Follow
Henrik Plate
Henrik Plate
Security Researcher, Endor Labs
Verified email at endor.ai
Title
Cited by
Year
4.12 Breakout Session “Tensions between Industry and Academic Objectives”
D Wermke, H Plate
Empirical Evaluation of Secure Development Processes, 18, 2023
2023
A manually-curated dataset of fixes to vulnerabilities of open-source software
SE Ponta, H Plate, A Sabetta, M Bezzi, C Dangremont
2019 IEEE/ACM 16th International Conference on Mining Software Repositories …, 2019
1242019
A manually-curated dataset of fixes to vulnerabilities of open-source software. In 2019 IEEE/ACM 16th International Conference on Mining Software Repositories (MSR)
SE Ponta, H Plate, A Sabetta, M Bezzi, C Dangremont
IEEE, 383ś387, 2019
322019
Assessing vulnerability impact using call graphs
H Plate, S Ponta, A Sabetta
US Patent 9,792,200, 2017
292017
Backstabber’s knife collection: A review of open source software supply chain attacks
M Ohm, H Plate, A Sykosch, M Meier
Detection of Intrusions and Malware, and Vulnerability Assessment: 17th …, 2020
2422020
Beyond metadata: Code-centric and usage-based analysis of known vulnerabilities in open-source software
SE Ponta, H Plate, A Sabetta
2018 IEEE International Conference on Software Maintenance and Evolution …, 2018
1092018
Code-based Vulnerability Detection in Node. js Applications: How far are we?
B Chinthanet, SE Ponta, H Plate, A Sabetta, RG Kula, T Ishio, ...
Proceedings of the 35th IEEE/ACM International Conference on Automated …, 2020
402020
Collaborative Workflow Management for eGovernment
C Wolter, H Plate, C Hebert
18th International Workshop on Database and Expert Systems Applications …, 2007
122007
Comparing encrypted documents having structured data
MA Rahaman, A Schaad, H Plate, Y Roudier
US Patent 8,726,151, 2014
452014
Configuration assessment as a service
MM Casalino, H Plate, SE Ponta
International Workshop on Data Privacy Management, 217-226, 2012
22012
Detecting malicious components using commit histories
H Plate
US Patent 11,853,422, 2023
12023
Detection of configuration vulnerabilities in distributed (web) environments
MM Casalino, M Mangili, H Plate, SE Ponta
Security and Privacy in Communication Networks: 8th International ICST …, 2013
102013
Detection, assessment and mitigation of vulnerabilities in open source dependencies
SE Ponta, H Plate, A Sabetta
Empirical Software Engineering 25 (5), 3175-3215, 2020
922020
Identifying challenges for oss vulnerability scanners-a study & test suite
A Dann, H Plate, B Hermann, SE Ponta, E Bodden
IEEE Transactions on Software Engineering 48 (9), 3613-3625, 2021
302021
Identifying Challenges for OSS Vulnerability Scanners-A Study & Test Suite (Short Summary)
A Dann, H Plate, B Hermann, SE Ponta, E Bodden
Gesellschaft für Informatik eV, 2022
2022
Impact assessment for vulnerabilities in open-source software libraries
H Plate, SE Ponta, A Sabetta
2015 IEEE International Conference on Software Maintenance and Evolution …, 2015
1192015
Increasing Trust in the Cloud through Configuration Validation
MM Casalino, H Plate, SE Ponta
OTM Confederated International Conferences" On the Move to Meaningful …, 2014
12014
Integrating advanced security certification and policy management
M Bezzi, E Damiani, S Paraboschi, H Plate
Cyber Security and Privacy: Trust in the Digital World and Cyber Security …, 2013
22013
LastPyMile: identifying the discrepancy between sources and packages
DL Vu, F Massacci, I Pashchenko, H Plate, A Sabetta
Proceedings of the 29th ACM Joint Meeting on European Software Engineering …, 2021
562021
Less Is More: A Mixed-Methods Study on Security-Sensitive API Calls in Java for Better Dependency Selection
I Rahman, R Paramitha, H Plate, D Wermke, L Williams
arXiv preprint arXiv:2408.02846, 2024
2024
The system can't perform the operation now. Try again later.
Articles 1–20