MSR 2025
Mon 28 - Tue 29 April 2025 Ottawa, Ontario, Canada
co-located with ICSE 2025

This program is tentative and subject to change.

Mon 28 Apr 2025 14:45 - 14:49 at 215 - MSR 2025 Mining Challenge Chair(s): Joyce El Haddad, Damien Jaime, Pascal Poizat

Log4j has become a widely adopted logging library for Java programs due to its long history and high reliability. Its widespread use is notable not only because of its maturity but also due to the complexity and depth of its features, which have made it an essential tool for many developers. However, Log4j 1.x, which reached its end of support (deprecated), poses significant security risks and has numerous deprecated features that can be exploited by attackers. Despite this, some clients may still rely on this library. We aim to understand whether clients are still using Log4j 1.x despite its official support ending. We utilized the Mining Software Repositories 2025 challenge dataset, which provides a large and representative sample of open-source software projects. We analyzed over 10,000 log entries from the Mining Software Repositories 2025 challenge dataset using the Goblin framework to identify trends in usage rates for both Log4j 1.x and Log4j-core 2.x. Specifically, our study addressed two key issues: (1) We examined the usage rates and trends for these two libraries, highlighting any notable differences or patterns in their adoption. (2) We demonstrate that projects initiated after a deprecated library has reached the end of its support lifecycle can still maintain significant popularity. These findings highlight how deprecated are still popular, with the next step being to understand the reasoning behind these adoptions.

This program is tentative and subject to change.

Mon 28 Apr

Displayed time zone: Eastern Time (US & Canada) change

14:00 - 15:30
MSR 2025 Mining ChallengeMining Challenge at 215
Chair(s): Joyce El Haddad Université Paris Dauphine - PSL , Damien Jaime Université Paris Nanterre & LIP6, Pascal Poizat Université Paris Nanterre & LIP6
14:00
4m
Talk
Analyzing Dependency Clusters and Security Risks in the Maven Central Repository
Mining Challenge
George Lake Idaho State University, Minhaz F. Zibran Idaho State University
14:04
4m
Talk
Chasing the Clock: How Fast Are Vulnerabilities Fixed in the Maven Ecosystem?
Mining Challenge
Md Fazle Rabbi Idaho State University, Arifa Islam Champa Idaho State University, Rajshakhar Paul Wayne State University, Minhaz F. Zibran Idaho State University
14:08
4m
Talk
Decoding Dependency Risks: A Quantitative Study of Vulnerabilities in the Maven Ecosystem
Mining Challenge
Costain Nachuma Idaho State University, Md Mosharaf Hossan Idaho State University, Asif Kamal Turzo Wayne State University, Minhaz F. Zibran Idaho State University
14:12
4m
Talk
Faster Releases, Fewer Risks: A Study on Maven Artifact Vulnerabilities and Lifecycle Management
Mining Challenge
Md Shafiullah Shafin Rajshahi University of Engineering & Technology (RUET), Md Fazle Rabbi Idaho State University, S. M. Mahedy Hasan Rajshahi University of Engineering & Technology, Minhaz F. Zibran Idaho State University
14:16
4m
Talk
Insights into Dependency Maintenance Trends in the Maven Ecosystem
Mining Challenge
Barisha Chowdhury Rajshahi University of Engineering & Technology, Md Fazle Rabbi Idaho State University, S. M. Mahedy Hasan Rajshahi University of Engineering & Technology, Minhaz F. Zibran Idaho State University
14:20
4m
Talk
Insights into Vulnerability Trends in Maven Artifacts: Recurrence, Popularity, and User Behavior
Mining Challenge
Courtney Bodily Idaho State University, Eric Hill Idaho State University, Andreas Kramer Idaho State University, Leslie Kerby Idaho State University, Minhaz F. Zibran Idaho State University
14:24
4m
Talk
Understanding Software Vulnerabilities in the Maven Ecosystem: Patterns, Timelines, and Risks
Mining Challenge
Md Fazle Rabbi Idaho State University, Rajshakhar Paul Wayne State University, Arifa Islam Champa Idaho State University, Minhaz F. Zibran Idaho State University
14:28
4m
Talk
Dependency Update Adoption Patterns in the Maven Software Ecosystem
Mining Challenge
Baltasar Berretta College of Wooster, Augustus Thomas College of Wooster, Heather Guarnera The College of Wooster
14:32
4m
Talk
Analyzing Vulnerability Overestimation in Software Projects
Mining Challenge
Taha Draoui University of Michigan-Flint, Faten Jebari University of Michigan-Flint, Chawki Ben Slimen University of Michigan-Flint, Munjaap Uppal University of Michigan-Flint, Mohamed Wiem Mkaouer University of Michigan - Flint
14:36
4m
Talk
Dependency Dilemmas: A Comparative Study of Independent and Dependent Artifacts in Maven Ecosystem
Mining Challenge
Mehedi Hasan Shanto Khulna University, Muhammad Asaduzzman University of Windsor, Manishankar Mondal Khulna University, Shaiful Chowdhury University of Manitoba
14:40
4m
Talk
Cascading Effects: Analyzing Project Failure Impact in the Maven Central Ecosystem
Mining Challenge
Mina Shehata Belmont University, Saidmakhmud Makhkamjonoov Belmont University, Mahad Syed Belmont University, Esteban Parra Belmont University
14:45
4m
Talk
Do Developers Depend on Deprecated Library Versions? A Mining Study of Log4j
Mining Challenge
Haruhiko Yoshioka Nara Institute of Science and Technology, Sila Lertbanjongngam Nara Institute of Science and Technology, Masayuki Inaba Nara Institute of Science and Technology, Youmei Fan Nara Institute of Science and Technology, Takashi Nakano Nara Institute of Science and Technology, Kazumasa Shimari Nara Institute of Science and Technology, Raula Gaikovina Kula Osaka University, Kenichi Matsumoto Nara Institute of Science and Technology
14:49
4m
Talk
Mining for Lags in Updating Critical Security Threats: A Case Study of Log4j Library
Mining Challenge
Hidetake Tanaka Nara Institute of Science and Technology, Kazuma Yamasaki Nara Institute of Science and Technology, Momoka Hirose Nara Institute of Science and Technology, Takashi Nakano Nara Institute of Science and Technology, Youmei Fan Nara Institute of Science and Technology, Kazumasa Shimari Nara Institute of Science and Technology, Raula Gaikovina Kula Osaka University, Kenichi Matsumoto Nara Institute of Science and Technology
14:53
4m
Talk
On the Evolution of Unused Dependencies in Java Project Releases: An Empirical Study
Mining Challenge
Nabhan Suwanachote Nara Institute of Science and Technology, Yagut Shakizada Nara Institute of Science and Technology, Yutaro Kashiwa Nara Institute of Science and Technology, Bin Lin Radboud University, Hajimu Iida Nara Institute of Science and Technology
14:57
4m
Talk
Out of Sight, Still at Risk: The Lifecycle of Transitive Vulnerabilities in Maven
Mining Challenge
Piotr Przymus Nicolaus Copernicus University in Toruń, Poland, Mikołaj Fejzer Nicolaus Copernicus University in Toruń, Jakub Narębski Nicolaus Copernicus University in Toruń, Krzysztof Rykaczewski Nicolaus Copernicus University in Toruń, Poland, Krzysztof Stencel University of Warsaw
15:01
4m
Talk
Popularity and Innovation in Maven Central
Mining Challenge
Nkiru Ede Victoria University of Wellington, Jens Dietrich Victoria University of Wellington, Ulrich Zülicke Victoria University of Wellington
15:05
4m
Talk
Software Bills of Materials in Maven Central
Mining Challenge
Yogya Gamage Universtité de Montréal, Nadia Gonzalez Fernandez Université de Montréal, Martin Monperrus KTH Royal Institute of Technology, Benoit Baudry
15:09
4m
Talk
The Ripple Effect of Vulnerabilities in Maven Central: Prevalence, Propagation, and Mitigation Challenges
Mining Challenge
Ehtisham Ul Haq York University, Song Wang York University, Robert S Allison York University
15:13
4m
Talk
Tracing Vulnerabilities in Maven: A Study of CVE lifecycles and Dependency Networks
Mining Challenge
Corey Yang-Smith University of Calgary, Ahmad Abdellatif University of Calgary
Pre-print
15:17
4m
Talk
Understanding Abandonment and Slowdown Dynamics in the Maven Ecosystem
Mining Challenge
Kazi Amit Hasan Queen's University, Canada, Jerin Yasmin Queen's University, Canada, Huizi Hao Queen's University, Canada, Yuan Tian Queen's University, Kingston, Ontario, Safwat Hassan University of Toronto, Steven Ding
Pre-print
15:21
4m
Talk
Characterizing Packages for Vulnerability Prediction
Mining Challenge
Saviour Owolabi University of Calgary, Francesco Rosati University of Calgary, Ahmad Abdellatif University of Calgary, Lorenzo De Carli University of Calgary, Canada
15:25
4m
Talk
Understanding the Popularity of Packages in Maven Ecosystem
Mining Challenge
Sadman Jashim Sakib University of Windsor, Muhammad Asaduzzaman University of Windsor, Curtis Bright University of Windsor, Cole Morgan University of Windsor