
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
How Bad Can It Git? Characterizing Secret Leakage in Public GitHub Repositories
Michael Meli, Matthew R. McNiece, Bradley Reaves
(2019)
Open Access | Times Cited: 65
Michael Meli, Matthew R. McNiece, Bradley Reaves
(2019)
Open Access | Times Cited: 65
Showing 1-25 of 65 citing articles:
Research Directions in Software Supply Chain Security
Laurie Williams, Giacomo Benedetti, Sivana Hamer, et al.
ACM Transactions on Software Engineering and Methodology (2025)
Closed Access | Times Cited: 2
Laurie Williams, Giacomo Benedetti, Sivana Hamer, et al.
ACM Transactions on Software Engineering and Methodology (2025)
Closed Access | Times Cited: 2
Security Smells in Ansible and Chef Scripts
Akond Rahman, Md Rayhanur Rahman, Chris Parnin, et al.
ACM Transactions on Software Engineering and Methodology (2021) Vol. 30, Iss. 1, pp. 1-31
Closed Access | Times Cited: 53
Akond Rahman, Md Rayhanur Rahman, Chris Parnin, et al.
ACM Transactions on Software Engineering and Methodology (2021) Vol. 30, Iss. 1, pp. 1-31
Closed Access | Times Cited: 53
Your Code Secret Belongs to Me: Neural Code Completion Tools Can Memorize Hard-Coded Credentials
Zhuangbin Chen, Yichen Li, Weibin Wu, et al.
Proceedings of the ACM on software engineering. (2024) Vol. 1, Iss. FSE, pp. 2515-2537
Closed Access | Times Cited: 4
Zhuangbin Chen, Yichen Li, Weibin Wu, et al.
Proceedings of the ACM on software engineering. (2024) Vol. 1, Iss. FSE, pp. 2515-2537
Closed Access | Times Cited: 4
Automated detection of password leakage from public GitHub repositories
Runhan Feng, Ziyang Yan, Shiyan Peng, et al.
Proceedings of the 44th International Conference on Software Engineering (2022)
Closed Access | Times Cited: 17
Runhan Feng, Ziyang Yan, Shiyan Peng, et al.
Proceedings of the 44th International Conference on Software Engineering (2022)
Closed Access | Times Cited: 17
How far are app secrets from being stolen? a case study on android
Lili Wei, Heqing Huang, Shing-Chi Cheung, et al.
Empirical Software Engineering (2025) Vol. 30, Iss. 3
Open Access
Lili Wei, Heqing Huang, Shing-Chi Cheung, et al.
Empirical Software Engineering (2025) Vol. 30, Iss. 3
Open Access
Dr. Docker: A Large-Scale Security Measurement of Docker Image Ecosystem
Hequan Shi, Lingyun Ying, Libo Chen, et al.
(2025), pp. 2813-2823
Closed Access
Hequan Shi, Lingyun Ying, Libo Chen, et al.
(2025), pp. 2813-2823
Closed Access
Exsense: Extract sensitive information from unstructured data
Yongyan Guo, Jiayong Liu, Wenwu Tang, et al.
Computers & Security (2020) Vol. 102, pp. 102156-102156
Closed Access | Times Cited: 27
Yongyan Guo, Jiayong Liu, Wenwu Tang, et al.
Computers & Security (2020) Vol. 102, pp. 102156-102156
Closed Access | Times Cited: 27
Workflow Integration Alleviates Identity and Access Management in Serverless Computing
Arnav Sankaran, Pubali Datta, Adam Bates
Annual Computer Security Applications Conference (2020), pp. 496-509
Closed Access | Times Cited: 24
Arnav Sankaran, Pubali Datta, Adam Bates
Annual Computer Security Applications Conference (2020), pp. 496-509
Closed Access | Times Cited: 24
Secrets in Source Code: Reducing False Positives using Machine Learning
Aakanksha Saha, Tamara Denning, Vivek Srikumar, et al.
(2020), pp. 168-175
Closed Access | Times Cited: 23
Aakanksha Saha, Tamara Denning, Vivek Srikumar, et al.
(2020), pp. 168-175
Closed Access | Times Cited: 23
Hidden in Plain Sight: Obfuscated Strings Threatening Your Privacy
Leonid Glanz, Patrick Müller, Lars Baumgärtner, et al.
(2020), pp. 694-707
Open Access | Times Cited: 20
Leonid Glanz, Patrick Müller, Lars Baumgärtner, et al.
(2020), pp. 694-707
Open Access | Times Cited: 20
The Dark Forest: Understanding Security Risks of Cross-Party Delegated Resources in Mobile App-in-App Ecosystems
Zhibo Zhang, Lei Zhang, Guangliang Yang, et al.
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 5434-5448
Closed Access | Times Cited: 2
Zhibo Zhang, Lei Zhang, Guangliang Yang, et al.
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 5434-5448
Closed Access | Times Cited: 2
Secrets Revealed in Container Images: An Internet-wide Study on Occurrence and Impact
Markus Dahlmanns, Constantin Sander, R Decker, et al.
(2023)
Open Access | Times Cited: 6
Markus Dahlmanns, Constantin Sander, R Decker, et al.
(2023)
Open Access | Times Cited: 6
Don't Leak Your Keys: Understanding, Measuring, and Exploiting the AppSecret Leaks in Mini-Programs
Yue Zhang, Yuqing Yang, Zhiqiang Lin
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (2023), pp. 2411-2425
Open Access | Times Cited: 6
Yue Zhang, Yuqing Yang, Zhiqiang Lin
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (2023), pp. 2411-2425
Open Access | Times Cited: 6
Identifying Vulnerable GitHub Repositories and Users in Scientific Cyberinfrastructure: An Unsupervised Graph Embedding Approach
Ben Lazarine, Sagar Samtani, Mark Patton, et al.
(2020)
Closed Access | Times Cited: 16
Ben Lazarine, Sagar Samtani, Mark Patton, et al.
(2020)
Closed Access | Times Cited: 16
Open Source Solutions for Vulnerability Assessment: A Comparative Analysis
Dinis Barroqueiro Cruz, João Rafael Almeida, José Luís Oliveira
IEEE Access (2023) Vol. 11, pp. 100234-100255
Open Access | Times Cited: 5
Dinis Barroqueiro Cruz, João Rafael Almeida, José Luís Oliveira
IEEE Access (2023) Vol. 11, pp. 100234-100255
Open Access | Times Cited: 5
SEAF: A Scalable, Efficient, and Application-independent Framework for container security detection
Libo Chen, Yihang Xia, Zhenbang Ma, et al.
Journal of Information Security and Applications (2022) Vol. 71, pp. 103351-103351
Open Access | Times Cited: 9
Libo Chen, Yihang Xia, Zhenbang Ma, et al.
Journal of Information Security and Applications (2022) Vol. 71, pp. 103351-103351
Open Access | Times Cited: 9
SecretBench: A Dataset of Software Secrets
Setu Kumar Basak, Lorenzo Neil, Bradley Reaves, et al.
(2023), pp. 347-351
Open Access | Times Cited: 4
Setu Kumar Basak, Lorenzo Neil, Bradley Reaves, et al.
(2023), pp. 347-351
Open Access | Times Cited: 4
What Challenges Do Developers Face About Checked-in Secrets in Software Artifacts?
Setu Kumar Basak, Lorenzo Neil, Bradley Reaves, et al.
(2023), pp. 1635-1647
Open Access | Times Cited: 4
Setu Kumar Basak, Lorenzo Neil, Bradley Reaves, et al.
(2023), pp. 1635-1647
Open Access | Times Cited: 4
Continuous Intrusion: Characterizing the Security of Continuous Integration Services
Yacong Gu, Lingyun Ying, Huajun Chai, et al.
2022 IEEE Symposium on Security and Privacy (SP) (2023)
Closed Access | Times Cited: 4
Yacong Gu, Lingyun Ying, Huajun Chai, et al.
2022 IEEE Symposium on Security and Privacy (SP) (2023)
Closed Access | Times Cited: 4
Do Not Give Away My Secrets: Uncovering the Privacy Issue of Neural Code Completion Tools
Yizhan Huang, Yichen Li, Weibin Wu, et al.
arXiv (Cornell University) (2023)
Open Access | Times Cited: 4
Yizhan Huang, Yichen Li, Weibin Wu, et al.
arXiv (Cornell University) (2023)
Open Access | Times Cited: 4
Quantum-safe multi-server password-based authenticated key exchange protocol
L.F. Chen, Tongzhou Qu, Anqi Yin
Multimedia Tools and Applications (2024) Vol. 83, Iss. 24, pp. 65011-65038
Closed Access | Times Cited: 1
L.F. Chen, Tongzhou Qu, Anqi Yin
Multimedia Tools and Applications (2024) Vol. 83, Iss. 24, pp. 65011-65038
Closed Access | Times Cited: 1
A First Look at Security and Privacy Risks in the RapidAPI Ecosystem
Song Liao, Long Cheng, Xiapu Luo, et al.
(2024), pp. 1626-1640
Open Access | Times Cited: 1
Song Liao, Long Cheng, Xiapu Luo, et al.
(2024), pp. 1626-1640
Open Access | Times Cited: 1
Adapting Meta Knowledge with Heterogeneous Information Network for COVID-19 Themed Malicious Repository Detection
Yiyue Qian, Yiming Zhang, Yanfang Ye, et al.
(2021), pp. 3684-3690
Open Access | Times Cited: 9
Yiyue Qian, Yiming Zhang, Yanfang Ye, et al.
(2021), pp. 3684-3690
Open Access | Times Cited: 9
Assessing Non-Intrusive Vulnerability Scanning Methodologies for Detecting Web Application Vulnerabilities on Large Scale
Elwin Shaji, Narayanan Subramanian
2021 International Conference on System, Computation, Automation and Networking (ICSCAN) (2021), pp. 1-5
Closed Access | Times Cited: 8
Elwin Shaji, Narayanan Subramanian
2021 International Conference on System, Computation, Automation and Networking (ICSCAN) (2021), pp. 1-5
Closed Access | Times Cited: 8
Developers Need Protection, Too: Perspectives and Research Challenges for Privacy in Social Coding Platforms
Nicolás E. Díaz Ferreyra, Abdessamad Imine, Melina Vidoni, et al.
(2023)
Open Access | Times Cited: 3
Nicolás E. Díaz Ferreyra, Abdessamad Imine, Melina Vidoni, et al.
(2023)
Open Access | Times Cited: 3