
practices and github’s code search: A looming threat?
Journal of Systems and Software, 202:111698.
Guo, W., Xu, Z., Liu, C., Huang, C., Fang, Y., and Liu,
Y. (2023). An empirical study of malicious code in
pypi ecosystem. In 2023 38th IEEE/ACM Interna-
tional Conference on Automated Software Engineer-
ing (ASE), pages 166–177.
Gustavsson, T. (2020). Managing the open source depen-
dency. Computer, 53(2):83–87.
Haff, G. (2022). The State of Enterprise Open Source: A
Red Hat report. White paper, Red Hat.
Imtiaz, N. and Williams, L. (2023). Are your dependencies
code reviewed?: Measuring code review coverage in
dependency updates. IEEE Transactions on Software
Engineering, 49(11):4932–4945.
Kabir, M. M. A., Wang, Y., Yao, D., and Meng, N. (2022).
How do developers follow security-relevant best prac-
tices when using npm packages? In 2022 IEEE Se-
cure Development Conference (SecDev), pages 77–83.
IEEE.
Kaplan, B. and Qian, J. (2021). A survey on common
threats in npm and pypi registries. In Deployable Ma-
chine Learning for Security Defense: Second Interna-
tional Workshop, MLHat 2021, Virtual Event, August
15, 2021, Proceedings 2, pages 132–156. Springer.
Kikas, R., Gousios, G., Dumas, M., and Pfahl, D. (2017).
Structure and evolution of package dependency net-
works. In 2017 IEEE/ACM 14th International Confer-
ence on Mining Software Repositories (MSR), pages
102–112. IEEE.
Kluban, M., Mannan, M., and Youssef, A. (2022). On mea-
suring vulnerable javascript functions in the wild. In
Proceedings of the 2022 ACM on Asia Conference on
Computer and Communications Security, pages 917–
930.
Lakhan, S. E. and Jhunjhunwala, K. (2008). Open source
software in education. Educause Quarterly, 31(2):32.
Latendresse, J., Mujahid, S., Costa, D. E., and Shihab, E.
(2022). Not all dependencies are equal: An empirical
study on production dependencies in npm. In 37th
IEEE/ACM International Conference on Automated
Software Engineering, pages 1–12.
Liu, C., Chen, S., Fan, L., Chen, B., Liu, Y., and Peng,
X. (2022). Demystifying the vulnerability propaga-
tion and its evolution via dependency trees in the npm
ecosystem. In Proceedings of the 44th International
Conference on Software Engineering, pages 672–684.
Miller, C., K
¨
astner, C., and Vasilescu, B. (2023). ”we feel
like we’re winging it:” a study on navigating open-
source dependency abandonment. page 1281 – 1293.
Cited by: 2; All Open Access, Hybrid Gold Open Ac-
cess.
Nocera, S., Romano, S., Penta, M. D., Francese, R., and
Scanniello, G. (2023). Software bill of materials adop-
tion: A mining study from github. In 2023 IEEE In-
ternational Conference on Software Maintenance and
Evolution (ICSME), pages 39–49.
Pashchenko, I., Plate, H., Ponta, S. E., Sabetta, A., and Mas-
sacci, F. (2018). Vulnerable open source dependen-
cies: counting those that matter. In Proceedings of the
12th ACM/IEEE International Symposium on Empir-
ical Software Engineering and Measurement, ESEM
’18, New York, NY, USA. Association for Computing
Machinery.
Prana, G. A. A., Sharma, A., Shar, L. K., Foo, D., San-
tosa, A. E., Sharma, A., and Lo, D. (2021). Out of
sight, out of mind? how vulnerable dependencies af-
fect open-source projects. Empirical Software Engi-
neering, 26:1–34.
Scalco, S., Paramitha, R., Vu, D.-L., and Massacci, F.
(2022). On the feasibility of detecting injections in
malicious npm packages. In Proceedings of the 17th
International Conference on Availability, Reliability
and Security, pages 1–8.
Set
´
o-Rey, D., Santos-Mart
´
ın, J. I., and L
´
opez-Nozal, C.
(2023). Vulnerability of package dependency net-
works. IEEE Transactions on Network Science and
Engineering.
Simon, K. D. (2005). The value of open standards and open-
source software in government environments. IBM
Systems Journal, 44(2):227–238.
Wang, C., Wu, R., Song, H., Shu, J., and Li, G. (2023).
smartpip: A smart approach to resolving python de-
pendency conflict issues. In Proceedings of the 37th
IEEE/ACM International Conference on Automated
Software Engineering, ASE ’22, New York, NY, USA.
Association for Computing Machinery.
Williams, L. (2022). Trusting trust: Humans in the software
supply chain loop. IEEE Security & Privacy, 20(5):7–
10.
Xu, W., He, H., Gao, K., and Zhou, M. (2023). Un-
derstanding and remediating open-source license in-
compatibilities in the pypi ecosystem. In 2023 38th
IEEE/ACM International Conference on Automated
Software Engineering (ASE), pages 178–190.
Zerouali, A., Mens, T., Decan, A., and De Roover, C.
(2022). On the impact of security vulnerabilities in
the npm and rubygems dependency networks. Empir-
ical Software Engineering, 27(5):107.
Zimmermann, M., Staicu, C.-A., Tenny, C., and Pradel, M.
(2019). Small world with high risks: A study of secu-
rity threats in the npm ecosystem. In USENIX security
symposium, volume 17.
ICSOFT 2024 - 19th International Conference on Software Technologies
22