Papers
Communities
Events
Blog
Pricing
Search
Open menu
Home
Papers
1811.00918
Cited By
v1
v2 (latest)
Thou Shalt Not Depend on Me: Analysing the Use of Outdated JavaScript Libraries on the Web
2 November 2018
Tobias Lauinger
Abdelberi Chaabane
Sajjad Arshad
William K. Robertson
Christo Wilson
E. Kirda
Re-assign community
ArXiv (abs)
PDF
HTML
Papers citing
"Thou Shalt Not Depend on Me: Analysing the Use of Outdated JavaScript Libraries on the Web"
20 / 20 papers shown
Title
An Empirical Study of JavaScript Inclusion Security Issues in Chrome Extensions
Chong Guan
40
0
0
26 May 2025
An Industry Interview Study of Software Signing for Supply Chain Security
Kelechi G. Kalu
Tanya Singla
C. Okafor
Santiago Torres-Arias
James C. Davis
113
7
0
12 Jun 2024
COOKIEGUARD: Characterizing and Isolating the First-Party Cookie Jar
Pouneh Nikkhah Bahrami
Aurore Fass
Zubair Shafiq
152
1
0
08 Jun 2024
Study of JavaScript Static Analysis Tools for Vulnerability Detection in Node.js Packages
Tiago Brito
Mafalda Ferreira
M. Monteiro
Pedro Lopes
Miguel Barros
J. Santos
Nuno Santos
25
13
0
12 Jan 2023
CHRONOS: Time-Aware Zero-Shot Identification of Libraries from Vulnerability Reports
Yu-zeng Lyu
Thanh Le-Cong
Hong Jin Kang
Ratnadira Widyasari
Zhipeng Zhao
X. Le
Ming Li
David Lo
90
18
0
10 Jan 2023
XSS for the Masses: Integrating Security in a Web Programming Course using a Security Scanner
Lwin Khin Shar
Christopher M. Poskitt
Kyong Jin Shim
Li Wong
26
8
0
26 Apr 2022
A Study of Third-party Resources Loading on Web
Muhammad Ikram
Rahat Masood
Gareth Tyson
M. Kâafar
Roya Ensafi
LRM
28
2
0
07 Mar 2022
Open or Sneaky? Fast or Slow? Light or Heavy?: Investigating Security Releases of Open Source Packages
Nasif Imtiaz
A. Khanom
Laurie A. Williams
49
21
0
13 Dec 2021
Categorizing Service Worker Attacks and Mitigations
Karthika Subramani
Jordan Jueckstock
A. Kapravelos
R. Perdisci
AAML
28
4
0
13 Nov 2021
Mir: Automated Quantifiable Privilege Reduction Against Dynamic Library Compromise in JavaScript
N. Vasilakis
Cristian-Alexandru Staicu
Greg Ntousakis
Konstantinos Kallas
Ben Karel
A. DeHon
Michael Pradel
127
4
0
31 Oct 2020
Uncovering the Hidden Dangers: Finding Unsafe Go Code in the Wild
Johannes Lauinger
Lars Baumgärtner
A. Wickert
Mira Mezini
33
3
0
21 Oct 2020
Code-based Vulnerability Detection in Node.js Applications: How far are we?
Bodin Chinthanet
Serena Elisa Ponta
H. Plate
A. Sabetta
R. Kula
T. Ishio
Ken-ichi Matsumoto
20
21
0
11 Aug 2020
Fingerprinting the Fingerprinters: Learning to Detect Browser Fingerprinting Behaviors
Umar Iqbal
Steven Englehardt
Zubair Shafiq
56
117
0
11 Aug 2020
Lags in the Release, Adoption, and Propagation of npm Vulnerability Fixes
Bodin Chinthanet
R. Kula
Shane McIntosh
T. Ishio
Akinori Ihara
Ken-ichi Matsumoto
75
60
0
08 Jul 2019
Small World with High Risks: A Study of Security Threats in the npm Ecosystem
Markus Zimmermann
Cristian-Alexandru Staicu
Cam Tenny
Michael Pradel
113
237
0
25 Feb 2019
The Chain of Implicit Trust: An Analysis of the Web Third-party Resources Loading
Muhammad Ikram
Rahat Masood
Gareth Tyson
M. Kâafar
Noha Loizon
Roya Ensafi
LRM
91
53
0
23 Jan 2019
Missed by Filter Lists: Detecting Unknown Third-Party Trackers with Invisible Pixels
Imane Fouad
Nataliia Bielova
A. Legout
Natasa Sarafijanovic-Djukic
71
61
0
04 Dec 2018
On the Integrity of Cross-Origin JavaScripts
Jukka Ruohonen
Joonas Salovaara
Ville Leppänen
51
6
0
15 Sep 2018
Vulnerable Open Source Dependencies: Counting Those That Matter
Ivan Pashchenko
H. Plate
Serena Elisa Ponta
A. Sabetta
Fabio Massacci
47
105
0
29 Aug 2018
PrivacyScore: Improving Privacy and Security via Crowd-Sourced Benchmarks of Websites
Max Maass
Pascal Wichmann
H. Pridöhl
Dominik Herrmann
50
21
0
15 May 2017
1