Vulnerable Open Source Dependencies: Counting Those That Matter sap security research oss Related Secure Software Development in the Era of Fluid Multi-party Open Software and Services The Used, the Bloated, and the Vulnerable: Reducing the Attack Surface of an Industrial Application LastPyMile: Identifying the Discrepancy between Sources and Packages Beyond Metadata: Code-centric and Usage-based Analysis of Known Vulnerabilities in Open-source Software Project Kb