1 code implementation • 25 Feb 2019 • Markus Zimmermann, Cristian-Alexandru Staicu, Cam Tenny, Michael Pradel
Studying the potential for running vulnerable or malicious code due to third-party dependencies, we find that individual packages could impact large parts of the entire ecosystem.
Cryptography and Security