1. Empirical Analysis of Security Vulnerabilities in Python Packages
2. Mining Apps for Abnormal Usage of Sensitive Data
3. Aadesh Bagmar , Josiah Wedgwood , Dave Levin , and Jim Purtilo . 2021. I Know What You Imported Last Summer: A study of security threats in the Python ecosystem. CoRR abs/2102.06301 ( 2021 ). arXiv:2102.06301 https://arxiv.org/abs/2102.06301 Aadesh Bagmar, Josiah Wedgwood, Dave Levin, and Jim Purtilo. 2021. I Know What You Imported Last Summer: A study of security threats in the Python ecosystem. CoRR abs/2102.06301 (2021). arXiv:2102.06301 https://arxiv.org/abs/2102.06301
4. Adam Baldwin. 2019. Plot to steal cryptocurrency foiled by the npm security team. https://blog.npmjs.org/post/185397814280/plot-to-steal-cryptocurrency-foiled-by-the-npm. Adam Baldwin. 2019. Plot to steal cryptocurrency foiled by the npm security team. https://blog.npmjs.org/post/185397814280/plot-to-steal-cryptocurrency-foiled-by-the-npm.
5. Alex Birsan . 2021 . Dependency Confusion: How I Hacked Into Apple, Microsoft and Dozens of Other Companies. https://medium.com/@alex.birsan/dependency-confusion-4a5d60fec610. Alex Birsan. 2021. Dependency Confusion: How I Hacked Into Apple, Microsoft and Dozens of Other Companies. https://medium.com/@alex.birsan/dependency-confusion-4a5d60fec610.