Skip to main content

Showing 51–98 of 98 results for author: Babar, M A

.
  1. arXiv:2112.06356  [pdf, other

    cs.CR

    Evaluation of Security Training and Awareness Programs: Review of Current Practices and Guideline

    Authors: Asangi Jayatilaka, Nathan Beu, Irina Baetu, Mansooreh Zahedi, M. Ali Babar, Laura Hartley, Winston Lewinsmith

    Abstract: Evaluating the effectiveness of security awareness and training programs is critical for minimizing organizations' human security risk. Based on a literature review and industry interviews, we discuss current practices and devise guidelines for measuring the effectiveness of security training and awareness initiatives used by organizations

    Submitted 12 December, 2021; originally announced December 2021.

    Comments: 12 pages

  2. arXiv:2112.00853  [pdf

    cs.CR

    On the Scalability of Big Data Cyber Security Analytics Systems

    Authors: Faheem Ullah, Muhammad Ali Babar

    Abstract: Big Data Cyber Security Analytics (BDCA) systems use big data technologies (e.g., Apache Spark) to collect, store, and analyze a large volume of security event data for detecting cyber-attacks. The volume of digital data in general and security event data in specific is increasing exponentially. The velocity with which the security event data is generated and fed into a BDCA system is unpredictabl… ▽ More

    Submitted 28 November, 2021; originally announced December 2021.

  3. arXiv:2110.01927  [pdf, other

    cs.SE cs.DC

    LogDP: Combining Dependency and Proximity for Log-based Anomaly Detection

    Authors: Yongzheng Xie, Hongyu Zhang, Bo Zhang, Muhammad Ali Babar, Sha Lu

    Abstract: Log analysis is an important technique that engineers use for troubleshooting faults of large-scale service-oriented systems. In this study, we propose a novel semi-supervised log-based anomaly detection approach, LogDP, which utilizes the dependency relationships among log events and proximity among log sequences to detect the anomalies in massive unlabeled log data. LogDP divides log events into… ▽ More

    Submitted 5 October, 2021; originally announced October 2021.

  4. arXiv:2109.07260  [pdf, other

    cs.DB cs.DC

    Evaluation of Distributed Databases in Hybrid Clouds and Edge Computing: Energy, Bandwidth, and Storage Consumption

    Authors: Yaser Mansouri, Victor Prokhorenko, Faheem Ullah, M. Ali Babar

    Abstract: A benchmark study of modern distributed databases is an important source of information to select the right technology for managing data in the cloud-edge paradigms. To make the right decision, it is required to conduct an extensive experimental study on a variety of hardware infrastructures. While most of the state-of-the-art studies have investigated only response time and scalability of distrib… ▽ More

    Submitted 8 January, 2023; v1 submitted 15 September, 2021; originally announced September 2021.

    Comments: 19 pages, 13 figures

  5. arXiv:2109.05740  [pdf, other

    cs.SE

    Data Preparation for Software Vulnerability Prediction: A Systematic Literature Review

    Authors: Roland Croft, Yongzheng Xie, M. Ali Babar

    Abstract: Software Vulnerability Prediction (SVP) is a data-driven technique for software quality assurance that has recently gained considerable attention in the Software Engineering research community. However, the difficulties of preparing Software Vulnerability (SV) related data is considered as the main barrier to industrial adoption of SVP approaches. Given the increasing, but dispersed, literature on… ▽ More

    Submitted 26 April, 2022; v1 submitted 13 September, 2021; originally announced September 2021.

    Comments: Accepted for publication in TSE

  6. arXiv:2109.04029  [pdf, other

    cs.CR cs.AI cs.LG

    Automated Security Assessment for the Internet of Things

    Authors: Xuanyu Duan, Mengmeng Ge, Triet H. M. Le, Faheem Ullah, Shang Gao, Xuequan Lu, M. Ali Babar

    Abstract: Internet of Things (IoT) based applications face an increasing number of potential security risks, which need to be systematically assessed and addressed. Expert-based manual assessment of IoT security is a predominant approach, which is usually inefficient. To address this problem, we propose an automated security assessment framework for IoT networks. Our framework first leverages machine learni… ▽ More

    Submitted 9 September, 2021; originally announced September 2021.

    Comments: Accepted for publication at the 26th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2021)

  7. arXiv:2108.08041  [pdf, other

    cs.SE cs.CR cs.LG

    DeepCVA: Automated Commit-level Vulnerability Assessment with Deep Multi-task Learning

    Authors: Triet H. M. Le, David Hin, Roland Croft, M. Ali Babar

    Abstract: It is increasingly suggested to identify Software Vulnerabilities (SVs) in code commits to give early warnings about potential security risks. However, there is a lack of effort to assess vulnerability-contributing commits right after they are detected to provide timely information about the exploitability, impact and severity of SVs. Such information is important to plan and prioritize the mitiga… ▽ More

    Submitted 18 August, 2021; originally announced August 2021.

    Comments: Accepted as a full paper at the 36th IEEE/ACM International Conference on Automated Software Engineering (ASE) 2021

  8. arXiv:2108.06705  [pdf, other

    cs.SE

    A Qualitative Study of Architectural Design Issues in DevOps

    Authors: Mojtaba Shahin, Ali Rezaei Nasab, Muhammad Ali Babar

    Abstract: Software architecture is critical in succeeding with DevOps. However, designing software architectures that enable and support DevOps (DevOps-driven software architectures) is a challenge for organizations. We assert that one of the essential steps towards characterizing DevOps-driven architectures is to understand architectural design issues raised in DevOps. At the same time, some of the archite… ▽ More

    Submitted 12 November, 2021; v1 submitted 15 August, 2021; originally announced August 2021.

    Comments: Preprint accepted for publication in Journal of Software: Evolution and Process, 2021. 38 Pages, 6 Tables, 11 Figures. This article is an extended version of the ICSSP2020 paper (the preprint is available at arXiv:2003.06108). arXiv admin note: text overlap with arXiv:2003.06108

  9. arXiv:2108.04766  [pdf

    cs.CR cs.CY cs.HC

    Falling for Phishing: An Empirical Investigation into People's Email Response Behaviors

    Authors: Asangi Jayatilaka, Nalin Asanka Gamagedara Arachchilage, Muhammad Ali Babar

    Abstract: Despite sophisticated phishing email detection systems, and training and awareness programs, humans continue to be tricked by phishing emails. In an attempt to better understand why phishing email attacks still work and how best to mitigate them, we have carried out an empirical study to investigate people's thought processes when reading their emails. We used a scenario-based role-play "think alo… ▽ More

    Submitted 6 October, 2021; v1 submitted 10 August, 2021; originally announced August 2021.

    Comments: The 42nd International Conference on Information Systems (ICIS'21), Austin, Texas, USA, 2021, 17

    Journal ref: The 42nd International Conference on Information Systems (ICIS'21), Austin, Texas, USA, 2021, 17

  10. arXiv:2108.02133  [pdf

    cs.SE

    The Impact of Traceability on Software Maintenance and Evolution: A Map** Study

    Authors: Fangchao Tian, Tianlu Wang, Peng Liang, Chong Wang, Arif Ali Khan, Muhammad Ali Babar

    Abstract: Software traceability plays a critical role in software maintenance and evolution. We conducted a systematic map** study with six research questions to understand the benefits, costs, and challenges of using traceability in maintenance and evolution. We systematically selected, analyzed, and synthesized 63 studies published between January 2000 and May 2020, and the results show that: traceabili… ▽ More

    Submitted 4 August, 2021; originally announced August 2021.

    Comments: Preprint accepted for publication in Journal of Software: Evolution and Process, 2021

  11. arXiv:2108.01018  [pdf

    cs.SE

    Relationships between Software Architecture and Source Code in Practice: An Exploratory Survey and Interview

    Authors: Fangchao Tian, Peng Liang, Muhammad Ali Babar

    Abstract: Context: Software Architecture (SA) and Source Code (SC) are two intertwined artefacts that represent the interdependent design decisions made at different levels of abstractions - High-Level (HL) and Low-Level (LL). An understanding of the relationships between SA and SC is expected to bridge the gap between SA and SC for supporting maintenance and evolution of software systems. Objective: We aim… ▽ More

    Submitted 2 August, 2021; originally announced August 2021.

    Comments: Preprint accepted for publication in Information and Software Technology, 2021

  12. arXiv:2107.13723  [pdf, other

    cs.SE cs.CR

    An Empirical Study of Developers' Discussions about Security Challenges of Different Programming Languages

    Authors: Roland Croft, Yongzheng Xie, Mansooreh Zahedi, M. Ali Babar, Christoph Treude

    Abstract: Given programming languages can provide different types and levels of security support, it is critically important to consider security aspects while selecting programming languages for develo** software systems. Inadequate consideration of security in the choice of a programming language may lead to potential ramifications for secure development. Whilst theoretical analysis of the supposed secu… ▽ More

    Submitted 26 November, 2021; v1 submitted 28 July, 2021; originally announced July 2021.

    Comments: To be published in EMSE

  13. arXiv:2107.08364  [pdf, other

    cs.SE cs.AI cs.CR cs.LG

    A Survey on Data-driven Software Vulnerability Assessment and Prioritization

    Authors: Triet H. M. Le, Huaming Chen, M. Ali Babar

    Abstract: Software Vulnerabilities (SVs) are increasing in complexity and scale, posing great security risks to many software systems. Given the limited resources in practice, SV assessment and prioritization help practitioners devise optimal SV mitigation plans based on various SV characteristics. The surges in SV data sources and data-driven techniques such as Machine Learning and Deep Learning have taken… ▽ More

    Submitted 3 April, 2022; v1 submitted 18 July, 2021; originally announced July 2021.

    Comments: Accepted for publication in the ACM Computing Surveys journal (CSUR), 2022

    Journal ref: ACM Comput. Surv., 55, 5 (2022), Article 100

  14. arXiv:2107.02096  [pdf, other

    cs.CR cs.SE

    An Empirical Analysis of Practitioners' Perspectives on Security Tool Integration into DevOps

    Authors: Roshan Namal Rajapakse, Mansooreh Zahedi, Muhammad Ali Babar

    Abstract: Background: Security tools play a vital role in enabling developers to build secure software. However, it can be quite challenging to introduce and fully leverage security tools without affecting the speed or frequency of deployments in the DevOps paradigm. Aims: We aim to empirically investigate the key challenges practitioners face when integrating security tools into a DevOps workflow in order… ▽ More

    Submitted 19 July, 2021; v1 submitted 5 July, 2021; originally announced July 2021.

    Comments: [v3] Camera-ready version (with a few improvements)

  15. arXiv:2107.01921  [pdf, other

    cs.SE

    An Empirical Study of Rule-Based and Learning-Based Approaches for Static Application Security Testing

    Authors: Roland Croft, Dominic Newlands, Ziyu Chen, M. Ali Babar

    Abstract: Background: Static Application Security Testing (SAST) tools purport to assist developers in detecting security issues in source code. These tools typically use rule-based approaches to scan source code for security vulnerabilities. However, due to the significant shortcomings of these tools (i.e., high false positive rates), learning-based approaches for Software Vulnerability Prediction (SVP) ar… ▽ More

    Submitted 15 July, 2021; v1 submitted 5 July, 2021; originally announced July 2021.

    Comments: To be published in ESEM 21; reduced length

  16. A Grounded Theory of the Role of Coordination in Software Security Patch Management

    Authors: Nesara Dissanayake, Mansooreh Zahedi, Asangi Jayatilaka, Muhammad Ali Babar

    Abstract: Several disastrous security attacks can be attributed to delays in patching software vulnerabilities. While researchers and practitioners have paid significant attention to automate vulnerabilities identification and patch development activities of software security patch management, there has been relatively little effort dedicated to gain an in-depth understanding of the socio-technical aspects,… ▽ More

    Submitted 18 June, 2021; v1 submitted 7 June, 2021; originally announced June 2021.

    Comments: Accepted for publication at the 29th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE '21)

  17. arXiv:2104.11906  [pdf, other

    cs.CR eess.SY

    A Review on C3I Systems' Security: Vulnerabilities, Attacks, and Countermeasures

    Authors: Hussain Ahmad, Isuru Dharmadasa, Faheem Ullah, M. Ali Babar

    Abstract: Command, Control, Communication, and Intelligence (C3I) systems are increasingly used in critical civil and military domains for achieving information superiority, operational efficacy, and greater situational awareness. Unlike traditional systems facing widespread cyber-attacks, the sensitive nature of C3I tactical operations make their cybersecurity a critical concern. For instance, tampering or… ▽ More

    Submitted 31 January, 2022; v1 submitted 24 April, 2021; originally announced April 2021.

  18. Automated Software Vulnerability Assessment with Concept Drift

    Authors: Triet H. M. Le, Bushra Sabir, M. Ali Babar

    Abstract: Software Engineering researchers are increasingly using Natural Language Processing (NLP) techniques to automate Software Vulnerabilities (SVs) assessment using the descriptions in public repositories. However, the existing NLP-based approaches suffer from concept drift. This problem is caused by a lack of proper treatment of new (out-of-vocabulary) terms for the evaluation of unseen SVs over time… ▽ More

    Submitted 21 March, 2021; originally announced March 2021.

    Comments: Published as a full paper at the 16th International Conference on Mining Software Repositories 2019

    Journal ref: Proceedings of the 16th International Conference on Mining Software Repositories, 2019, pp. 371-382

  19. arXiv:2103.08306  [pdf, other

    cs.LG cs.AI

    ReinforceBug: A Framework to Generate Adversarial Textual Examples

    Authors: Bushra Sabir, M. Ali Babar, Raj Gaire

    Abstract: Adversarial Examples (AEs) generated by perturbing original training examples are useful in improving the robustness of Deep Learning (DL) based models. Most prior works, generate AEs that are either unconscionable due to lexical errors or semantically or functionally deviant from original examples. In this paper, we present ReinforceBug, a reinforcement learning framework, that learns a policy th… ▽ More

    Submitted 11 March, 2021; originally announced March 2021.

    Comments: Accepted in NAACL-HLT 2021

  20. Challenges and solutions when adopting DevSecOps: A systematic review

    Authors: Roshan N. Rajapakse, Mansooreh Zahedi, M. Ali Babar, Haifeng Shen

    Abstract: Context: DevOps has become one of the fastest-growing software development paradigms in the industry. However, this trend has presented the challenge of ensuring secure software delivery while maintaining the agility of DevOps. The efforts to integrate security in DevOps have resulted in the DevSecOps paradigm, which is gaining significant interest from both industry and academia. However, the ado… ▽ More

    Submitted 29 July, 2021; v1 submitted 15 March, 2021; originally announced March 2021.

    Comments: Addressed reviewer comments from the Information and Software Technology (IST) journal

    Journal ref: Information and software technology 141 (2022) 106700

  21. arXiv:2101.10412  [pdf

    cs.CR cs.SE

    End-Users' Knowledge and Perception about Security of Mobile Health Apps: A Case Study with Two Saudi Arabian mHealth Providers

    Authors: Bakheet Aljedaani, Aakash Ahmad, Mansooreh Zahedi, M. Ali Babar

    Abstract: Mobile health applications (mHealth apps for short) are being increasingly adopted in the healthcare sector, enabling stakeholders such as governments, health units, medics, and patients, to utilize health services in a pervasive manner. Despite having several known benefits, mHealth apps entail significant security and privacy challenges that can lead to data breaches with serious social, legal,… ▽ More

    Submitted 23 September, 2021; v1 submitted 25 January, 2021; originally announced January 2021.

    Comments: This research is 29 pages. It has 9 figures, and 7 tables

  22. arXiv:2012.09344  [pdf, other

    cs.CR cs.LG

    Machine Learning for Detecting Data Exfiltration: A Review

    Authors: Bushra Sabir, Faheem Ullah, M. Ali Babar, Raj Gaire

    Abstract: Context: Research at the intersection of cybersecurity, Machine Learning (ML), and Software Engineering (SE) has recently taken significant steps in proposing countermeasures for detecting sophisticated data exfiltration attacks. It is important to systematically review and synthesize the ML-based data exfiltration countermeasures for building a body of knowledge on this important topic. Objective… ▽ More

    Submitted 21 March, 2021; v1 submitted 16 December, 2020; originally announced December 2020.

  23. arXiv:2012.00544  [pdf, other

    cs.SE

    Software Security Patch Management -- A Systematic Literature Review of Challenges, Approaches, Tools and Practices

    Authors: Nesara Dissanayake, Asangi Jayatilaka, Mansooreh Zahedi, M. Ali Babar

    Abstract: Context: Software security patch management purports to support the process of patching known software security vulnerabilities. Given the increasing recognition of the importance of software security patch management, it is important and timely to systematically review and synthesise the relevant literature on this topic. Objective: This paper aims at systematically reviewing the state of the a… ▽ More

    Submitted 19 August, 2021; v1 submitted 1 December, 2020; originally announced December 2020.

    Comments: 45 pages, 7 figures

  24. arXiv:2008.13009  [pdf

    cs.SE

    Security Awareness of End-Users of Mobile Health Applications: An Empirical Study

    Authors: Bakheet Aljedaani, Aakash Ahmad, Mansooreh Zahedi, M. Ali Babar

    Abstract: Mobile systems offer portable and interactive computing, empowering users, to exploit a multitude of context-sensitive services, including mobile healthcare. Mobile health applications (i.e., mHealth apps) are revolutionizing the healthcare sector by enabling stakeholders to produce and consume healthcare services. A widespread adoption of mHealth technologies and rapid increase in mHealth apps en… ▽ More

    Submitted 29 August, 2020; originally announced August 2020.

    Comments: 10 pages, 4 figures, 5 tables

  25. Challenges in Docker Development: A Large-scale Study Using Stack Overflow

    Authors: Mubin Ul Haque, Leonardo Horn Iwaya, M. Ali Babar

    Abstract: Docker technology has been increasingly used among software developers in a multitude of projects. This growing interest is due to the fact that Docker technology supports a convenient process for creating and building containers, promoting close cooperation between developer and operations teams, and enabling continuous software delivery. As a fast-growing technology, it is important to identify… ▽ More

    Submitted 10 August, 2020; originally announced August 2020.

    Comments: 11 pages, 3 Figures, conference

  26. A Large-scale Study of Security Vulnerability Support on Developer Q&A Websites

    Authors: Triet H. M. Le, Roland Croft, David Hin, M. Ali Babar

    Abstract: Context: Security Vulnerabilities (SVs) pose many serious threats to software systems. Developers usually seek solutions to addressing these SVs on developer Question and Answer (Q&A) websites. However, there is still little known about on-going SV-specific discussions on different developer Q&A sites. Objective: We present a large-scale empirical study to understand developers' SV discussions and… ▽ More

    Submitted 21 April, 2021; v1 submitted 10 August, 2020; originally announced August 2020.

    Comments: Accepted for publication at the 25th International Conference on Evaluation and Assessment in Software Engineering (EASE 2021)

  27. arXiv:2008.03034  [pdf

    cs.SE cs.CY

    An Empirical Study on Develo** Secure Mobile Health Apps: The Developers Perspective

    Authors: Bakheet Aljedaani, Aakash Ahmad, Mansooreh Zahedi, M. Ali Babar

    Abstract: Mobile apps exploit embedded sensors and wireless connectivity of a device to empower users with portable computations, context-aware communication, and enhanced interaction. Specifically, mobile health apps (mHealth apps for short) are becoming integral part of mobile and pervasive computing to improve the availability and quality of healthcare services. Despite the offered benefits, mHealth apps… ▽ More

    Submitted 7 August, 2020; originally announced August 2020.

    Comments: 10 pages, 5 figures

  28. arXiv:2007.15826  [pdf, other

    cs.DC

    The Impact of Distance on Performance and Scalability of Distributed Database Systems in Hybrid Clouds

    Authors: Yaser Mansouri, M. Ali Babar

    Abstract: The increasing need for managing big data has led the emergence of advanced database management systems. There has been increased efforts aimed at evaluating the performance and scalability of NoSQL and Relational databases hosted by either private or public cloud datacenters. However, there has been little work on evaluating the performance and scalability of these databases in hybrid clouds, whe… ▽ More

    Submitted 30 July, 2020; originally announced July 2020.

    Comments: 26 pages

  29. arXiv:2007.10876  [pdf

    cs.SE

    Challenges in Develo** Secure Mobile Health Applications, A Systematic Review

    Authors: Bakheet Aljedaani, M. Ali Babar

    Abstract: Mobile health (mHealth) applications (apps) have gained significant popularity over the last few years due to its tremendous benefits, such as lowering healthcare cost and increasing patient awareness. However, the sensitivity of healthcare data makes the security of mHealth apps a serious concern. In this review, we aim to identify and analyse the reported challenges that the developers of mHealt… ▽ More

    Submitted 15 January, 2021; v1 submitted 21 July, 2020; originally announced July 2020.

    Comments: This paper has 5 figures and 1 table

  30. arXiv:2006.14177  [pdf, ps, other

    cs.GT

    Cost Sharing Security Information with Minimal Release Delay

    Authors: Mingyu Guo, Yong Yang, Muhammad Ali Babar

    Abstract: We study a cost sharing problem derived from bug bounty programs, where agents gain utility by the amount of time they get to enjoy the cost shared information. Once the information is provided to an agent, it cannot be retracted. The goal, instead of maximizing revenue, is to pick a time as early as possible, so that enough agents are willing to cost share the information and enjoy it for a premi… ▽ More

    Submitted 25 June, 2020; originally announced June 2020.

    Journal ref: PRIMA 2018: Principles and Practice of Multi-Agent Systems

  31. Security and Privacy for mHealth and uHealth Systems: a Systematic Map** Study

    Authors: Leonardo Horn Iwaya, Aakash Ahmad, M. Ali Babar

    Abstract: An increased adoption of mobile health (mHealth) and ubiquitous health (uHealth) systems empower users with handheld devices and embedded sensors for a broad range of healthcare services. However, m/uHealth systems face significant challenges related to data security and privacy that must be addressed to increase the pervasiveness of such systems. This study aims to systematically identify, classi… ▽ More

    Submitted 22 June, 2020; originally announced June 2020.

    Comments: 29 pages, 10 figures, in IEEE Access, 2020

  32. arXiv:2006.02833  [pdf, other

    cs.DC

    An Automated Implementation of Hybrid Cloud for Performance Evaluation of Distributed Databases

    Authors: Yaser Mansouri, Victor Prokhorenko, M. Ali Babar

    Abstract: A Hybrid cloud is an integration of resources between private and public clouds. It enables users to horizontally scale their on-premises infrastructure up to public clouds in order to improve performance and cut up-front investment cost. This model of applications deployment is called cloud bursting that allows data-intensive applications especially distributed database systems to have the benefi… ▽ More

    Submitted 4 June, 2020; originally announced June 2020.

    Journal ref: Journal of Network and Computer Applications (JNCA), 2020

  33. arXiv:2005.08454  [pdf, other

    cs.CR cs.LG

    Reliability and Robustness analysis of Machine Learning based Phishing URL Detectors

    Authors: Bushra Sabir, M. Ali Babar, Raj Gaire, Alsharif Abuadbba

    Abstract: ML-based Phishing URL (MLPU) detectors serve as the first level of defence to protect users and organisations from being victims of phishing attacks. Lately, few studies have launched successful adversarial attacks against specific MLPU detectors raising questions about their practical reliability and usage. Nevertheless, the robustness of these systems has not been extensively investigated. There… ▽ More

    Submitted 24 November, 2022; v1 submitted 18 May, 2020; originally announced May 2020.

    Comments: Accepted in Transactions of Dependable and Secure Computing (SI-Reliability and Robustness in AI-Based Cybersecurity Solutions)

  34. arXiv:2005.07883  [pdf

    cs.SE

    Architectural Design Space for Modelling and Simulation as a Service: A Review

    Authors: Mojtaba Shahin, M. Ali Babar, Muhammad Aufeef Chauhan

    Abstract: Modelling and Simulation as a Service (MSaaS) is a promising approach to deploy and execute Modelling and Simulation (M&S) applications quickly and on-demand. An appropriate software architecture is essential to deliver quality M&S applications following the MSaaS concept to a wide range of users. This study aims to characterize the state-of-the-art MSaaS architectures by conducting a systematic r… ▽ More

    Submitted 31 July, 2020; v1 submitted 16 May, 2020; originally announced May 2020.

    Comments: 38 Pages, To appear in Journal of Systems and Software (JSS), 2020

  35. arXiv:2003.06108  [pdf

    cs.SE

    On the Role of Software Architecture in DevOps Transformation: An Industrial Case Study

    Authors: Mojtaba Shahin, M. Ali Babar

    Abstract: Development and Operations (DevOps), a particular type of Continuous Software Engineering, has become a popular Software System Engineering paradigm. Software architecture is critical in succeeding with DevOps. However, there is little evidence-based knowledge of how software systems are architected in the industry to enable and support DevOps. Since architectural decisions, along with their ratio… ▽ More

    Submitted 13 March, 2020; originally announced March 2020.

    Comments: 10 pages, To appear in International Conference on Software and Systems Process (ICSSP 2020)

  36. arXiv:2003.03741  [pdf

    cs.SE cs.IR cs.LG

    PUMiner: Mining Security Posts from Developer Question and Answer Websites with PU Learning

    Authors: Triet H. M. Le, David Hin, Roland Croft, M. Ali Babar

    Abstract: Security is an increasing concern in software development. Developer Question and Answer (Q&A) websites provide a large amount of security discussion. Existing studies have used human-defined rules to mine security discussions, but these works still miss many posts, which may lead to an incomplete analysis of the security practices reported on Q&A websites. Traditional supervised Machine Learning… ▽ More

    Submitted 8 March, 2020; originally announced March 2020.

    Comments: Accepted for publication at the 17th Mining Software Repositories 2020 conference

  37. arXiv:2002.09190  [pdf

    cs.CR cs.SE

    A Multi-Vocal Review of Security Orchestration

    Authors: Chadni Islam, M. Ali Babar, Surya Nepal

    Abstract: Organizations use diverse types of security solutions to prevent cyberattacks. Multiple vendors provide security solutions developed using heterogeneous technologies and paradigms. Hence, it is a challenging rather impossible to easily make security solutions to work an integrated fashion. Security orchestration aims at smoothly integrating multivendor security tools that can effectively and effic… ▽ More

    Submitted 21 February, 2020; originally announced February 2020.

    Comments: This paper is published in ACM Computing Survey

    ACM Class: D.2

    Journal ref: ACM Comput. Surv. 52, 2, Article 37 (April 2019), 45 pages

  38. arXiv:2002.05442  [pdf, other

    cs.SE cs.AI cs.LG

    Deep Learning for Source Code Modeling and Generation: Models, Applications and Challenges

    Authors: Triet H. M. Le, Hao Chen, M. Ali Babar

    Abstract: Deep Learning (DL) techniques for Natural Language Processing have been evolving remarkably fast. Recently, the DL advances in language modeling, machine translation and paragraph understanding are so prominent that the potential of DL in Software Engineering cannot be overlooked, especially in the field of program learning. To facilitate further research and applications of DL in this field, we p… ▽ More

    Submitted 13 February, 2020; originally announced February 2020.

    Journal ref: ACM Comput. Surv., 53, 3 (2020), Article 62

  39. Game theoretical modelling of network/cybersecurity

    Authors: Azhar Iqbal, Lachlan J. Gunn, Mingyu Guo, M. Ali Babar, Derek Abbott

    Abstract: Game theory is an established branch of mathematics that offers a rich set of mathematical tools for multi-person strategic decision making that can be used to model the interactions of decision makers in security problems who compete for limited and shared resources. This article presents a review of the literature in the area of game theoretical modelling of network/cybersecurity.

    Submitted 19 October, 2019; v1 submitted 24 January, 2019; originally announced January 2019.

    Comments: Revised, 21 pages, to appear in IEEE Access

    Journal ref: IEEE Access, Vol. 7, pp 154167-154179 (2019)

  40. Internet of Things Search Engine: Concepts, Classification, and Open Issues

    Authors: Nguyen Khoi Tran, Quan Z. Sheng, M. Ali Babar, Lina Yao, Wei Emma Zhang, Schahram Dustdar

    Abstract: This article focuses on the complicated yet still relatively immature area of the Internet of Things Search Engines (IoTSE). It introduces related concepts of IoTSE and a model called meta-path to describe and classify IoTSE systems based on their functionality. Based on these concepts, we have organized the research and development efforts on IoTSE into eight groups and presented the representati… ▽ More

    Submitted 7 December, 2018; originally announced December 2018.

    Comments: Accepted for publication in Communications of the ACM

  41. arXiv:1808.08796  [pdf

    cs.SE

    An Empirical Study of Architecting for Continuous Delivery and Deployment

    Authors: Mojtaba Shahin, Mansooreh Zahedi, Muhammad Ali Babar, Liming Zhu

    Abstract: Recently, many software organizations have been adopting Continuous Delivery and Continuous Deployment (CD) practices to develop and deliver quality software more frequently and reliably. Whilst an increasing amount of the literature covers different aspects of CD, little is known about the role of software architecture in CD and how an application should be (re-) architected to enable and support… ▽ More

    Submitted 27 August, 2018; originally announced August 2018.

    Comments: To appear in Empirical Software Engineering

  42. arXiv:1802.03178  [pdf

    cs.CR cs.SE

    Architectural Tactics for Big Data Cybersecurity Analytic Systems: A Review

    Authors: Faheem Ullah, M. Ali Babar

    Abstract: Context: Big Data Cybersecurity Analytics is aimed at protecting networks, computers, and data from unauthorized access by analysing security event data using big data tools and technologies. Whilst a plethora of Big Data Cybersecurity Analytic Systems have been reported in the literature, there is a lack of a systematic and comprehensive review of the literature from an architectural perspective.… ▽ More

    Submitted 9 February, 2018; originally announced February 2018.

  43. arXiv:1709.06224  [pdf, other

    cs.SE

    Understanding the Heterogeneity of Contributors in Bug Bounty Programs

    Authors: Hideaki Hata, Mingyu Guo, M. Ali Babar

    Abstract: Background: While bug bounty programs are not new in software development, an increasing number of companies, as well as open source projects, rely on external parties to perform the security assessment of their software for reward. However, there is relatively little empirical knowledge about the characteristics of bug bounty program contributors. Aim: This paper aims to understand those contribu… ▽ More

    Submitted 18 September, 2017; originally announced September 2017.

    Comments: 6 pages, ESEM 2017

  44. Continuous Integration, Delivery and Deployment: A Systematic Review on Approaches, Tools, Challenges and Practices

    Authors: Mojtaba Shahin, Muhammad Ali Babar, Liming Zhu

    Abstract: Context: Continuous practices, i.e., continuous integration, delivery, and deployment, are the software development industry practices that enable organizations to frequently and reliably release new features and products. With the increasing interest in and literature on continuous practices, it is important to systematically review and synthesize the approaches, tools, challenges, and practices… ▽ More

    Submitted 20 March, 2017; originally announced March 2017.

  45. arXiv:1703.04277  [pdf

    cs.SE cs.CR

    Security Support in Continuous Deployment Pipeline

    Authors: Faheem Ullah, Adam Johannes Raft, Mojtaba Shahin, Mansooreh Zahedi, Muhammad Ali Babar

    Abstract: Continuous Deployment (CD) has emerged as a new practice in the software industry to continuously and automatically deploy software changes into production. Continuous Deployment Pipeline (CDP) supports CD practice by transferring the changes from the repository to production. Since most of the CDP components run in an environment that has several interfaces to the Internet, these components are v… ▽ More

    Submitted 13 March, 2017; originally announced March 2017.

  46. Applying empirical software engineering to software architecture: challenges and lessons learned

    Authors: Davide Falessi, Muhammad Ali Babar, Giovanni Cantone, Philippe Kruchten

    Abstract: In the last 15 years, software architecture has emerged as an important software engineering field for managing the development and maintenance of large, software- intensive systems. Software architecture community has developed numerous methods, techniques, and tools to support the architecture process (analysis, design, and review). Historically, most advances in software architecture have been… ▽ More

    Submitted 21 January, 2017; originally announced January 2017.

    Journal ref: Empirical Software Engineering Journal, 15(3): pp. 250-276, 2010

  47. Software Architectures for Robotics Systems: A Systematic Map** Study

    Authors: Aakash Ahmad, Muhammad Ali Babar

    Abstract: Software architecture related issues are important for robotic systems. Architecture centric development and evolution of software for robotic systems has been attracting researchers attention for more than two decades. The objective of this work is to systematically identify, taxonomically classify and holistically map existing solutions, research progress and trends that influence architecture-d… ▽ More

    Submitted 19 January, 2017; originally announced January 2017.

    Journal ref: Journal of Systems and Software, 122, pp. 16-39 (2016)

  48. arXiv:1303.0405  [pdf

    cs.NI

    mSCTP Based Decentralized Mobility Framework

    Authors: Waqas Ahmed Imtiaz, Muhammad Afaq, Muhammad Asmatullah Khan Babar

    Abstract: To conceive the full potential of wireless IP services, Mobile Nodes (MNs) must be able to roam seamlessly across different networks. Mobile Stream Control Transmission Protocol (mSCTP) is a transport layer solution, which unlike Mobile IP (MIP), provides seamless mobility with minimum delay and negligible packet loss. However, mSCTP fails to locate the current IP address of the mobile node when C… ▽ More

    Submitted 2 March, 2013; originally announced March 2013.

    Comments: 7 Pages, Journal

    Journal ref: International Journal of Advanced Computer Science and Applications, Vol. 2, No.9, 2011, Page 106-112