Vulnerably (Mis)Configured? Exploring 10 Years of Developers' Q&As on Stack Overflow
Abstract
References
Index Terms
- Vulnerably (Mis)Configured? Exploring 10 Years of Developers' Q&As on Stack Overflow
Recommendations
Are Comments on Stack Overflow Well Organized for Easy Retrieval by Developers?
Continuous Special Section: AI and SEMany Stack Overflow answers have associated informative comments that can strengthen them and assist developers. A prior study found that comments can provide additional information to point out issues in their associated answer, such as the ...
A New Class of Buffer Overflow Attacks
ICDCS '11: Proceedings of the 2011 31st International Conference on Distributed Computing SystemsIn this paper, we focus on a class of buffer overflow vulnerabilities that occur due to the "placement new'' expression in C++. "Placement new'' facilitates placement of an object/array at a specific memory location. When appropriate bounds checking is ...
Mitigating security attacks in kubernetes manifests for security best practices violation
ESEC/FSE 2021: Proceedings of the 29th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software EngineeringKubernetes is an open-source software system that helps practitioners in automatically deploying, scaling, and managing containerized applications. Information technology (IT) organizations, such as IBM, Spotify, and Capital One, use Kubernetes to ...
Comments
Information & Contributors
Information
Published In
![cover image ACM Other conferences](/cms/asset/799ddba3-a6b2-4163-b20f-f48d7d585b72/3634713.cover.jpg)
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Badges
Author Tags
Qualifiers
- Research-article
- Research
- Refereed limited
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 105Total Downloads
- Downloads (Last 12 months)105
- Downloads (Last 6 weeks)5
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign inFull Access
View options
View or Download as a PDF file.
PDFeReader
View online with eReader.
eReaderHTML Format
View this article in HTML Format.
HTML Format