Setu Kumar Basak

College of Engineering

secret_detection, software_secret_management, software_security, software_engineering

Works (4)

Updated: December 9th, 2025 15:40

2025 article

SoK: An empirical investigation of malware techniques in advanced persistent threat attacks

Rahman, M. R., Basak, S. K., Hezaveh, R. M., & Williams, L. (2025, August 9). Computers & Security.

By: M. Rahman*, S. Basak n, R. Hezaveh n & L. Williams n

author keywords: Adversarial techniques; ATT&CK; TTPs; Advanced persistent threats; Malware
topics (OpenAlex): Advanced Malware Detection Techniques; Network Security and Intrusion Detection; Information and Cyber Security
Source: Web Of Science
Added: October 13, 2025

2023 article proceedings

SecretBench: A Dataset of Software Secrets

By: S. Basak n, L. Neil n, B. Reaves n & L. Williams n

topics (OpenAlex): Advanced Malware Detection Techniques; Digital and Cyber Forensics; Data Quality and Management
TL;DR: The goal of this paper is to aid researchers and tool developers in evaluating and improving secret detection tools by curating a benchmark dataset of secrets through a systematic collection of secrets from open-source repositories. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries, Crossref
Added: September 5, 2023

2023 article proceedings

What Challenges Do Developers Face About Checked-in Secrets in Software Artifacts?

Basak, S. K., Neil, L., Reaves, B., & Williams, L. (2023, May 1). 2023 IEEE/ACM 45TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ICSE, pp. 1635–1647.

By: S. Basak n, L. Neil n, B. Reaves n & L. Williams n

topics (OpenAlex): Software Engineering Research; Mobile Crowdsensing and Crowdsourcing; Privacy-Preserving Technologies in Data
TL;DR: The findings indicate that the same solution has been mentioned to mitigate multiple challenges, and an increasing trend in questions lacking accepted solutions substantiating the need for future research and tool automation on managing secrets. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries, Crossref
Added: September 5, 2023

2022 article proceedings

What are the Practices for Secret Management in Software Artifacts?

By: S. Basak n, L. Neil n, B. Reaves n & L. Williams n

author keywords: secret management; practices; empirical study; grey literature; secure development
topics (OpenAlex): Advanced Malware Detection Techniques; Digital and Cyber Forensics; Information and Cyber Security
TL;DR: The goal of this paper is to aid practitioners in avoiding the exposure of secrets by identifying secret management practices in software artifacts through a systematic derivation of practices disseminated in Internet artifacts. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries, Crossref
Added: February 20, 2023

Employment

Updated: December 9th, 2025 11:42

North Carolina State University Raleigh, North Carolina, US
Computer Science

Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.

Certain data included herein are derived from the Web of Science© and InCites© (2026) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.