
D
¨
orre, F. and Klebanov, V. (2016). Practical Detection of
Entropy Loss in Pseudo-Random Number Generators.
ACM SIGSAC Conference on Computer and Commu-
nications Security, 23:678–689.
dos Santos, E. W. and Nunes, I. (2018). Investigating the
effectiveness of peer code review in distributed soft-
ware development based on objective and subjective
data. Journal of Software Engineering Research and
Development, 6:14.
Enck, W. and Williams, L. (2022). Top Five Challenges in
Software Supply Chain Security: Observations From
30 Industry and Government Organizations. IEEE Se-
curity & Privacy, 20:96–100.
Everson, D., Cheng, L., and Zhang, Z. (2022). Log4shell:
Redefining the Web Attack Surface. Workshop on
Measurements, Attacks, and Defenses for the Web
(MADWeb), 4:23010:1–8.
Ferrante, D. (2006). Software Licensing Models: What’s
Out There? IT Professional, 8:24–29.
Greiler, M., Herzig, K., and Czerwonka, J. (2015). Code
Ownership and Software Quality: A Replication
Study. IEEE/ACM Working Conference on Mining
Software Repositories, 12:2–12.
Islam, S., Gaikovina Kula, R., Treude, C., Chinthanet, B.,
Ishio, T., and Matsumoto, K. (2023). An Empirical
Study of Package Management Issues via Stack Over-
flow. IEICE Transactions on Information and Sys-
tems, E106-D:138–147.
Leino, K. R. M. (2013). Developing Verified Programs with
Dafny. International Conference on Software Engi-
neering, ICSE, 35:1488–1490.
Livshits, B., Sridharan, M., Smaragdakis, Y., Lhot
´
ak, O.,
Amaral, J. N., Chang, B. E., Guyer, S. Z., Khedker,
U. P., Møller, A., and Vardoulakis, D. (2015). In de-
fense of soundiness: a manifesto. Communications of
the ACM, 58:44–46.
Malavolta, I., Nirghin, K., Scoccia, G. L., Romano, S.,
Lombardi, S., Scanniello, G., and Lago, P. (2023).
JavaScript Dead Code Identification, Elimination, and
Empirical Assessment. IEEE Transactions on Soft-
ware Engineering, 49:3692–3714.
Mart
´
ınez, J. and Dur
´
an, J. M. (2021). Software supply chain
attacks, a threat to global cybersecurity: SolarWinds’
case study. International Journal of Safety and Secu-
rity Engineering, 11:537–545.
McIntosh, S., Kamei, Y., Adams, B., and Hassan, A. E.
(2014). The impact of code review coverage and code
review participation on software quality: a case study
of the qt, VTK, and ITK projects. Working Conference
on Mining Software Repositories, 11:192–201.
Meyer, B. (1992). Applying “Design by Contract”. IEEE
Computer, 25:40–51.
Mooduto, A., Rijanto, E., and Pamuji, G. C. (2023). Op-
timization of Software Development Automation via
CICD, Dependency Track, and AWS CodePipeline
Integration. International Conference on Informatics
Engineering, Science & Technology, 1:1–7.
Neupane, S., Holmes, G., Wyss, E., Davidson, D., and
Carli, L. D. (2023). Beyond Typosquatting: An In-
depth Look at Package Confusion. USENIX Security
Symposium, 32:3439–3456.
Open Worldwide Application Security Project (2020). Soft-
ware Component Verification Standard. OWASP
Foundation, 1st edition.
Parlog, N. (2019). The Java Module System. Manning Pub-
lications, 1st edition.
Pashchenko, I., Vu, D.-L., and Massacci, F. (2020). A
Qualitative Study of Dependency Management and Its
Security Implications. ACM SIGSAC Conference on
Computer and Communications Security, 27:1513–
1531.
Payne, A. and Frow, P. (2016). The Marketing Book. Taylor
& Francis Group, 7th edition.
Pricop, E., Fattahi, J., Dutta, N., and Ibrahim, M. (2020).
Recent Developments on Industrial Control Systems
Resilience. Springer Cham, 1st edition.
Richards, M. and Ford, N. (2020). Fundamentals of
Software Architecture – An Engineering Approach.
O’Reilly Media, Inc, 1st edition.
Romano, S., Vendome, C., Scanniello, G., and Poshyvanyk,
D. (2020). A Multi-Study Investigation into Dead
Code. IEEE Transactions on Software Engineering,
46:71–99.
Rossel, S. (2017). Continuous Integration, Delivery, and
Deployment: Reliable and faster software releases
with automating builds, tests, and deployment. Packt
Publishing Ltd., 1st edition.
Shu, R., Wang, P., Gorski III, S. A., Andow, B., Nadkarni,
A., Deshotels, L., Gionta, J., Enck, W., and Gu, X.
(2016). A Study of Security Isolation Techniques.
ACM Computing Surveys, 49:50:1–37.
Tran, N. K., Pallewatta, S., and Babar, M. A. (2024).
An Empirically Grounded Reference Architecture for
Software Supply Chain Metadata Management. Inter-
national Conference on Evaluation and Assessment in
Software Engineering, 28:38–47.
Vaniea, K. and Rashidi, Y. (2016). Tales of Software Up-
dates: The process of updating software. Conference
on Human Factors in Computing Systems, 35:3215–
3226.
Watada, J., Roy, A., Kadikar, R., Pham, H., and Xu, B.
(2019). Emerging Trends, Techniques and Open Is-
sues of Containerization: A Review. IEEE Access,
7:152443–152472.
Wieland, A. and Wallenburg, C. M. (2015). Dealing with
supply chain risks: Linking risk management prac-
tices and strategies to performance. International
Journal of Physical Distribution & Logistics Manage-
ment, 42:887–905.
Xia, B., Bi, T., Xing, Z., Lu, Q., and Zhu, L. (2023). An
Empirical Study on Software Bill of Materials: Where
We Stand and the Road Ahead. IEEE/ACM Inter-
national Conference on Software Engineering (ICSE),
45:2630–2642.
Zahan, N., Lin, E., Tamanna, M., Enck, W., and Williams,
L. (2023). Software Bills of Materials Are Required.
Are We There Yet? IEEE Security & Privacy, 21:82–
88.
ENASE 2025 - 20th International Conference on Evaluation of Novel Approaches to Software Engineering
634