26 |
A Comparative Study of Software Secrets Reporting by Secret Detection Tools | Setu Kumar Basak Jamison Cox Bradley Reaves Laurie Williams | 2023/10/26 | |
What are the attackers doing now? Automating cyberthreat intelligence extraction from text on pace with the changing threat landscape: A survey | Md Rayhanur Rahman Rezvan Mahdavi-Hezaveh Laurie Williams | 2021 | |
Trusting code in the wild: A social network-based centrality rating for developers in the Rust ecosystem | arXiv preprint arXiv:2306.00240 | Nasif Imtiaz Preya Shabrina Laurie Williams | 2023/5/31 |
Are your dependencies code reviewed?: Measuring code review coverage in dependency updates | IEEE Transactions on Software Engineering | Nasif Imtiaz Laurie Williams | 2023 |
Looking Backwards (and Forwards): NSF Secure and Trustworthy Computing 20-Year Retrospective Panel Transcription | IEEE Security & Privacy | Carl Landwehr Michael K Reiter Laurie Williams Gene Tsudik Trent Jaeger | 2023/1/24 |
SecretBench: A Dataset of Software Secrets | Setu Kumar Basak Lorenzo Neil Bradley Reaves Laurie Williams | 2023/5/15 |