ICSE 2026
Sun 12 - Sat 18 April 2026 Rio de Janeiro, Brazil
Thu 16 Apr 2026 11:45 - 12:00 at Oceania X - Dependability and Security 5 Chair(s): Ming Xu

On average, 71% of the code in typical Java projects comes from open-source software (OSS) dependencies, making OSS dependencies the dominant component of modern software code bases. This high degree of OSS reliance comes with a considerable security risk of adding known security vulnerabilities to a code base. To remedy this risk, researchers and companies have developed various dependency scanners, which try to identify inclusions of known-to-be-vulnerable OSS dependencies. However, there are still challenges that modern dependency scanners do not overcome, especially when it comes to dependency modifications, such as re-compilations, re-bundlings or re-packagings, which are common in the Java ecosystem.

To overcome these challenges, we present Jaralyzer, a bytecode-centric dependency scanner for Java. Jaralyzer does not rely on the metadata or the source code of the included OSS dependencies being available but directly analyzes a dependency’s bytecode.

Our evaluation across 56 popular OSS components demonstrates that Jaralyzer outperforms other popular dependency scanners in detecting vulnerabilities within modified dependencies. It is the only scanner capable of identifying vulnerabilities across all the above mentioned types of modifications. But even when applied to unmodified dependencies, Jaralyzer outperforms the current state-of-the-art code-centric scanner Eclipse Steady by detecting 28 more true vulnerabilities and yielding 29 fewer false warnings.

Thu 16 Apr

Displayed time zone: Brasilia, Distrito Federal, Brazil change

11:00 - 12:30
Dependability and Security 5Research Track / Demonstrations / New Ideas and Emerging Results (NIER) at Oceania X
Chair(s): Ming Xu Shanghai Jiao Tong University / National University of Singapore
11:00
15m
Talk
Maven-Lockfile: High Integrity Rebuild of Past Java Releases
Demonstrations
Larissa Schmid KTH Royal Institute of Technology, Elias Lundell KTH Royal Institute of Technology, Yogya Gamage Universtité de Montréal, Benoit Baudry Université de Montréal, Martin Monperrus KTH Royal Institute of Technology
Pre-print
11:15
15m
Talk
Build Code is Still Code: Finding the Antidote for Pipeline Poisoning
New Ideas and Emerging Results (NIER)
Brent Pappas University of Central Florida, Paul Gazzillo University of Central Florida
Pre-print Media Attached File Attached
11:30
15m
Talk
Closing the Chain: How to reduce your risk of being SolarWinds, Log4j, or XZ Utils
Research Track
Sivana Hamer North Carolina State University, Jacob Bowen North Carolina State University, Md Nazmul Haque North Carolina State University, Robert Hines , Chris Madden Yahoo, Laurie Williams North Carolina State University
Pre-print
11:45
15m
Talk
Bytecode-centric Detection of Known-to-be-vulnerable Dependencies in Java Projects
Research Track
Stefan Schott Heinz Nixdorf Institut, Paderborn University, Serena Elisa Ponta SAP Labs, Wolfram Fischer SAP Labs, Jonas Klauke Heinz Nixdorf Institut, Paderborn University, Eric Bodden
Pre-print
12:00
15m
Talk
Insecure Ingredients? Exploring Dependency Update Patterns of Bundled JavaScript Packages on the Web
Research Track
Ben Swierzy Fraunhofer FKIE and University of Bonn, Marc Ohm University of Bonn and Fraunhofer FKIE, Michael Meier University of Bonn and Fraunhofer FKIE
Pre-print
12:15
15m
Talk
Securing the AI Supply Chain: What Can We Learn From Developer-Reported Security Issues and Solutions of AI Projects?
Research Track
The Anh Nguyen Adelaide University, Triet Le Adelaide University, Muhammad Ali Babar School of Computer Science, The University of Adelaide
Pre-print