skip to main content
10.1145/3549035acmconferencesBook PagePublication PagesfseConference Proceedingsconference-collections
MSR4P&S 2022: Proceedings of the 1st International Workshop on Mining Software Repositories Applications for Privacy and Security
ACM2022 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
MSR4P&S '22: 1st International Workshop on Mining Software Repositories Applications for Privacy and Security Singapore Singapore 18 November 2022
ISBN:
978-1-4503-9457-4
Published:
09 November 2022
Sponsors:
SIGSOFT, NUS

Reflects downloads up to 24 Oct 2024Bibliometrics
Skip Abstract Section
Abstract

On behalf of the Program Committee, we are pleased to present the proceedings of the 1st International Workshop on Mining Software Repositories for Privacy and Security (MSR4P&S 2022). MSR4P&S is co-located with the ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE). This year, because of the Covid-19 pandemic, MSR4P&S (as part of ESEC/FSE) is held virtually with an adapted program that will bring together international researchers to exchange ideas, share experiences, investigate problems, and propose promising solutions concerning the application of Mining Software Repositories (MSR) to investigate the different stages of privacy and security. The workshop topics cover a wide range of MSR applications for cybersecurity research, including empirical and mixed-method approaches, as well as datasets and tools.

Skip Table Of Content Section
SESSION: Keynote
invited-talk
Mining software repositories for security: data quality issues lessons from trenches (keynote)

Software repositories are an attractive source of data for understanding the burning security issues challenging developers, anecdotal solutions, and building AI/ML-based models and tools. That is why there is exponential growth in the literature based ...

SESSION: Assessing Privacy
short-paper
Mining software repositories for patternizing attack-and-defense co-evolution

Several evidence indicates that malicious cyber actors learn, adapt, or, in other words, react to the defensive measures put into place by the cybersecurity community, as much as system defenders react to attacks. To this end, this research aims to mine ...

research-article
Assessing software privacy using the privacy flow-graph

We increasingly rely on digital services and the conveniences they provide. Processing of personal data is integral to such services and thus privacy and data protection are a growing concern, and governments have responded with regulations such as the ...

SESSION: Vulnerabilities
short-paper
An exploratory study on the relationship of smells and design issues with software vulnerabilities

Software vulnerabilities are one of the leading causes of the loss of confidential data resulting in financial damages in the industry. As a result, software companies strive to discover potential vulnerabilities before the software is deployed. While ...

research-article
Public Access
Counterfeit object-oriented programming vulnerabilities: an empirical study in Java

Many modern applications rely on Object-Oriented (OO) design principles, where the basic system components are objects and classes. They share objects with other processes, store them in disk/files for future retrieval or transport them over network to ...

short-paper
SecurityEval dataset: mining vulnerability examples to evaluate machine learning-based code generation techniques

Automated source code generation is currently a popular machine-learning-based task. It can be helpful for software developers to write functionally correct code from a given context. However, just like human developers, a code generation model can ...

Please enable JavaScript to view thecomments powered by Disqus.

Recommendations