{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T15:31:37Z","timestamp":1759937497184,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,6,13]],"date-time":"2022-06-13T00:00:00Z","timestamp":1655078400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,6,13]]},"DOI":"10.1145\/3530019.3530031","type":"proceedings-article","created":{"date-parts":[[2022,6,12]],"date-time":"2022-06-12T01:54:00Z","timestamp":1654998840000},"page":"110-119","source":"Crossref","is-referenced-by-count":2,"title":["Exploring Security Vulnerabilities in Competitive Programming: An Empirical Study"],"prefix":"10.1145","author":[{"given":"Debeshee","family":"Das","sequence":"first","affiliation":[{"name":"Indian Institute of Technology Tirupati, India"}]},{"given":"Noble Saji","family":"Mathews","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology Tirupati, India"}]},{"given":"Sridhar","family":"Chimalakonda","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology Tirupati, India"}]}],"member":"320","published-online":{"date-parts":[[2022,6,13]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2019.110427"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/SYNASC.2017.00035"},{"volume-title":"A qualitative investigation of insecure code propagation from online forums. In 2019 IEEE Cybersecurity Development (SecDev)","author":"Bai Wei","key":"e_1_3_2_1_3_1","unstructured":"Wei Bai , Omer Akgul , and Michelle\u00a0 L Mazurek . 2019. A qualitative investigation of insecure code propagation from online forums. In 2019 IEEE Cybersecurity Development (SecDev) . IEEE , 34\u201348. Wei Bai, Omer Akgul, and Michelle\u00a0L Mazurek. 2019. A qualitative investigation of insecure code propagation from online forums. In 2019 IEEE Cybersecurity Development (SecDev). IEEE, 34\u201348."},{"key":"e_1_3_2_1_4_1","volume-title":"Codeflex: A Web-based Platform for Competitive Programming. In 2019 14th Iberian Conference on Information Systems and Technologies (CISTI). 1\u20136. https:\/\/doi.org\/10","author":"Brito Miguel","year":"2019","unstructured":"Miguel Brito and Celestino Gon\u00e7alves . 2019 . Codeflex: A Web-based Platform for Competitive Programming. In 2019 14th Iberian Conference on Information Systems and Technologies (CISTI). 1\u20136. https:\/\/doi.org\/10 .23919\/CISTI.2019.8760776 Miguel Brito and Celestino Gon\u00e7alves. 2019. Codeflex: A Web-based Platform for Competitive Programming. In 2019 14th Iberian Conference on Information Systems and Technologies (CISTI). 1\u20136. https:\/\/doi.org\/10.23919\/CISTI.2019.8760776"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2019.00039"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3341161.3343524"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3287324.3287511"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ITHET.2018.8424620"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3382494.3422165"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.31"},{"key":"e_1_3_2_1_11_1","unstructured":"Kevin Fu Tadayoshi Kohno Daniel Lopresti Elizabeth Mynatt Klara Nahrstedt Shwetak Patel Debra Richardson and Ben Zorn. 2020. Safety security and privacy threats posed by accelerating trends in the internet of things. arXiv preprint arXiv:2008.00017(2020). Kevin Fu Tadayoshi Kohno Daniel Lopresti Elizabeth Mynatt Klara Nahrstedt Shwetak Patel Debra Richardson and Ben Zorn. 2020. Safety security and privacy threats posed by accelerating trends in the internet of things. arXiv preprint arXiv:2008.00017(2020)."},{"key":"e_1_3_2_1_12_1","volume-title":"2021 IEEE\/ACM 43rd International Conference on Software Engineering: Software Engineering Education and Training (ICSE-SEET). IEEE, 241\u2013252","author":"Gasiba Tiago\u00a0Espinha","year":"2021","unstructured":"Tiago\u00a0Espinha Gasiba , Ulrike Lechner , Maria Pinto-Albuquerque , and Daniel Mendez . 2021 . Is Secure Coding Education in the Industry Needed? An Investigation Through a Large Scale Survey . In 2021 IEEE\/ACM 43rd International Conference on Software Engineering: Software Engineering Education and Training (ICSE-SEET). IEEE, 241\u2013252 . Tiago\u00a0Espinha Gasiba, Ulrike Lechner, Maria Pinto-Albuquerque, and Daniel Mendez. 2021. Is Secure Coding Education in the Industry Needed? An Investigation Through a Large Scale Survey. In 2021 IEEE\/ACM 43rd International Conference on Software Engineering: Software Engineering Education and Training (ICSE-SEET). IEEE, 241\u2013252."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/CRiSIS.2013.6766361"},{"key":"e_1_3_2_1_14_1","unstructured":"Hristina Gulabovska and Zolt\u00e1n Porkol\u00e1b. 2019. Survey on Static Analysis Tools of Python Programs.. In SQAMIA. Hristina Gulabovska and Zolt\u00e1n Porkol\u00e1b. 2019. Survey on Static Analysis Tools of Python Programs.. In SQAMIA."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2019.8870184"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3382494.3422166"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485832.3488026"},{"key":"e_1_3_2_1_18_1","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Huaman Nicolas","year":"2021","unstructured":"Nicolas Huaman , Bennet von Skarczinski , Christian Stransky , Dominik Wermke , Yasemin Acar , Arne Drei\u00dfigacker , and Sascha Fahl . 2021 . A Large-Scale Interview Study on Information Security in and Attacks against Small and Medium-sized Enterprises . In 30th USENIX Security Symposium (USENIX Security 21) . USENIX Association, 1235\u20131252. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/huaman Nicolas Huaman, Bennet von Skarczinski, Christian Stransky, Dominik Wermke, Yasemin Acar, Arne Drei\u00dfigacker, and Sascha Fahl. 2021. A Large-Scale Interview Study on Information Security in and Attacks against Small and Medium-sized Enterprises. In 30th USENIX Security Symposium (USENIX Security 21). USENIX Association, 1235\u20131252. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/huaman"},{"key":"e_1_3_2_1_19_1","volume-title":"The Secret Life of Software Vulnerabilities: A Large-Scale Empirical Study","author":"Iannone Emanuele","year":"2022","unstructured":"Emanuele Iannone , Roberta Guadagni , Filomena Ferrucci , Andrea De\u00a0Lucia , and Fabio Palomba . 2022. The Secret Life of Software Vulnerabilities: A Large-Scale Empirical Study . IEEE Transactions on Software Engineering( 2022 ). Emanuele Iannone, Roberta Guadagni, Filomena Ferrucci, Andrea De\u00a0Lucia, and Fabio Palomba. 2022. The Secret Life of Software Vulnerabilities: A Large-Scale Empirical Study. IEEE Transactions on Software Engineering(2022)."},{"key":"e_1_3_2_1_20_1","volume-title":"Evaluating Factors Influencing Contestant Behavior in Competitive Software Development. In 2018 8th International Conference on Cloud Computing, Data Science & Engineering (Confluence). IEEE, 20\u201325","author":"Kumar Ratnakar","year":"2018","unstructured":"Ratnakar Kumar , Nitasha Hasteer , and Jean-Paul Van\u00a0Belle . 2018 . Evaluating Factors Influencing Contestant Behavior in Competitive Software Development. In 2018 8th International Conference on Cloud Computing, Data Science & Engineering (Confluence). IEEE, 20\u201325 . Ratnakar Kumar, Nitasha Hasteer, and Jean-Paul Van\u00a0Belle. 2018. Evaluating Factors Influencing Contestant Behavior in Competitive Software Development. In 2018 8th International Conference on Cloud Computing, Data Science & Engineering (Confluence). IEEE, 20\u201325."},{"key":"e_1_3_2_1_21_1","volume-title":"Identifying Gaps in the Secure Programming Knowledge and Skills of Students. In In Proceedings of the 53rd ACM Technical Symposium on Computer Science Education.","author":"Lam Jessica","year":"2022","unstructured":"Jessica Lam , Elias Fang , Majed Almansoori , Rahul Chatterjee , and Adalbert Gerald\u00a0Soosai Raj . 2022 . Identifying Gaps in the Secure Programming Knowledge and Skills of Students. In In Proceedings of the 53rd ACM Technical Symposium on Computer Science Education. Jessica Lam, Elias Fang, Majed Almansoori, Rahul Chatterjee, and Adalbert Gerald\u00a0Soosai Raj. 2022. Identifying Gaps in the Secure Programming Knowledge and Skills of Students. In In Proceedings of the 53rd ACM Technical Symposium on Computer Science Education."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Ben Lazarine Sagar Samtani Mark Patton Hongyi Zhu Steven Ullman Benjamin Ampel and Hsinchun Chen. 2020. Identifying Vulnerable GitHub Repositories and Users in Scientific Cyberinfrastructure: An Unsupervised Graph Embedding Approach. In 2020 IEEE International Conference on Intelligence and Security Informatics (ISI). IEEE 1\u20136. Ben Lazarine Sagar Samtani Mark Patton Hongyi Zhu Steven Ullman Benjamin Ampel and Hsinchun Chen. 2020. Identifying Vulnerable GitHub Repositories and Users in Scientific Cyberinfrastructure: An Unsupervised Graph Embedding Approach. In 2020 IEEE International Conference on Intelligence and Security Informatics (ISI). IEEE 1\u20136.","DOI":"10.1109\/ISI49825.2020.9280544"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"Triet\u00a0Le Le\u00a0Huynh\u00a0Minh Roland Croft David Hin and Muhammad\u00a0Ali Ali\u00a0Babar. 2021. A Large-scale Study of Security Vulnerability Support on Developer Q&A Websites. In Evaluation and Assessment in Software Engineering. 109\u2013118. Triet\u00a0Le Le\u00a0Huynh\u00a0Minh Roland Croft David Hin and Muhammad\u00a0Ali Ali\u00a0Babar. 2021. A Large-scale Study of Security Vulnerability Support on Developer Q&A Websites. In Evaluation and Assessment in Software Engineering. 109\u2013118.","DOI":"10.1145\/3463274.3463331"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/MINES.2012.202"},{"key":"e_1_3_2_1_25_1","volume-title":"Views on Secure Code in Professional Practice. In 2019 IEEE\/ACM 12th International Workshop on Cooperative and Human Aspects of Software Engineering (CHASE). IEEE, 61\u201368","author":"Lopez Tamara","year":"2019","unstructured":"Tamara Lopez , Helen Sharp , Thein Tun , Arosha Bandara , Mark Levine , and Bashar Nuseibeh . 2019 . \u201d Hopefully We Are Mostly Secure \u201d: Views on Secure Code in Professional Practice. In 2019 IEEE\/ACM 12th International Workshop on Cooperative and Human Aspects of Software Engineering (CHASE). IEEE, 61\u201368 . Tamara Lopez, Helen Sharp, Thein Tun, Arosha Bandara, Mark Levine, and Bashar Nuseibeh. 2019. \u201d Hopefully We Are Mostly Secure\u201d: Views on Secure Code in Professional Practice. In 2019 IEEE\/ACM 12th International Workshop on Cooperative and Human Aspects of Software Engineering (CHASE). IEEE, 61\u201368."},{"key":"e_1_3_2_1_26_1","volume-title":"Software Security: Building Security In. In 2006 17th International Symposium on Software Reliability Engineering. 24\u201327","author":"McGraw Gary","year":"2006","unstructured":"Gary McGraw . 2006 . Software Security: Building Security In. In 2006 17th International Symposium on Software Reliability Engineering. 24\u201327 . https:\/\/doi.org\/10.1109\/ISSRE.2006.43 Gary McGraw. 2006. Software Security: Building Security In. In 2006 17th International Symposium on Software Reliability Engineering. 24\u201327. https:\/\/doi.org\/10.1109\/ISSRE.2006.43"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2020.102516"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"Michael Meli Matthew\u00a0R McNiece and Bradley Reaves. 2019. How Bad Can It Git? Characterizing Secret Leakage in Public GitHub Repositories.. In NDSS. Michael Meli Matthew\u00a0R McNiece and Bradley Reaves. 2019. How Bad Can It Git? Characterizing Secret Leakage in Public GitHub Repositories.. In NDSS.","DOI":"10.14722\/ndss.2019.23418"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180201"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3194760.3194767"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884790"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2020.05.119"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2021.106614"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","unstructured":"Ivan Pashchenko Riccardo Scandariato Antonino Sabetta and Fabio Massacci. 2021. Secure Software Development in the Era of Fluid Multi-party Open Software and Services. In 2021 IEEE\/ACM 43rd International Conference on Software Engineering: New Ideas and Emerging Results (ICSE-NIER). IEEE 91\u201395. Ivan Pashchenko Riccardo Scandariato Antonino Sabetta and Fabio Massacci. 2021. Secure Software Development in the Era of Fluid Multi-party Open Software and Services. In 2021 IEEE\/ACM 43rd International Conference on Software Engineering: New Ideas and Emerging Results (ICSE-NIER). IEEE 91\u201395.","DOI":"10.1109\/ICSE-NIER52604.2021.00027"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3120349"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/EDCC51268.2020.00025"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2019.00040"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70712"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2020.3023664"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274742"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180260"}],"event":{"name":"EASE 2022: The International Conference on Evaluation and Assessment in Software Engineering 2022","acronym":"EASE 2022","location":"Gothenburg Sweden"},"container-title":["The International Conference on Evaluation and Assessment in Software Engineering 2022"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3530019.3530031","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3530019.3530031","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:31:27Z","timestamp":1750188687000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3530019.3530031"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,13]]},"references-count":41,"alternative-id":["10.1145\/3530019.3530031","10.1145\/3530019"],"URL":"https:\/\/doi.org\/10.1145\/3530019.3530031","relation":{},"subject":[],"published":{"date-parts":[[2022,6,13]]}}}