Skip to main content

Showing 51–100 of 113 results for author: Babar, A

.
  1. arXiv:2201.01948  [pdf, other

    cs.DC

    Evaluation of Distributed Data Processing Frameworks in Hybrid Clouds

    Authors: Faheem Ullah, Shagun Dhingra, Xiaoyu Xia, M. Ali Babar

    Abstract: Distributed data processing frameworks (e.g., Hadoop, Spark, and Flink) are widely used to distribute data among computing nodes of a cloud. Recently, there have been increasing efforts aimed at evaluating the performance of distributed data processing frameworks hosted in private and public clouds. However, there is a paucity of research on evaluating the performance of these frameworks hosted in… ▽ More

    Submitted 6 January, 2022; originally announced January 2022.

  2. arXiv:2112.12597  [pdf, other

    cs.CR cs.SE

    Well Begun is Half Done: An Empirical Study of Exploitability & Impact of Base-Image Vulnerabilities

    Authors: Mubin Ul Haque, M. Ali Babar

    Abstract: Container technology, (e.g., Docker) is being widely adopted for deploying software infrastructures or applications in the form of container images. Security vulnerabilities in the container images are a primary concern for develo** containerized software. Exploitation of the vulnerabilities could result in disastrous impact, such as loss of confidentiality, integrity, and availability of contai… ▽ More

    Submitted 21 December, 2021; originally announced December 2021.

  3. arXiv:2112.12595  [pdf, other

    cs.CR cs.SE

    KGSecConfig: A Knowledge Graph Based Approach for Secured Container Orchestrator Configuration

    Authors: Mubin Ul Haque, M. Mehdi Kholoosi, M. Ali Babar

    Abstract: Container Orchestrator (CO) is a vital technology for managing clusters of containers, which may form a virtualized infrastructure for develo** and operating software systems. Like any other software system, securing CO is critical, but can be quite challenging task due to large number of configurable options. Manual configuration is not only knowledge intensive and time consuming, but also is e… ▽ More

    Submitted 21 December, 2021; originally announced December 2021.

  4. arXiv:2112.10356  [pdf, other

    cs.SE cs.CR

    An Investigation into Inconsistency of Software Vulnerability Severity across Data Sources

    Authors: Roland Croft, M. Ali Babar, Li Li

    Abstract: Software Vulnerability (SV) severity assessment is a vital task for informing SV remediation and triage. Ranking of SV severity scores is often used to advise prioritization of patching efforts. However, severity assessment is a difficult and subjective manual task that relies on expertise, knowledge, and standardized reporting schemes. Consequently, different data sources that perform independent… ▽ More

    Submitted 16 January, 2022; v1 submitted 20 December, 2021; originally announced December 2021.

    Comments: Accepted for publication in SANER 22

  5. arXiv:2112.10354  [pdf, other

    cs.CR

    Systematic Literature Review on Cyber Situational Awareness Visualizations

    Authors: Liuyue Jiang, Asangi Jayatilaka, Mehwish Nasim, Marthie Grobler, Mansooreh Zahedi, M. Ali Babar

    Abstract: The dynamics of cyber threats are increasingly complex, making it more challenging than ever for organizations to obtain in-depth insights into their cyber security status. Therefore, organizations rely on Cyber Situational Awareness (CSA) to support them in better understanding the threats and associated impacts of cyber events. Due to the heterogeneity and complexity of cyber security data, ofte… ▽ More

    Submitted 24 May, 2022; v1 submitted 20 December, 2021; originally announced December 2021.

  6. arXiv:2112.06356  [pdf, other

    cs.CR

    Evaluation of Security Training and Awareness Programs: Review of Current Practices and Guideline

    Authors: Asangi Jayatilaka, Nathan Beu, Irina Baetu, Mansooreh Zahedi, M. Ali Babar, Laura Hartley, Winston Lewinsmith

    Abstract: Evaluating the effectiveness of security awareness and training programs is critical for minimizing organizations' human security risk. Based on a literature review and industry interviews, we discuss current practices and devise guidelines for measuring the effectiveness of security training and awareness initiatives used by organizations

    Submitted 12 December, 2021; originally announced December 2021.

    Comments: 12 pages

  7. arXiv:2112.00853  [pdf

    cs.CR

    On the Scalability of Big Data Cyber Security Analytics Systems

    Authors: Faheem Ullah, Muhammad Ali Babar

    Abstract: Big Data Cyber Security Analytics (BDCA) systems use big data technologies (e.g., Apache Spark) to collect, store, and analyze a large volume of security event data for detecting cyber-attacks. The volume of digital data in general and security event data in specific is increasing exponentially. The velocity with which the security event data is generated and fed into a BDCA system is unpredictabl… ▽ More

    Submitted 28 November, 2021; originally announced December 2021.

  8. arXiv:2110.01927  [pdf, other

    cs.SE cs.DC

    LogDP: Combining Dependency and Proximity for Log-based Anomaly Detection

    Authors: Yongzheng Xie, Hongyu Zhang, Bo Zhang, Muhammad Ali Babar, Sha Lu

    Abstract: Log analysis is an important technique that engineers use for troubleshooting faults of large-scale service-oriented systems. In this study, we propose a novel semi-supervised log-based anomaly detection approach, LogDP, which utilizes the dependency relationships among log events and proximity among log sequences to detect the anomalies in massive unlabeled log data. LogDP divides log events into… ▽ More

    Submitted 5 October, 2021; originally announced October 2021.

  9. arXiv:2109.07260  [pdf, other

    cs.DB cs.DC

    Evaluation of Distributed Databases in Hybrid Clouds and Edge Computing: Energy, Bandwidth, and Storage Consumption

    Authors: Yaser Mansouri, Victor Prokhorenko, Faheem Ullah, M. Ali Babar

    Abstract: A benchmark study of modern distributed databases is an important source of information to select the right technology for managing data in the cloud-edge paradigms. To make the right decision, it is required to conduct an extensive experimental study on a variety of hardware infrastructures. While most of the state-of-the-art studies have investigated only response time and scalability of distrib… ▽ More

    Submitted 8 January, 2023; v1 submitted 15 September, 2021; originally announced September 2021.

    Comments: 19 pages, 13 figures

  10. arXiv:2109.05740  [pdf, other

    cs.SE

    Data Preparation for Software Vulnerability Prediction: A Systematic Literature Review

    Authors: Roland Croft, Yongzheng Xie, M. Ali Babar

    Abstract: Software Vulnerability Prediction (SVP) is a data-driven technique for software quality assurance that has recently gained considerable attention in the Software Engineering research community. However, the difficulties of preparing Software Vulnerability (SV) related data is considered as the main barrier to industrial adoption of SVP approaches. Given the increasing, but dispersed, literature on… ▽ More

    Submitted 26 April, 2022; v1 submitted 13 September, 2021; originally announced September 2021.

    Comments: Accepted for publication in TSE

  11. arXiv:2109.04029  [pdf, other

    cs.CR cs.AI cs.LG

    Automated Security Assessment for the Internet of Things

    Authors: Xuanyu Duan, Mengmeng Ge, Triet H. M. Le, Faheem Ullah, Shang Gao, Xuequan Lu, M. Ali Babar

    Abstract: Internet of Things (IoT) based applications face an increasing number of potential security risks, which need to be systematically assessed and addressed. Expert-based manual assessment of IoT security is a predominant approach, which is usually inefficient. To address this problem, we propose an automated security assessment framework for IoT networks. Our framework first leverages machine learni… ▽ More

    Submitted 9 September, 2021; originally announced September 2021.

    Comments: Accepted for publication at the 26th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2021)

  12. arXiv:2108.08041  [pdf, other

    cs.SE cs.CR cs.LG

    DeepCVA: Automated Commit-level Vulnerability Assessment with Deep Multi-task Learning

    Authors: Triet H. M. Le, David Hin, Roland Croft, M. Ali Babar

    Abstract: It is increasingly suggested to identify Software Vulnerabilities (SVs) in code commits to give early warnings about potential security risks. However, there is a lack of effort to assess vulnerability-contributing commits right after they are detected to provide timely information about the exploitability, impact and severity of SVs. Such information is important to plan and prioritize the mitiga… ▽ More

    Submitted 18 August, 2021; originally announced August 2021.

    Comments: Accepted as a full paper at the 36th IEEE/ACM International Conference on Automated Software Engineering (ASE) 2021

  13. arXiv:2108.06705  [pdf, other

    cs.SE

    A Qualitative Study of Architectural Design Issues in DevOps

    Authors: Mojtaba Shahin, Ali Rezaei Nasab, Muhammad Ali Babar

    Abstract: Software architecture is critical in succeeding with DevOps. However, designing software architectures that enable and support DevOps (DevOps-driven software architectures) is a challenge for organizations. We assert that one of the essential steps towards characterizing DevOps-driven architectures is to understand architectural design issues raised in DevOps. At the same time, some of the archite… ▽ More

    Submitted 12 November, 2021; v1 submitted 15 August, 2021; originally announced August 2021.

    Comments: Preprint accepted for publication in Journal of Software: Evolution and Process, 2021. 38 Pages, 6 Tables, 11 Figures. This article is an extended version of the ICSSP2020 paper (the preprint is available at arXiv:2003.06108). arXiv admin note: text overlap with arXiv:2003.06108

  14. arXiv:2108.04766  [pdf

    cs.CR cs.CY cs.HC

    Falling for Phishing: An Empirical Investigation into People's Email Response Behaviors

    Authors: Asangi Jayatilaka, Nalin Asanka Gamagedara Arachchilage, Muhammad Ali Babar

    Abstract: Despite sophisticated phishing email detection systems, and training and awareness programs, humans continue to be tricked by phishing emails. In an attempt to better understand why phishing email attacks still work and how best to mitigate them, we have carried out an empirical study to investigate people's thought processes when reading their emails. We used a scenario-based role-play "think alo… ▽ More

    Submitted 6 October, 2021; v1 submitted 10 August, 2021; originally announced August 2021.

    Comments: The 42nd International Conference on Information Systems (ICIS'21), Austin, Texas, USA, 2021, 17

    Journal ref: The 42nd International Conference on Information Systems (ICIS'21), Austin, Texas, USA, 2021, 17

  15. arXiv:2108.02133  [pdf

    cs.SE

    The Impact of Traceability on Software Maintenance and Evolution: A Map** Study

    Authors: Fangchao Tian, Tianlu Wang, Peng Liang, Chong Wang, Arif Ali Khan, Muhammad Ali Babar

    Abstract: Software traceability plays a critical role in software maintenance and evolution. We conducted a systematic map** study with six research questions to understand the benefits, costs, and challenges of using traceability in maintenance and evolution. We systematically selected, analyzed, and synthesized 63 studies published between January 2000 and May 2020, and the results show that: traceabili… ▽ More

    Submitted 4 August, 2021; originally announced August 2021.

    Comments: Preprint accepted for publication in Journal of Software: Evolution and Process, 2021

  16. arXiv:2108.01018  [pdf

    cs.SE

    Relationships between Software Architecture and Source Code in Practice: An Exploratory Survey and Interview

    Authors: Fangchao Tian, Peng Liang, Muhammad Ali Babar

    Abstract: Context: Software Architecture (SA) and Source Code (SC) are two intertwined artefacts that represent the interdependent design decisions made at different levels of abstractions - High-Level (HL) and Low-Level (LL). An understanding of the relationships between SA and SC is expected to bridge the gap between SA and SC for supporting maintenance and evolution of software systems. Objective: We aim… ▽ More

    Submitted 2 August, 2021; originally announced August 2021.

    Comments: Preprint accepted for publication in Information and Software Technology, 2021

  17. arXiv:2107.13723  [pdf, other

    cs.SE cs.CR

    An Empirical Study of Developers' Discussions about Security Challenges of Different Programming Languages

    Authors: Roland Croft, Yongzheng Xie, Mansooreh Zahedi, M. Ali Babar, Christoph Treude

    Abstract: Given programming languages can provide different types and levels of security support, it is critically important to consider security aspects while selecting programming languages for develo** software systems. Inadequate consideration of security in the choice of a programming language may lead to potential ramifications for secure development. Whilst theoretical analysis of the supposed secu… ▽ More

    Submitted 26 November, 2021; v1 submitted 28 July, 2021; originally announced July 2021.

    Comments: To be published in EMSE

  18. arXiv:2107.08364  [pdf, other

    cs.SE cs.AI cs.CR cs.LG

    A Survey on Data-driven Software Vulnerability Assessment and Prioritization

    Authors: Triet H. M. Le, Huaming Chen, M. Ali Babar

    Abstract: Software Vulnerabilities (SVs) are increasing in complexity and scale, posing great security risks to many software systems. Given the limited resources in practice, SV assessment and prioritization help practitioners devise optimal SV mitigation plans based on various SV characteristics. The surges in SV data sources and data-driven techniques such as Machine Learning and Deep Learning have taken… ▽ More

    Submitted 3 April, 2022; v1 submitted 18 July, 2021; originally announced July 2021.

    Comments: Accepted for publication in the ACM Computing Surveys journal (CSUR), 2022

    Journal ref: ACM Comput. Surv., 55, 5 (2022), Article 100

  19. arXiv:2107.02096  [pdf, other

    cs.CR cs.SE

    An Empirical Analysis of Practitioners' Perspectives on Security Tool Integration into DevOps

    Authors: Roshan Namal Rajapakse, Mansooreh Zahedi, Muhammad Ali Babar

    Abstract: Background: Security tools play a vital role in enabling developers to build secure software. However, it can be quite challenging to introduce and fully leverage security tools without affecting the speed or frequency of deployments in the DevOps paradigm. Aims: We aim to empirically investigate the key challenges practitioners face when integrating security tools into a DevOps workflow in order… ▽ More

    Submitted 19 July, 2021; v1 submitted 5 July, 2021; originally announced July 2021.

    Comments: [v3] Camera-ready version (with a few improvements)

  20. arXiv:2107.01921  [pdf, other

    cs.SE

    An Empirical Study of Rule-Based and Learning-Based Approaches for Static Application Security Testing

    Authors: Roland Croft, Dominic Newlands, Ziyu Chen, M. Ali Babar

    Abstract: Background: Static Application Security Testing (SAST) tools purport to assist developers in detecting security issues in source code. These tools typically use rule-based approaches to scan source code for security vulnerabilities. However, due to the significant shortcomings of these tools (i.e., high false positive rates), learning-based approaches for Software Vulnerability Prediction (SVP) ar… ▽ More

    Submitted 15 July, 2021; v1 submitted 5 July, 2021; originally announced July 2021.

    Comments: To be published in ESEM 21; reduced length

  21. A Grounded Theory of the Role of Coordination in Software Security Patch Management

    Authors: Nesara Dissanayake, Mansooreh Zahedi, Asangi Jayatilaka, Muhammad Ali Babar

    Abstract: Several disastrous security attacks can be attributed to delays in patching software vulnerabilities. While researchers and practitioners have paid significant attention to automate vulnerabilities identification and patch development activities of software security patch management, there has been relatively little effort dedicated to gain an in-depth understanding of the socio-technical aspects,… ▽ More

    Submitted 18 June, 2021; v1 submitted 7 June, 2021; originally announced June 2021.

    Comments: Accepted for publication at the 29th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE '21)

  22. arXiv:2104.11906  [pdf, other

    cs.CR eess.SY

    A Review on C3I Systems' Security: Vulnerabilities, Attacks, and Countermeasures

    Authors: Hussain Ahmad, Isuru Dharmadasa, Faheem Ullah, M. Ali Babar

    Abstract: Command, Control, Communication, and Intelligence (C3I) systems are increasingly used in critical civil and military domains for achieving information superiority, operational efficacy, and greater situational awareness. Unlike traditional systems facing widespread cyber-attacks, the sensitive nature of C3I tactical operations make their cybersecurity a critical concern. For instance, tampering or… ▽ More

    Submitted 31 January, 2022; v1 submitted 24 April, 2021; originally announced April 2021.

  23. arXiv:2104.01340  [pdf, ps, other

    gr-qc

    Retrolensing by a spherically symmetric naked singularity

    Authors: Gulmina Zaman Babar, Farruh Atamurotov, Abdullah Zaman Babar, Yen-Kheng Lim

    Abstract: Considering a strong field limit, we investigate the retrolensing phenomenon in the vicinity of a Janis-Newman-Winicour (JNW) naked singularity embedded in a scalar field. We assume that the light rays from a nearby source are reflected by the photon sphere of the naked singularity, acting as a lens, to create a pair of images. The analytic expressions of the lensing coefficients $\bar{a}$ and… ▽ More

    Submitted 6 December, 2021; v1 submitted 3 April, 2021; originally announced April 2021.

    Comments: 16 pages, 7 figures

  24. Automated Software Vulnerability Assessment with Concept Drift

    Authors: Triet H. M. Le, Bushra Sabir, M. Ali Babar

    Abstract: Software Engineering researchers are increasingly using Natural Language Processing (NLP) techniques to automate Software Vulnerabilities (SVs) assessment using the descriptions in public repositories. However, the existing NLP-based approaches suffer from concept drift. This problem is caused by a lack of proper treatment of new (out-of-vocabulary) terms for the evaluation of unseen SVs over time… ▽ More

    Submitted 21 March, 2021; originally announced March 2021.

    Comments: Published as a full paper at the 16th International Conference on Mining Software Repositories 2019

    Journal ref: Proceedings of the 16th International Conference on Mining Software Repositories, 2019, pp. 371-382

  25. arXiv:2103.08306  [pdf, other

    cs.LG cs.AI

    ReinforceBug: A Framework to Generate Adversarial Textual Examples

    Authors: Bushra Sabir, M. Ali Babar, Raj Gaire

    Abstract: Adversarial Examples (AEs) generated by perturbing original training examples are useful in improving the robustness of Deep Learning (DL) based models. Most prior works, generate AEs that are either unconscionable due to lexical errors or semantically or functionally deviant from original examples. In this paper, we present ReinforceBug, a reinforcement learning framework, that learns a policy th… ▽ More

    Submitted 11 March, 2021; originally announced March 2021.

    Comments: Accepted in NAACL-HLT 2021

  26. Challenges and solutions when adopting DevSecOps: A systematic review

    Authors: Roshan N. Rajapakse, Mansooreh Zahedi, M. Ali Babar, Haifeng Shen

    Abstract: Context: DevOps has become one of the fastest-growing software development paradigms in the industry. However, this trend has presented the challenge of ensuring secure software delivery while maintaining the agility of DevOps. The efforts to integrate security in DevOps have resulted in the DevSecOps paradigm, which is gaining significant interest from both industry and academia. However, the ado… ▽ More

    Submitted 29 July, 2021; v1 submitted 15 March, 2021; originally announced March 2021.

    Comments: Addressed reviewer comments from the Information and Software Technology (IST) journal

    Journal ref: Information and software technology 141 (2022) 106700

  27. arXiv:2103.00316  [pdf, ps, other

    gr-qc

    Gravitational lensing in 4-D Einstein-Gauss-Bonnet gravity in the presence of plasma

    Authors: Gulmina Zaman Babar, Farruh Atamurotov, Abdullah Zaman Babar

    Abstract: In this paper we have assumed a weak-field regime to explore the gravitational lensed photons in a 4 dimensional Einstein-Gauss-Bonnet gravity, which is very much in the limelight these days. The investigation is conducted in three distinct paradigms: uniform plasma, singular isothermal sphere and a non-singular isothermal sphere. The lensing angle associated with the distribution factor of the me… ▽ More

    Submitted 2 August, 2021; v1 submitted 27 February, 2021; originally announced March 2021.

    Comments: 10 pages, 13 figures

    Journal ref: Physics of the Dark Universe, 32 (2021) 100798

  28. arXiv:2101.10412  [pdf

    cs.CR cs.SE

    End-Users' Knowledge and Perception about Security of Mobile Health Apps: A Case Study with Two Saudi Arabian mHealth Providers

    Authors: Bakheet Aljedaani, Aakash Ahmad, Mansooreh Zahedi, M. Ali Babar

    Abstract: Mobile health applications (mHealth apps for short) are being increasingly adopted in the healthcare sector, enabling stakeholders such as governments, health units, medics, and patients, to utilize health services in a pervasive manner. Despite having several known benefits, mHealth apps entail significant security and privacy challenges that can lead to data breaches with serious social, legal,… ▽ More

    Submitted 23 September, 2021; v1 submitted 25 January, 2021; originally announced January 2021.

    Comments: This research is 29 pages. It has 9 figures, and 7 tables

  29. arXiv:2012.09344  [pdf, other

    cs.CR cs.LG

    Machine Learning for Detecting Data Exfiltration: A Review

    Authors: Bushra Sabir, Faheem Ullah, M. Ali Babar, Raj Gaire

    Abstract: Context: Research at the intersection of cybersecurity, Machine Learning (ML), and Software Engineering (SE) has recently taken significant steps in proposing countermeasures for detecting sophisticated data exfiltration attacks. It is important to systematically review and synthesize the ML-based data exfiltration countermeasures for building a body of knowledge on this important topic. Objective… ▽ More

    Submitted 21 March, 2021; v1 submitted 16 December, 2020; originally announced December 2020.

  30. arXiv:2012.03754  [pdf

    cs.LG cs.AI cs.CR

    Deep Learning Methods for Credit Card Fraud Detection

    Authors: Thanh Thi Nguyen, Hammad Tahir, Mohamed Abdelrazek, Ali Babar

    Abstract: Credit card frauds are at an ever-increasing rate and have become a major problem in the financial sector. Because of these frauds, card users are hesitant in making purchases and both the merchants and financial institutions bear heavy losses. Some major challenges in credit card frauds involve the availability of public data, high class imbalance in data, changing nature of frauds and the high n… ▽ More

    Submitted 7 December, 2020; originally announced December 2020.

  31. arXiv:2012.00544  [pdf, other

    cs.SE

    Software Security Patch Management -- A Systematic Literature Review of Challenges, Approaches, Tools and Practices

    Authors: Nesara Dissanayake, Asangi Jayatilaka, Mansooreh Zahedi, M. Ali Babar

    Abstract: Context: Software security patch management purports to support the process of patching known software security vulnerabilities. Given the increasing recognition of the importance of software security patch management, it is important and timely to systematically review and synthesise the relevant literature on this topic. Objective: This paper aims at systematically reviewing the state of the a… ▽ More

    Submitted 19 August, 2021; v1 submitted 1 December, 2020; originally announced December 2020.

    Comments: 45 pages, 7 figures

  32. arXiv:2008.13009  [pdf

    cs.SE

    Security Awareness of End-Users of Mobile Health Applications: An Empirical Study

    Authors: Bakheet Aljedaani, Aakash Ahmad, Mansooreh Zahedi, M. Ali Babar

    Abstract: Mobile systems offer portable and interactive computing, empowering users, to exploit a multitude of context-sensitive services, including mobile healthcare. Mobile health applications (i.e., mHealth apps) are revolutionizing the healthcare sector by enabling stakeholders to produce and consume healthcare services. A widespread adoption of mHealth technologies and rapid increase in mHealth apps en… ▽ More

    Submitted 29 August, 2020; originally announced August 2020.

    Comments: 10 pages, 4 figures, 5 tables

  33. Optical properties of Kerr-Newman spacetime in the presence of plasma

    Authors: Gulmina Zaman Babar, Abdullah Zaman Babar, Farruh Atamurotov

    Abstract: We have studied the null geodesics in the background of the Kerr-Newman black hole veiled by a plasma medium using the Hamilton-Jacobi method. The in uence of black hole's charge and plasma parameters on the effective potential and the generic photon orbits has been investigated. Furthermore, our discussion embodies the effects of black hole's charge, plasma and the inclination angle on the shadow… ▽ More

    Submitted 9 June, 2022; v1 submitted 13 August, 2020; originally announced August 2020.

    Comments: 10 pages, 8 figures, some mistakes are corrected

    Journal ref: Eur. Phys. J. C 80 (2020) 761; Eur. Phys. J. C 82 (2022) 405 (Erratum)

  34. Challenges in Docker Development: A Large-scale Study Using Stack Overflow

    Authors: Mubin Ul Haque, Leonardo Horn Iwaya, M. Ali Babar

    Abstract: Docker technology has been increasingly used among software developers in a multitude of projects. This growing interest is due to the fact that Docker technology supports a convenient process for creating and building containers, promoting close cooperation between developer and operations teams, and enabling continuous software delivery. As a fast-growing technology, it is important to identify… ▽ More

    Submitted 10 August, 2020; originally announced August 2020.

    Comments: 11 pages, 3 Figures, conference

  35. A Large-scale Study of Security Vulnerability Support on Developer Q&A Websites

    Authors: Triet H. M. Le, Roland Croft, David Hin, M. Ali Babar

    Abstract: Context: Security Vulnerabilities (SVs) pose many serious threats to software systems. Developers usually seek solutions to addressing these SVs on developer Question and Answer (Q&A) websites. However, there is still little known about on-going SV-specific discussions on different developer Q&A sites. Objective: We present a large-scale empirical study to understand developers' SV discussions and… ▽ More

    Submitted 21 April, 2021; v1 submitted 10 August, 2020; originally announced August 2020.

    Comments: Accepted for publication at the 25th International Conference on Evaluation and Assessment in Software Engineering (EASE 2021)

  36. arXiv:2008.03034  [pdf

    cs.SE cs.CY

    An Empirical Study on Develo** Secure Mobile Health Apps: The Developers Perspective

    Authors: Bakheet Aljedaani, Aakash Ahmad, Mansooreh Zahedi, M. Ali Babar

    Abstract: Mobile apps exploit embedded sensors and wireless connectivity of a device to empower users with portable computations, context-aware communication, and enhanced interaction. Specifically, mobile health apps (mHealth apps for short) are becoming integral part of mobile and pervasive computing to improve the availability and quality of healthcare services. Despite the offered benefits, mHealth apps… ▽ More

    Submitted 7 August, 2020; originally announced August 2020.

    Comments: 10 pages, 5 figures

  37. arXiv:2007.15826  [pdf, other

    cs.DC

    The Impact of Distance on Performance and Scalability of Distributed Database Systems in Hybrid Clouds

    Authors: Yaser Mansouri, M. Ali Babar

    Abstract: The increasing need for managing big data has led the emergence of advanced database management systems. There has been increased efforts aimed at evaluating the performance and scalability of NoSQL and Relational databases hosted by either private or public cloud datacenters. However, there has been little work on evaluating the performance and scalability of these databases in hybrid clouds, whe… ▽ More

    Submitted 30 July, 2020; originally announced July 2020.

    Comments: 26 pages

  38. arXiv:2007.10876  [pdf

    cs.SE

    Challenges in Develo** Secure Mobile Health Applications, A Systematic Review

    Authors: Bakheet Aljedaani, M. Ali Babar

    Abstract: Mobile health (mHealth) applications (apps) have gained significant popularity over the last few years due to its tremendous benefits, such as lowering healthcare cost and increasing patient awareness. However, the sensitivity of healthcare data makes the security of mHealth apps a serious concern. In this review, we aim to identify and analyse the reported challenges that the developers of mHealt… ▽ More

    Submitted 15 January, 2021; v1 submitted 21 July, 2020; originally announced July 2020.

    Comments: This paper has 5 figures and 1 table

  39. arXiv:2006.14185  [pdf, ps, other

    cs.GT

    Optimizing Affine Maximizer Auctions via Linear Programming: an Application to Revenue Maximizing Mechanism Design for Zero-Day Exploits Markets

    Authors: Mingyu Guo, Hideaki Hata, Ali Babar

    Abstract: Optimizing within the affine maximizer auctions (AMA) is an effective approach for revenue maximizing mechanism design. The AMA mechanisms are strategy-proof and individually rational (if the agents' valuations for the outcomes are nonnegative). Every AMA mechanism is characterized by a list of parameters. By focusing on the AMA mechanisms, we turn mechanism design into a value optimization proble… ▽ More

    Submitted 25 June, 2020; originally announced June 2020.

    Journal ref: PRIMA 2017: Principles and Practice of Multi-Agent Systems

  40. arXiv:2006.14184  [pdf, ps, other

    cs.GT

    Revenue Maximizing Markets for Zero-Day Exploits

    Authors: Mingyu Guo, Hideaki Hata, Ali Babar

    Abstract: Markets for zero-day exploits (software vulnerabilities unknown to the vendor) have a long history and a growing popularity. We study these markets from a revenue-maximizing mechanism design perspective. We first propose a theoretical model for zero-day exploits markets. In our model, one exploit is being sold to multiple buyers. There are two kinds of buyers, which we call the defenders and the o… ▽ More

    Submitted 25 June, 2020; originally announced June 2020.

    Journal ref: PRIMA 2016: Principles and Practice of Multi-Agent Systems

  41. arXiv:2006.14177  [pdf, ps, other

    cs.GT

    Cost Sharing Security Information with Minimal Release Delay

    Authors: Mingyu Guo, Yong Yang, Muhammad Ali Babar

    Abstract: We study a cost sharing problem derived from bug bounty programs, where agents gain utility by the amount of time they get to enjoy the cost shared information. Once the information is provided to an agent, it cannot be retracted. The goal, instead of maximizing revenue, is to pick a time as early as possible, so that enough agents are willing to cost share the information and enjoy it for a premi… ▽ More

    Submitted 25 June, 2020; originally announced June 2020.

    Journal ref: PRIMA 2018: Principles and Practice of Multi-Agent Systems

  42. Security and Privacy for mHealth and uHealth Systems: a Systematic Map** Study

    Authors: Leonardo Horn Iwaya, Aakash Ahmad, M. Ali Babar

    Abstract: An increased adoption of mobile health (mHealth) and ubiquitous health (uHealth) systems empower users with handheld devices and embedded sensors for a broad range of healthcare services. However, m/uHealth systems face significant challenges related to data security and privacy that must be addressed to increase the pervasiveness of such systems. This study aims to systematically identify, classi… ▽ More

    Submitted 22 June, 2020; originally announced June 2020.

    Comments: 29 pages, 10 figures, in IEEE Access, 2020

  43. arXiv:2006.02833  [pdf, other

    cs.DC

    An Automated Implementation of Hybrid Cloud for Performance Evaluation of Distributed Databases

    Authors: Yaser Mansouri, Victor Prokhorenko, M. Ali Babar

    Abstract: A Hybrid cloud is an integration of resources between private and public clouds. It enables users to horizontally scale their on-premises infrastructure up to public clouds in order to improve performance and cut up-front investment cost. This model of applications deployment is called cloud bursting that allows data-intensive applications especially distributed database systems to have the benefi… ▽ More

    Submitted 4 June, 2020; originally announced June 2020.

    Journal ref: Journal of Network and Computer Applications (JNCA), 2020

  44. arXiv:2005.08454  [pdf, other

    cs.CR cs.LG

    Reliability and Robustness analysis of Machine Learning based Phishing URL Detectors

    Authors: Bushra Sabir, M. Ali Babar, Raj Gaire, Alsharif Abuadbba

    Abstract: ML-based Phishing URL (MLPU) detectors serve as the first level of defence to protect users and organisations from being victims of phishing attacks. Lately, few studies have launched successful adversarial attacks against specific MLPU detectors raising questions about their practical reliability and usage. Nevertheless, the robustness of these systems has not been extensively investigated. There… ▽ More

    Submitted 24 November, 2022; v1 submitted 18 May, 2020; originally announced May 2020.

    Comments: Accepted in Transactions of Dependable and Secure Computing (SI-Reliability and Robustness in AI-Based Cybersecurity Solutions)

  45. arXiv:2005.07883  [pdf

    cs.SE

    Architectural Design Space for Modelling and Simulation as a Service: A Review

    Authors: Mojtaba Shahin, M. Ali Babar, Muhammad Aufeef Chauhan

    Abstract: Modelling and Simulation as a Service (MSaaS) is a promising approach to deploy and execute Modelling and Simulation (M&S) applications quickly and on-demand. An appropriate software architecture is essential to deliver quality M&S applications following the MSaaS concept to a wide range of users. This study aims to characterize the state-of-the-art MSaaS architectures by conducting a systematic r… ▽ More

    Submitted 31 July, 2020; v1 submitted 16 May, 2020; originally announced May 2020.

    Comments: 38 Pages, To appear in Journal of Systems and Software (JSS), 2020

  46. arXiv:2003.06108  [pdf

    cs.SE

    On the Role of Software Architecture in DevOps Transformation: An Industrial Case Study

    Authors: Mojtaba Shahin, M. Ali Babar

    Abstract: Development and Operations (DevOps), a particular type of Continuous Software Engineering, has become a popular Software System Engineering paradigm. Software architecture is critical in succeeding with DevOps. However, there is little evidence-based knowledge of how software systems are architected in the industry to enable and support DevOps. Since architectural decisions, along with their ratio… ▽ More

    Submitted 13 March, 2020; originally announced March 2020.

    Comments: 10 pages, To appear in International Conference on Software and Systems Process (ICSSP 2020)

  47. arXiv:2003.03741  [pdf

    cs.SE cs.IR cs.LG

    PUMiner: Mining Security Posts from Developer Question and Answer Websites with PU Learning

    Authors: Triet H. M. Le, David Hin, Roland Croft, M. Ali Babar

    Abstract: Security is an increasing concern in software development. Developer Question and Answer (Q&A) websites provide a large amount of security discussion. Existing studies have used human-defined rules to mine security discussions, but these works still miss many posts, which may lead to an incomplete analysis of the security practices reported on Q&A websites. Traditional supervised Machine Learning… ▽ More

    Submitted 8 March, 2020; originally announced March 2020.

    Comments: Accepted for publication at the 17th Mining Software Repositories 2020 conference

  48. arXiv:2002.11382  [pdf, other

    cs.GT

    Mechanism Design for Public Projects via Neural Networks

    Authors: Guanhua Wang, Runqi Guo, Yuko Sakurai, Ali Babar, Mingyu Guo

    Abstract: We study mechanism design for nonexcludable and excludable binary public project problems. We aim to maximize the expected number of consumers and the expected social welfare. For the nonexcludable public project model, we identify a sufficient condition on the prior distribution for the conservative equal costs mechanism to be the optimal strategy-proof and individually rational mechanism. For ge… ▽ More

    Submitted 26 February, 2020; originally announced February 2020.

  49. arXiv:2002.09190  [pdf

    cs.CR cs.SE

    A Multi-Vocal Review of Security Orchestration

    Authors: Chadni Islam, M. Ali Babar, Surya Nepal

    Abstract: Organizations use diverse types of security solutions to prevent cyberattacks. Multiple vendors provide security solutions developed using heterogeneous technologies and paradigms. Hence, it is a challenging rather impossible to easily make security solutions to work an integrated fashion. Security orchestration aims at smoothly integrating multivendor security tools that can effectively and effic… ▽ More

    Submitted 21 February, 2020; originally announced February 2020.

    Comments: This paper is published in ACM Computing Survey

    ACM Class: D.2

    Journal ref: ACM Comput. Surv. 52, 2, Article 37 (April 2019), 45 pages

  50. arXiv:2002.05442  [pdf, other

    cs.SE cs.AI cs.LG

    Deep Learning for Source Code Modeling and Generation: Models, Applications and Challenges

    Authors: Triet H. M. Le, Hao Chen, M. Ali Babar

    Abstract: Deep Learning (DL) techniques for Natural Language Processing have been evolving remarkably fast. Recently, the DL advances in language modeling, machine translation and paragraph understanding are so prominent that the potential of DL in Software Engineering cannot be overlooked, especially in the field of program learning. To facilitate further research and applications of DL in this field, we p… ▽ More

    Submitted 13 February, 2020; originally announced February 2020.

    Journal ref: ACM Comput. Surv., 53, 3 (2020), Article 62