Skip to main content

Showing 1–50 of 83 results for author: Moran, K

.
  1. arXiv:2404.01240  [pdf, other

    cs.SE cs.CL cs.CV cs.HC

    AURORA: Navigating UI Tarpits via Automated Neural Screen Understanding

    Authors: Safwat Ali Khan, Wenyu Wang, Yiran Ren, Bin Zhu, Jiangfan Shi, Alyssa McGowan, Wing Lam, Kevin Moran

    Abstract: Nearly a decade of research in software engineering has focused on automating mobile app testing to help engineers in overcoming the unique challenges associated with the software platform. Much of this work has come in the form of Automated Input Generation tools (AIG tools) that dynamically explore app screens. However, such tools have repeatedly been demonstrated to achieve lower-than-expected… ▽ More

    Submitted 1 April, 2024; originally announced April 2024.

    Comments: Published at 17th IEEE International Conference on Software Testing, Verification and Validation (ICST) 2024, 12 pages

  2. arXiv:2403.13690  [pdf, other

    cs.SE cs.CV cs.HC

    MotorEase: Automated Detection of Motor Impairment Accessibility Issues in Mobile App UIs

    Authors: Arun Krishnavajjala, SM Hasan Mansur, Justin Jose, Kevin Moran

    Abstract: Recent research has begun to examine the potential of automatically finding and fixing accessibility issues that manifest in software. However, while recent work makes important progress, it has generally been skewed toward identifying issues that affect users with certain disabilities, such as those with visual or hearing impairments. However, there are other groups of users with different types… ▽ More

    Submitted 20 March, 2024; originally announced March 2024.

    Comments: Accepted to ICSE 2024 Research Track, 13 pages

  3. arXiv:2403.08891  [pdf, other

    stat.AP astro-ph.GA astro-ph.IM astro-ph.SR

    Moving Towards Automated Interstellar Boundary Explorer Data Selection with LOTUS

    Authors: Madeline A. Stricklin, Lauren J. Beesley, Brian P. Weaver, Kelly R. Moran, Dave Osthus, Paul H. Janzen, Grant David Meadors, Daniel B. Reisenfeld

    Abstract: The Interstellar Boundary Explorer (IBEX) satellite collects data on energetic neutral atoms (ENAs) that provide insight into the heliosphere, the region surrounding our solar system and separating it from interstellar space. IBEX collects information on these particles and on extraneous ``background'' particles. While IBEX records how and when the different particles are observed, it does not dis… ▽ More

    Submitted 21 March, 2024; v1 submitted 13 March, 2024; originally announced March 2024.

  4. arXiv:2312.04722  [pdf, other

    stat.AP stat.ML

    Sensitivity Analysis in the Presence of Intrinsic Stochasticity for Discrete Fracture Network Simulations

    Authors: Alexander C. Murph, Justin D. Strait, Kelly R. Moran, Jeffrey D. Hyman, Hari S. Viswanathan, Philip H. Stauffer

    Abstract: Large-scale discrete fracture network (DFN) simulators are standard fare for studies involving the sub-surface transport of particles since direct observation of real world underground fracture networks is generally infeasible. While these simulators have seen numerous successes over several engineering applications, estimations on quantities of interest (QoI) - such as breakthrough time of partic… ▽ More

    Submitted 4 January, 2024; v1 submitted 7 December, 2023; originally announced December 2023.

    Comments: 23 pages, 6 figures, journal article

  5. arXiv:2311.17221  [pdf, other

    astro-ph.IM astro-ph.SR

    Empirical Validation of a New Data Product from the Interstellar Boundary Explorer Satellite

    Authors: Kelly R. Moran, Dave Osthus, Brian P. Weaver, Lauren J. Beesley, Madeline A. Stricklin, Paul H. Janzen, Daniel B. Reisenfeld

    Abstract: Since 2008, the Interstellar Boundary Explorer (IBEX) satellite has been gathering data on heliospheric energetic neutral atoms (ENAs) while being exposed to various sources of background noise, such as cosmic rays and solar energetic particles. The IBEX mission initially released only a qualified triple-coincidence (qABC) data product, which was designed to provide observations of ENAs free of ba… ▽ More

    Submitted 28 November, 2023; originally announced November 2023.

  6. arXiv:2311.11240  [pdf, other

    astro-ph.CO

    Cosmic-Enu: An emulator for the non-linear neutrino power spectrum

    Authors: Amol Upadhye, Juliana Kwan, Ian G. McCarthy, Jaime Salcido, Kelly R. Moran, Earl Lawrence, Yvonne Y. Y. Wong

    Abstract: Cosmology is poised to measure the neutrino mass sum $M_ν$ and has identified several smaller-scale observables sensitive to neutrinos, necessitating accurate predictions of neutrino clustering over a wide range of length scales. The FlowsForTheMasses non-linear perturbation theory for the massive neutrino power spectrum, $Δ^2_ν(k)$, agrees with its companion N-body simulation at the $10\%-15\%$ l… ▽ More

    Submitted 19 November, 2023; originally announced November 2023.

    Comments: 17 pages, 14 figures, 3 tables. Emulator code available at: https://github.com/upadhye/Cosmic-Enu

  7. arXiv:2310.08083  [pdf, other

    cs.SE cs.IR

    On Using GUI Interaction Data to Improve Text Retrieval-based Bug Localization

    Authors: Junayed Mahmud, Nadeeshan De Silva, Safwat Ali Khan, Seyed Hooman Mostafavi, SM Hasan Mansur, Oscar Chaparro, Andrian Marcus, Kevin Moran

    Abstract: One of the most important tasks related to managing bug reports is localizing the fault so that a fix can be applied. As such, prior work has aimed to automate this task of bug localization by formulating it as an information retrieval problem, where potentially buggy files are retrieved and ranked according to their textual similarity with a given bug report. However, there is often a notable sem… ▽ More

    Submitted 12 October, 2023; originally announced October 2023.

    Comments: 13 pages, to appear in the Proceedings of the 46th International Conference on Software Engineering (ICSE'24)

  8. arXiv:2310.06913  [pdf, other

    cs.SE cs.CL cs.IR

    A Comparative Study of Transformer-based Neural Text Representation Techniques on Bug Triaging

    Authors: Atish Kumar Dipongkor, Kevin Moran

    Abstract: Often, the first step in managing bug reports is related to triaging a bug to the appropriate developer who is best suited to understand, localize, and fix the target bug. Additionally, assigning a given bug to a particular part of a software project can help to expedite the fixing process. However, despite the importance of these activities, they are quite challenging, where days can be spent on… ▽ More

    Submitted 10 October, 2023; originally announced October 2023.

    Comments: 12 pages, to appear in the Proceedings of 38th IEEE/ACM International Conference on Automated Software Engineering (ASE'23)

  9. Helion: Enabling Natural Testing of Smart Homes

    Authors: Prianka Mandal, Sunil Manandhar, Kaushal Kafle, Kevin Moran, Denys Poshyvanyk, Adwait Nadkarni

    Abstract: Prior work has developed numerous systems that test the security and safety of smart homes. For these systems to be applicable in practice, it is necessary to test them with realistic scenarios that represent the use of the smart home, i.e., home automation, in the wild. This demo paper presents the technical details and usage of Helion, a system that uses n-gram language modeling to learn the reg… ▽ More

    Submitted 13 August, 2023; originally announced August 2023.

    Comments: To be published in Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering. arXiv admin note: text overlap with arXiv:1907.00124

  10. arXiv:2308.03873  [pdf, other

    cs.SE cs.LG

    Evaluating and Explaining Large Language Models for Code Using Syntactic Structures

    Authors: David N Palacio, Alejandro Velasco, Daniel Rodriguez-Cardenas, Kevin Moran, Denys Poshyvanyk

    Abstract: Large Language Models (LLMs) for code are a family of high-parameter, transformer-based neural networks pre-trained on massive datasets of both natural and programming languages. These models are rapidly being employed in commercial AI-based developer tools, such as GitHub CoPilot. However, measuring and explaining their effectiveness on programming tasks is a challenging proposition, given their… ▽ More

    Submitted 7 August, 2023; originally announced August 2023.

  11. MASC: A Tool for Mutation-Based Evaluation of Static Crypto-API Misuse Detectors

    Authors: Amit Seal Ami, Syed Yusuf Ahmed, Radowan Mahmud Redoy, Nathan Cooper, Kaushal Kafle, Kevin Moran, Denys Poshyvanyk, Adwait Nadkarni

    Abstract: While software engineers are optimistically adopting crypto-API misuse detectors (or crypto-detectors) in their software development cycles, this momentum must be accompanied by a rigorous understanding of crypto-detectors' effectiveness at finding crypto-API misuses in practice. This demo paper presents the technical details and usage scenarios of our tool, namely Mutation Analysis for evaluating… ▽ More

    Submitted 13 August, 2023; v1 submitted 4 August, 2023; originally announced August 2023.

    Comments: To be published in Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering

  12. "False negative -- that one is going to kill you": Understanding Industry Perspectives of Static Analysis based Security Testing

    Authors: Amit Seal Ami, Kevin Moran, Denys Poshyvanyk, Adwait Nadkarni

    Abstract: The demand for automated security analysis techniques, such as static analysis based security testing (SAST) tools continues to increase. To develop SASTs that are effectively leveraged by developers for finding vulnerabilities, researchers and tool designers must understand how developers perceive, select, and use SASTs, what they expect from the tools, whether they know of the limitations of the… ▽ More

    Submitted 18 June, 2024; v1 submitted 30 July, 2023; originally announced July 2023.

    Comments: Published at the IEEE Symposium on Security and Privacy 2024

  13. arXiv:2306.03416  [pdf, other

    physics.geo-ph physics.data-an

    Bayesian Learning of Gas Transport in Three-Dimensional Fracture Networks

    Authors: Yingqi Shi, Donald J. Berry, John Kath, Shams Lodhy, An Ly, Allon G. Percus, Jeffrey D. Hyman, Kelly Moran, Justin Strait, Matthew R. Sweeney, Hari S. Viswanathan, Philip H. Stauffer

    Abstract: Modeling gas flow through fractures of subsurface rock is a particularly challenging problem because of the heterogeneous nature of the material. High-fidelity simulations using discrete fracture network (DFN) models are one methodology for predicting gas particle breakthrough times at the surface, but are computationally demanding. We propose a Bayesian machine learning method that serves as an e… ▽ More

    Submitted 6 June, 2023; originally announced June 2023.

    Report number: LA-UR-23-25597

  14. arXiv:2303.06782  [pdf, other

    cs.SE cs.CV cs.HC cs.LG

    AidUI: Toward Automated Recognition of Dark Patterns in User Interfaces

    Authors: SM Hasan Mansur, Sabiha Salma, Damilola Awofisayo, Kevin Moran

    Abstract: Past studies have illustrated the prevalence of UI dark patterns, or user interfaces that can lead end-users toward (unknowingly) taking actions that they may not have intended. Such deceptive UI designs can result in adverse effects on end users, such as oversharing personal information or financial loss. While significant research progress has been made toward the development of dark pattern tax… ▽ More

    Submitted 12 March, 2023; originally announced March 2023.

    Comments: 13 pages, Accepted at The 45th IEEE/ACM International Conference on Software Engineering (ICSE 2023), Melbourne, Australia, May 14th-20th, 2023

  15. arXiv:2302.06050  [pdf, other

    cs.SE

    BURT: A Chatbot for Interactive Bug Reporting

    Authors: Yang Song, Junayed Mahmud, Nadeeshan De Silva, Ying Zhou, Oscar Chaparro, Kevin Moran, Andrian Marcus, Denys Poshyvanyk

    Abstract: This paper introduces BURT, a web-based chatbot for interactive reporting of Android app bugs. BURT is designed to assist Android app end-users in reporting high-quality defect information using an interactive interface. BURT guides the users in reporting essential bug report elements, i.e., the observed behavior, expected behavior, and the steps to reproduce the bug. It verifies the quality of th… ▽ More

    Submitted 12 February, 2023; originally announced February 2023.

    Comments: Accepted by the Demonstrations Track of the 45th International Conference on Software Engineering (ICSE'23). arXiv admin note: substantial text overlap with arXiv:2209.10062

  16. arXiv:2302.03788  [pdf, other

    cs.SE cs.AI cs.LG stat.ME

    Toward a Theory of Causation for Interpreting Neural Code Models

    Authors: David N. Palacio, Alejandro Velasco, Nathan Cooper, Alvaro Rodriguez, Kevin Moran, Denys Poshyvanyk

    Abstract: Neural Language Models of Code, or Neural Code Models (NCMs), are rapidly progressing from research prototypes to commercial developer tools. As such, understanding the capabilities and limitations of such models is becoming critical. However, the abilities of these models are typically measured using automated metrics that often only reveal a portion of their real-world performance. While, in gen… ▽ More

    Submitted 27 March, 2024; v1 submitted 7 February, 2023; originally announced February 2023.

    Comments: Accepted to appear in IEEE Transactions on Software Engineering

  17. ChatGPT and Software Testing Education: Promises & Perils

    Authors: Sajed Jalil, Suzzana Rafi, Thomas D. LaToza, Kevin Moran, Wing Lam

    Abstract: Over the past decade, predictive language modeling for code has proven to be a valuable tool for enabling new forms of automation for developers. More recently, we have seen the advent of general purpose "large language models", based on neural transformer architectures, that have been trained on massive datasets of human written text spanning code and natural language. However, despite the demons… ▽ More

    Submitted 11 March, 2023; v1 submitted 7 February, 2023; originally announced February 2023.

    Comments: 2023 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW), 8 pages, 2 tables, 6 figures

    ACM Class: D.2.5

    Journal ref: 2023 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW)

  18. arXiv:2302.03089  [pdf, other

    stat.AP astro-ph.GA

    Statistical methods for partitioning ribbon and globally-distributed flux using data from the Interstellar Boundary Explorer

    Authors: Lauren J. Beesley, Dave Osthus, Kelly R. Moran, Madeline A. Ausdemore, Grant David Meadors, Paul H. Janzen, Eric J. Zirnstein, Brian P. Weaver, Daniel B. Reisenfeld

    Abstract: ASA's Interstellar Boundary Explorer (IBEX) satellite collects data on energetic neutral atoms (ENAs) that can provide insight into the heliosphere boundary between our solar system and interstellar space. Using these data, scientists can construct maps of the ENA intensities (often, expressed in terms of flux) observed in all directions. The ENA flux observed in these maps is believed to come fro… ▽ More

    Submitted 6 February, 2023; originally announced February 2023.

    Report number: LA-UR-22-32267

  19. An Empirical Investigation into the Reproduction of Bug Reports for Android Apps

    Authors: Jack Johnson, Junayed Mahmud, Tyler Wendland, Kevin Moran, Julia Rubin, Mattia Fazzini

    Abstract: One of the key tasks related to ensuring mobile app quality is the reporting, management, and resolution of bug reports. As such, researchers have committed considerable resources toward automating various tasks of the bug management process for mobile apps, such as reproduction and triaging. However, the success of these automated approaches is largely dictated by the characteristics and properti… ▽ More

    Submitted 3 January, 2023; originally announced January 2023.

    Comments: Published in the Proceedings of the 29th IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER'22), Honolulu, Hawaii, March 15-18, 2022, pp. 321-332

  20. arXiv:2301.01224  [pdf, other

    cs.SE cs.AI cs.CV cs.LG

    An Empirical Investigation into the Use of Image Captioning for Automated Software Documentation

    Authors: Kevin Moran, Ali Yachnes, George Purnell, Junayed Mahmud, Michele Tufano, Carlos Bernal-Cárdenas, Denys Poshyvanyk, Zach H'Doubler

    Abstract: Existing automated techniques for software documentation typically attempt to reason between two main sources of information: code and natural language. However, this reasoning process is often complicated by the lexical gap between more abstract natural language and more structured programming languages. One potential bridge for this gap is the Graphical User Interface (GUI), as GUIs inherently e… ▽ More

    Submitted 3 January, 2023; originally announced January 2023.

    Comments: Published in the Proceedings of the 29th IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER'22), Honolulu, Hawaii, March 15-18, 2022, pp. 514-525

  21. arXiv:2301.01191  [pdf, other

    cs.SE

    Translating Video Recordings of Complex Mobile App UI Gestures into Replayable Scenarios

    Authors: Carlos Bernal-Cárdenas, Nathan Cooper, Madeleine Havranek, Kevin Moran, Oscar Chaparro, Denys Poshyvanyk, Andrian Marcus

    Abstract: Screen recordings of mobile applications are easy to obtain and capture a wealth of information pertinent to software developers (e.g., bugs or feature requests), making them a popular mechanism for crowdsourced app feedback. Thus, these videos are becoming a common artifact that developers must manage. In light of unique mobile development constraints, including swift release cycles and rapidly e… ▽ More

    Submitted 3 January, 2023; originally announced January 2023.

    Comments: Accepted to IEEE Transactions on Software Engineering. arXiv admin note: substantial text overlap with arXiv:2005.09057

  22. arXiv:2210.12005  [pdf, other

    astro-ph.IM stat.AP

    Towards Improved Heliosphere Sky Map Estimation with Theseus

    Authors: Dave Osthus, Brian P. Weaver, Lauren J. Beesley, Kelly R. Moran, Madeline A. Ausdemore, Eric J. Zirnstein, Paul H. Janzen, Daniel B. Reisenfeld

    Abstract: The Interstellar Boundary Explorer (IBEX) satellite has been in orbit since 2008 and detects energy-resolved energetic neutral atoms (ENAs) originating from the heliosphere. Different regions of the heliosphere generate ENAs at different rates. It is of scientific interest to take the data collected by IBEX and estimate spatial maps of heliospheric ENA rates (referred to as sky maps) at higher res… ▽ More

    Submitted 20 October, 2022; originally announced October 2022.

    Comments: 38 pages, 18 figures, 3 tables

  23. Toward Interactive Bug Reporting for (Android App) End-Users

    Authors: Yang Song, Junayed Mahmud, Ying Zhou, Oscar Chaparro, Kevin Moran, Andrian Marcus, Denys Poshyvanyk

    Abstract: Many software bugs are reported manually, particularly bugs that manifest themselves visually in the user interface. End-users typically report these bugs via app reviewing websites, issue trackers, or in-app built-in bug reporting tools, if available. While these systems have various features that facilitate bug reporting (e.g., textual templates or forms), they often provide limited guidance, co… ▽ More

    Submitted 20 September, 2022; originally announced September 2022.

    Comments: Accepted by the Research Papers Track of the ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE'22)

  24. Avgust: Automating Usage-Based Test Generation from Videos of App Executions

    Authors: Yixue Zhao, Saghar Talebipour, Kesina Baral, Hyojae Park, Leon Yee, Safwat Ali Khan, Yuriy Brun, Nenad Medvidovic, Kevin Moran

    Abstract: Writing and maintaining UI tests for mobile apps is a time-consuming and tedious task. While decades of research have produced automated approaches for UI test generation, these approaches typically focus on testing for crashes or maximizing code coverage. By contrast, recent research has shown that developers prefer usage-based tests, which center around specific uses of app features, to help sup… ▽ More

    Submitted 1 November, 2022; v1 submitted 6 September, 2022; originally announced September 2022.

    Journal ref: ESEC/FSE 2022

  25. arXiv:2207.12345  [pdf, other

    astro-ph.CO stat.AP

    The Mira-Titan Universe IV. High Precision Power Spectrum Emulation

    Authors: Kelly R. Moran, Katrin Heitmann, Earl Lawrence, Salman Habib, Derek Bingham, Amol Upadhye, Juliana Kwan, David Higdon, Richard Payne

    Abstract: Modern cosmological surveys are delivering datasets characterized by unprecedented quality and statistical completeness; this trend is expected to continue into the future as new ground- and space-based surveys come online. In order to maximally extract cosmological information from these observations, matching theoretical predictions are needed. At low redshifts, the surveys probe the nonlinear r… ▽ More

    Submitted 25 July, 2022; originally announced July 2022.

  26. arXiv:2203.12093  [pdf, other

    cs.SE

    Enhancing Mobile App Bug Reporting via Real-time Understanding of Reproduction Steps

    Authors: Mattia Fazzini, Kevin Moran, Carlos Bernal Cardenas, Tyler Wendland, Alessandro Orso, Denys Poshyvanyk

    Abstract: One of the primary mechanisms by which developers receive feedback about in-field failures of software from users is through bug reports. Unfortunately, the quality of manually written bug reports can vary widely due to the effort required to include essential pieces of information, such as detailed reproduction steps (S2Rs). Despite the difficulty faced by reporters, few existing bug reporting sy… ▽ More

    Submitted 22 March, 2022; originally announced March 2022.

  27. Why Crypto-detectors Fail: A Systematic Evaluation of Cryptographic Misuse Detection Techniques

    Authors: Amit Seal Ami, Nathan Cooper, Kaushal Kafle, Kevin Moran, Denys Poshyvanyk, Adwait Nadkarni

    Abstract: The correct use of cryptography is central to ensuring data security in modern software systems. Hence, several academic and commercial static analysis tools have been developed for detecting and mitigating crypto-API misuse. While developers are optimistically adopting these crypto-API misuse detectors (or crypto-detectors) in their software development cycles, this momentum must be accompanied b… ▽ More

    Submitted 24 July, 2022; v1 submitted 14 July, 2021; originally announced July 2021.

    Comments: 18 pages, 2 figures, 2 tables; paper published at 2022 IEEE Symposium on Security and Privacy (S&P)

  28. arXiv:2106.08415  [pdf, other

    cs.SE cs.AI cs.CL cs.LG

    Code to Comment Translation: A Comparative Study on Model Effectiveness & Errors

    Authors: Junayed Mahmud, Fahim Faisal, Raihan Islam Arnob, Antonios Anastasopoulos, Kevin Moran

    Abstract: Automated source code summarization is a popular software engineering research topic wherein machine translation models are employed to "translate" code snippets into relevant natural language descriptions. Most evaluations of such models are conducted using automatic reference-based metrics. However, given the relatively large semantic gap between programming languages and natural language, we ar… ▽ More

    Submitted 15 June, 2021; originally announced June 2021.

    Comments: Accepted to the 2021 NLP4Prog Workshop co-located with The Joint Conference of the 59th Annual Meeting of the Association for Computational Linguistics and the 11th International Joint Conference on Natural Language Processing (ACL-IJCNLP 2021)

  29. AndroR2: A Dataset of Manually Reproduced Bug Reports for Android Applications

    Authors: Tyler Wendland, **gyang Sun, Junayed Mahmud, S. M. Hasan Mansur, Steven Huang, Kevin Moran, Julia Rubin, Mattia Fazzini

    Abstract: Software maintenance constitutes a large portion of the software development lifecycle. To carry out maintenance tasks, developers often need to understand and reproduce bug reports. As such, there has been increasing research activity coalescing around the notion of automating various activities related to bug reporting. A sizable portion of this research interest has focused on the domain of mob… ▽ More

    Submitted 15 June, 2021; originally announced June 2021.

    Comments: 5 pages, Accepted to the 2021 International Conference on Mining Software Repositories, Data Showcase Track; Links to Datasets: https://doi.org/10.5281/zenodo.4646313; https://github.com/SageSELab/AndroR2

  30. arXiv:2103.04531  [pdf, other

    cs.SE

    V2S: A Tool for Translating Video Recordings of Mobile App Usages into Replayable Scenarios

    Authors: Madeleine Havranek, Carlos Bernal-Cárdenas, Nathan Cooper, Oscar Chaparro, Denys Poshyvnayk, Kevin Moran

    Abstract: Screen recordings are becoming increasingly important as rich software artifacts that inform mobile application development processes. However, the amount of manual effort required to extract information from these graphical artifacts can hinder resource-constrained mobile developers. This paper presents Video2Scenario (V2S), an automated tool that processes video recordings of Android app usages,… ▽ More

    Submitted 7 March, 2021; originally announced March 2021.

  31. Systematic Mutation-based Evaluation of the Soundness of Security-focused Android Static Analysis Techniques

    Authors: Amit Seal Ami, Kaushal Kafle, Kevin Moran, Adwait Nadkarni, Denys Poshyvanyk

    Abstract: Mobile application security has been a major area of focus for security research over the course of the last decade. Numerous application analysis tools have been proposed in response to malicious, curious, or vulnerable apps. However, existing tools, and specifically, static analysis tools, trade soundness of the analysis for precision and performance and are hence soundy. Unfortunately, the spec… ▽ More

    Submitted 17 July, 2021; v1 submitted 12 February, 2021; originally announced February 2021.

    Comments: Published in ACM Transactions on Privacy and Security, extends USENIX'18 paper (arXiv:1806.09761)

    Journal ref: ACM Transactions on Privacy and Security, Volume 24, Issue 3, Article No. 15, 2021

  32. $μ$SE: Mutation-based Evaluation of Security-focused Static Analysis Tools for Android

    Authors: Amit Seal Ami, Kaushal Kafle, Kevin Moran, Adwait Nadkarni, Denys Poshyvanyk

    Abstract: This demo paper presents the technical details and usage scenarios of $μ$SE: a mutation-based tool for evaluating security-focused static analysis tools for Android. Mutation testing is generally used by software practitioners to assess the robustness of a given test-suite. However, we leverage this technique to systematically evaluate static analysis tools and uncover and document soundness issue… ▽ More

    Submitted 12 February, 2021; originally announced February 2021.

    Comments: 43rd International Conference on Software Engineering, Virtual (originally in Madrid, Spain) - Demonstrations Track

  33. arXiv:2101.09194  [pdf, other

    cs.SE cs.AI

    It Takes Two to Tango: Combining Visual and Textual Information for Detecting Duplicate Video-Based Bug Reports

    Authors: Nathan Cooper, Carlos Bernal-Cárdenas, Oscar Chaparro, Kevin Moran, Denys Poshyvanyk

    Abstract: When a bug manifests in a user-facing application, it is likely to be exposed through the graphical user interface (GUI). Given the importance of visual information to the process of identifying and understanding such bugs, users are increasingly making use of screenshots and screen-recordings as a means to report issues to developers. However, when such information is reported en masse, such as d… ▽ More

    Submitted 5 February, 2021; v1 submitted 22 January, 2021; originally announced January 2021.

    Comments: 13 pages and 1 figure. Published at ICSE'21

  34. arXiv:2009.08525  [pdf, other

    cs.SE cs.AI cs.LG

    Deep Learning & Software Engineering: State of Research and Future Directions

    Authors: Prem Devanbu, Matthew Dwyer, Sebastian Elbaum, Michael Lowry, Kevin Moran, Denys Poshyvanyk, Baishakhi Ray, Rishabh Singh, Xiangyu Zhang

    Abstract: Given the current transformative potential of research that sits at the intersection of Deep Learning (DL) and Software Engineering (SE), an NSF-sponsored community workshop was conducted in co-location with the 34th IEEE/ACM International Conference on Automated Software Engineering (ASE'19) in San Diego, California. The goal of this workshop was to outline high priority areas for cross-cutting r… ▽ More

    Submitted 17 September, 2020; originally announced September 2020.

    Comments: Community Report from the 2019 NSF Workshop on Deep Learning & Software Engineering, 37 pages

  35. arXiv:2009.06520  [pdf, other

    cs.SE cs.AI cs.LG cs.NE

    A Systematic Literature Review on the Use of Deep Learning in Software Engineering Research

    Authors: Cody Watson, Nathan Cooper, David Nader Palacio, Kevin Moran, Denys Poshyvanyk

    Abstract: An increasingly popular set of techniques adopted by software engineering (SE) researchers to automate development tasks are those rooted in the concept of Deep Learning (DL). The popularity of such techniques largely stems from their automated feature engineering capabilities, which aid in modeling software artifacts. However, due to the rapid pace at which DL techniques have been adopted, it is… ▽ More

    Submitted 23 September, 2021; v1 submitted 14 September, 2020; originally announced September 2020.

    Comments: 59 pages, Accepted to TOSEM 2021

  36. arXiv:2006.06537  [pdf, other

    math.ST stat.ME

    Fast increased fidelity approximate Gibbs samplers for Bayesian Gaussian process regression

    Authors: Kelly R. Moran, Matthew W. Wheeler

    Abstract: The use of Gaussian processes (GPs) is supported by efficient sampling algorithms, a rich methodological literature, and strong theoretical grounding. However, due to their prohibitive computation and storage demands, the use of exact GPs in Bayesian models is limited to problems containing at most several thousand observations. Sampling requires matrix operations that scale at… ▽ More

    Submitted 11 June, 2020; originally announced June 2020.

  37. Translating Video Recordings of Mobile App Usages into Replayable Scenarios

    Authors: Carlos Bernal-Cárdenas, Nathan Cooper, Kevin Moran, Oscar Chaparro, Andrian Marcus, Denys Poshyvanyk

    Abstract: Screen recordings of mobile applications are easy to obtain and capture a wealth of information pertinent to software developers (e.g., bugs or feature requests), making them a popular mechanism for crowdsourced app feedback. Thus, these videos are becoming a common artifact that developers must manage. In light of unique mobile development constraints, including swift release cycles and rapidly e… ▽ More

    Submitted 18 May, 2020; originally announced May 2020.

    Comments: In proceedings of the 42nd International Conference on Software Engineering (ICSE'20), 13 pages

  38. Improving the Effectiveness of Traceability Link Recovery using Hierarchical Bayesian Networks

    Authors: Kevin Moran, David N. Palacio, Carlos Bernal-Cárdenas, Daniel McCrystal, Denys Poshyvanyk, Chris Shenefiel, Jeff Johnson

    Abstract: Traceability is a fundamental component of the modern software development process that helps to ensure properly functioning, secure programs. Due to the high cost of manually establishing trace links, researchers have developed automated approaches that draw relationships between pairs of textual software artifacts using similarity measures. However, the effectiveness of such techniques are often… ▽ More

    Submitted 11 April, 2022; v1 submitted 18 May, 2020; originally announced May 2020.

    Comments: Accepted in the Proceedings of the 42nd International Conference on Software Engineering (ICSE'20), 13 pages

  39. On Learning Meaningful Assert Statements for Unit Test Cases

    Authors: Cody Watson, Michele Tufano, Kevin Moran, Gabriele Bavota, Denys Poshyvanyk

    Abstract: Software testing is an essential part of the software lifecycle and requires a substantial amount of time and effort. It has been estimated that software developers spend close to 50% of their time on testing the code they write. For these reasons, a long standing goal within the research community is to (partially) automate software testing. While several techniques and tools have been proposed t… ▽ More

    Submitted 18 February, 2020; v1 submitted 13 February, 2020; originally announced February 2020.

  40. Bayesian joint modeling of chemical structure and dose response curves

    Authors: Kelly R. Moran, David Dunson, Matthew W. Wheeler, Amy H. Herring

    Abstract: Today there are approximately 85,000 chemicals regulated under the Toxic Substances Control Act, with around 2,000 new chemicals introduced each year. It is impossible to screen all of these chemicals for potential toxic effects either via full organism in vivo studies or in vitro high-throughput screening (HTS) programs. Toxicologists face the challenge of choosing which chemicals to screen, and… ▽ More

    Submitted 18 October, 2020; v1 submitted 27 December, 2019; originally announced December 2019.

  41. arXiv:1909.13766  [pdf, other

    stat.AP

    Multiscale Influenza Forecasting

    Authors: Dave Osthus, Kelly R Moran

    Abstract: Influenza forecasting in the United States (US) is complex and challenging for reasons including substantial spatial and temporal variability, nested geographic scales of forecast interest, and heterogeneous surveillance participation. Here we present a flexible influenza forecasting model called Dante, a multiscale flu forecasting model that learns rather than prescribes spatial, temporal, and su… ▽ More

    Submitted 30 September, 2019; originally announced September 2019.

  42. arXiv:1908.08873  [pdf, other

    eess.IV cs.CV cs.LG

    Predicting knee osteoarthritis severity: comparative modeling based on patient's data and plain X-ray images

    Authors: Jaynal Abedin, Joseph Antony, Kevin McGuinness, Kieran Moran, Noel E O'Connor, Dietrich Rebholz-Schuhmann, John Newell

    Abstract: Knee osteoarthritis (KOA) is a disease that impairs knee function and causes pain. A radiologist reviews knee X-ray images and grades the severity level of the impairments according to the Kellgren and Lawrence grading scheme; a five-point ordinal scale (0--4). In this study, we used Elastic Net (EN) and Random Forests (RF) to build predictive models using patient assessment data (i.e. signs and s… ▽ More

    Submitted 23 August, 2019; originally announced August 2019.

    Comments: Published in Nature Scientific Reports, 2019

    Journal ref: Scientific reports 9, no. 1 (2019): 5761

  43. arXiv:1908.08840  [pdf, other

    cs.CV cs.LG

    Feature Learning to Automatically Assess Radiographic Knee Osteoarthritis Severity

    Authors: Joseph Antony, Kevin McGuinness, Kieran Moran, Noel E O' Connor

    Abstract: This chapter presents the investigations and the results of feature learning using convolutional neural networks to automatically assess knee osteoarthritis (OA) severity and the associated clinical and diagnostic features of knee OA from X-ray images. Also, this chapter demonstrates that feature learning in a supervised manner is more effective than using conventional handcrafted features for aut… ▽ More

    Submitted 23 August, 2019; originally announced August 2019.

    Comments: Book Chapter preprint :: Deep Learners and Deep Learner Descriptors for Medical Applications

  44. Bayesian Hierarchical Factor Regression Models to Infer Cause of Death From Verbal Autopsy Data

    Authors: Kelly R. Moran, Elizabeth L. Turner, David Dunson, Amy H. Herring

    Abstract: In low-resource settings where vital registration of death is not routine it is often of critical interest to determine and study the cause of death (COD) for individuals and the cause-specific mortality fraction (CSMF) for populations. Post-mortem autopsies, considered the gold standard for COD assignment, are often difficult or impossible to implement due to deaths occurring outside the hospital… ▽ More

    Submitted 18 October, 2020; v1 submitted 20 August, 2019; originally announced August 2019.

  45. arXiv:1908.00614  [pdf, other

    cs.SE

    Learning to Identify Security-Related Issues Using Convolutional Neural Networks

    Authors: David N. Palacio, Daniel McCrystal, Kevin Moran, Carlos Bernal-Cárdenas, Denys Poshyvanyk, Chris Shenefiel

    Abstract: Software security is becoming a high priority for both large companies and start-ups alike due to the increasing potential for harm that vulnerabilities and breaches carry with them. However, attaining robust security assurance while delivering features requires a precarious balancing act in the context of agile development practices. One path forward to help aid development teams in securing thei… ▽ More

    Submitted 5 August, 2019; v1 submitted 1 August, 2019; originally announced August 2019.

    Comments: 5 pages, 3 Figures, ICSME 2019 conference

  46. arXiv:1907.00124  [pdf, other

    cs.CR

    Helion: Enabling a Natural Perspective of Home Automation

    Authors: Sunil Manandhar, Kevin Moran, Kaushal Kafle, Ruhao Tang, Denys Poshyvanyk, Adwait Nadkarni

    Abstract: Security researchers have recently discovered significant security and safety issues related to home automation and developed approaches to address them. Such approaches often face design and evaluation challenges which arise from their restricted perspective of home automation that is bounded by the IoT apps they analyze. The challenges of past work can be overcome by relying on a deeper understa… ▽ More

    Submitted 28 June, 2019; originally announced July 2019.

  47. arXiv:1906.07107  [pdf, other

    cs.SE

    Assessing the Quality of the Steps to Reproduce in Bug Reports

    Authors: Oscar Chaparro, Carlos Bernal-Cardenas, **g Lu, Kevin Moran, Andrian Marcus, Massimiliano Di Penta, Denys Poshyvanyk, Vincent Ng

    Abstract: A major problem with user-written bug reports, indicated by developers and documented by researchers, is the (lack of high) quality of the reported steps to reproduce the bugs. Low-quality steps to reproduce lead to excessive manual effort spent on bug triage and resolution. This paper proposes Euler, an approach that automatically identifies and assesses the quality of the steps to reproduce in a… ▽ More

    Submitted 17 June, 2019; originally announced June 2019.

    Comments: In Proceedings of the 27th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE '19), August 26-30, 2019, Tallinn, Estonia

  48. arXiv:1901.00891  [pdf, other

    cs.SE

    Guigle: A GUI Search Engine for Android Apps

    Authors: Carlos Bernal-Cardenas, Kevin Moran, Michele Tufano, Zichang Liu, Linyong Nan, Zhehan Shi, Denys Poshyvanyk

    Abstract: The process of develo** a mobile application typically starts with the ideation and conceptualization of its user interface. This concept is then translated into a set of mock-ups to help determine how well the user interface embodies the intended features of the app. After the creation of mock-ups developers then translate it into an app that runs in a mobile device. In this paper we propose an… ▽ More

    Submitted 3 January, 2019; originally announced January 2019.

    Comments: Accepted to 41st ACM/IEEE International Conference on Software Engineering, Formal Tool Demonstrations Track

  49. arXiv:1812.01597  [pdf, other

    cs.CR

    A Study of Data Store-based Home Automation

    Authors: Kaushal Kafle, Kevin Moran, Sunil Manandhar, Adwait Nadkarni, Denys Poshyvanyk

    Abstract: Home automation platforms provide a new level of convenience by enabling consumers to automate various aspects of physical objects in their homes. While the convenience is beneficial, security flaws in the platforms or integrated third-party products can have serious consequences for the integrity of a user's physical environment. In this paper we perform a systematic security evaluation of two po… ▽ More

    Submitted 4 December, 2018; originally announced December 2018.

    Comments: Accepted to the The 9th ACM Conference on Data and Application Security and Privacy (CODASPY'19), 12 pages

  50. arXiv:1807.09440  [pdf, other

    cs.SE

    Detecting and Summarizing GUI Changes in Evolving Mobile Apps

    Authors: Kevin Moran, Cody Watson, John Hoskins, George Purnell, Denys Poshyvanyk

    Abstract: Mobile applications have become a popular software development domain in recent years due in part to a large user base, capable hardware, and accessible platforms. However, mobile developers also face unique challenges, including pressure for frequent releases to keep pace with rapid platform evolution, hardware iteration, and user feedback. Due to this rapid pace of evolution, developers need aut… ▽ More

    Submitted 4 September, 2018; v1 submitted 25 July, 2018; originally announced July 2018.

    Comments: Proceedings of the 2018 33rd ACM/IEEE International Conference on Automated Software Engineering (ASE '18), September 3-7, 2018, Montpellier, France