Online / 5 & 6 February 2022

visit

Panel 2: Dependencies for Vulnerability Discovery and Tracking


One important use of dependency information is for the identification and discovery of vulnerabilities. The presentations present diverse interesting projects and approaches. We want to understand if the current approaches address the needs of cybersecurity efforts, how they compare to threats beyond dependency vulnerabilities, and how they can be combined, extended, and learn from each other.

Speakers

Photo of Diomidis Spinellis Diomidis Spinellis

Links