Online / 5 & 6 February 2022


Panel 2: Dependencies for Vulnerability Discovery and Tracking

One important use of dependency information is for the identification and discovery of vulnerabilities. The presentations present diverse interesting projects and approaches. We want to understand if the current approaches address the needs of cybersecurity efforts, how they compare to threats beyond dependency vulnerabilities, and how they can be combined, extended, and learn from each other.


Photo of Diomidis Spinellis Diomidis Spinellis