ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1811.00918
  4. Cited By
Thou Shalt Not Depend on Me: Analysing the Use of Outdated JavaScript
  Libraries on the Web
v1v2 (latest)

Thou Shalt Not Depend on Me: Analysing the Use of Outdated JavaScript Libraries on the Web

2 November 2018
Tobias Lauinger
Abdelberi Chaabane
Sajjad Arshad
William K. Robertson
Christo Wilson
E. Kirda
ArXiv (abs)PDFHTML

Papers citing "Thou Shalt Not Depend on Me: Analysing the Use of Outdated JavaScript Libraries on the Web"

20 / 20 papers shown
Title
An Empirical Study of JavaScript Inclusion Security Issues in Chrome Extensions
An Empirical Study of JavaScript Inclusion Security Issues in Chrome Extensions
Chong Guan
40
0
0
26 May 2025
An Industry Interview Study of Software Signing for Supply Chain Security
An Industry Interview Study of Software Signing for Supply Chain Security
Kelechi G. Kalu
Tanya Singla
C. Okafor
Santiago Torres-Arias
James C. Davis
113
7
0
12 Jun 2024
COOKIEGUARD: Characterizing and Isolating the First-Party Cookie Jar
COOKIEGUARD: Characterizing and Isolating the First-Party Cookie Jar
Pouneh Nikkhah Bahrami
Aurore Fass
Zubair Shafiq
152
1
0
08 Jun 2024
Study of JavaScript Static Analysis Tools for Vulnerability Detection in
  Node.js Packages
Study of JavaScript Static Analysis Tools for Vulnerability Detection in Node.js Packages
Tiago Brito
Mafalda Ferreira
M. Monteiro
Pedro Lopes
Miguel Barros
J. Santos
Nuno Santos
25
13
0
12 Jan 2023
CHRONOS: Time-Aware Zero-Shot Identification of Libraries from
  Vulnerability Reports
CHRONOS: Time-Aware Zero-Shot Identification of Libraries from Vulnerability Reports
Yu-zeng Lyu
Thanh Le-Cong
Hong Jin Kang
Ratnadira Widyasari
Zhipeng Zhao
X. Le
Ming Li
David Lo
90
18
0
10 Jan 2023
XSS for the Masses: Integrating Security in a Web Programming Course
  using a Security Scanner
XSS for the Masses: Integrating Security in a Web Programming Course using a Security Scanner
Lwin Khin Shar
Christopher M. Poskitt
Kyong Jin Shim
Li Wong
26
8
0
26 Apr 2022
A Study of Third-party Resources Loading on Web
A Study of Third-party Resources Loading on Web
Muhammad Ikram
Rahat Masood
Gareth Tyson
M. Kâafar
Roya Ensafi
LRM
28
2
0
07 Mar 2022
Open or Sneaky? Fast or Slow? Light or Heavy?: Investigating Security
  Releases of Open Source Packages
Open or Sneaky? Fast or Slow? Light or Heavy?: Investigating Security Releases of Open Source Packages
Nasif Imtiaz
A. Khanom
Laurie A. Williams
49
21
0
13 Dec 2021
Categorizing Service Worker Attacks and Mitigations
Categorizing Service Worker Attacks and Mitigations
Karthika Subramani
Jordan Jueckstock
A. Kapravelos
R. Perdisci
AAML
28
4
0
13 Nov 2021
Mir: Automated Quantifiable Privilege Reduction Against Dynamic Library
  Compromise in JavaScript
Mir: Automated Quantifiable Privilege Reduction Against Dynamic Library Compromise in JavaScript
N. Vasilakis
Cristian-Alexandru Staicu
Greg Ntousakis
Konstantinos Kallas
Ben Karel
A. DeHon
Michael Pradel
127
4
0
31 Oct 2020
Uncovering the Hidden Dangers: Finding Unsafe Go Code in the Wild
Uncovering the Hidden Dangers: Finding Unsafe Go Code in the Wild
Johannes Lauinger
Lars Baumgärtner
A. Wickert
Mira Mezini
33
3
0
21 Oct 2020
Code-based Vulnerability Detection in Node.js Applications: How far are
  we?
Code-based Vulnerability Detection in Node.js Applications: How far are we?
Bodin Chinthanet
Serena Elisa Ponta
H. Plate
A. Sabetta
R. Kula
T. Ishio
Ken-ichi Matsumoto
20
21
0
11 Aug 2020
Fingerprinting the Fingerprinters: Learning to Detect Browser
  Fingerprinting Behaviors
Fingerprinting the Fingerprinters: Learning to Detect Browser Fingerprinting Behaviors
Umar Iqbal
Steven Englehardt
Zubair Shafiq
56
117
0
11 Aug 2020
Lags in the Release, Adoption, and Propagation of npm Vulnerability
  Fixes
Lags in the Release, Adoption, and Propagation of npm Vulnerability Fixes
Bodin Chinthanet
R. Kula
Shane McIntosh
T. Ishio
Akinori Ihara
Ken-ichi Matsumoto
75
60
0
08 Jul 2019
Small World with High Risks: A Study of Security Threats in the npm
  Ecosystem
Small World with High Risks: A Study of Security Threats in the npm Ecosystem
Markus Zimmermann
Cristian-Alexandru Staicu
Cam Tenny
Michael Pradel
113
237
0
25 Feb 2019
The Chain of Implicit Trust: An Analysis of the Web Third-party
  Resources Loading
The Chain of Implicit Trust: An Analysis of the Web Third-party Resources Loading
Muhammad Ikram
Rahat Masood
Gareth Tyson
M. Kâafar
Noha Loizon
Roya Ensafi
LRM
91
53
0
23 Jan 2019
Missed by Filter Lists: Detecting Unknown Third-Party Trackers with
  Invisible Pixels
Missed by Filter Lists: Detecting Unknown Third-Party Trackers with Invisible Pixels
Imane Fouad
Nataliia Bielova
A. Legout
Natasa Sarafijanovic-Djukic
71
61
0
04 Dec 2018
On the Integrity of Cross-Origin JavaScripts
On the Integrity of Cross-Origin JavaScripts
Jukka Ruohonen
Joonas Salovaara
Ville Leppänen
51
6
0
15 Sep 2018
Vulnerable Open Source Dependencies: Counting Those That Matter
Vulnerable Open Source Dependencies: Counting Those That Matter
Ivan Pashchenko
H. Plate
Serena Elisa Ponta
A. Sabetta
Fabio Massacci
47
105
0
29 Aug 2018
PrivacyScore: Improving Privacy and Security via Crowd-Sourced
  Benchmarks of Websites
PrivacyScore: Improving Privacy and Security via Crowd-Sourced Benchmarks of Websites
Max Maass
Pascal Wichmann
H. Pridöhl
Dominik Herrmann
50
21
0
15 May 2017
1