Skip to main content

Showing 1–8 of 8 results for author: Schorlemmer, T R

.
  1. arXiv:2407.03949  [pdf, other

    cs.CR cs.SE

    Establishing Provenance Before Coding: Traditional and Next-Gen Signing

    Authors: Taylor R. Schorlemmer, Ethan H. Burmane, Kelechi G. Kalu, Santiago Torres-Arias, James C. Davis

    Abstract: Software engineers integrate third-party components into their applications. The resulting software supply chain is vulnerable. To reduce the attack surface, we can verify the origin of components (provenance) before adding them. Cryptographic signatures enable this. This article describes traditional signing, its challenges, and changes introduced by next generation signing platforms

    Submitted 4 July, 2024; originally announced July 2024.

  2. arXiv:2406.10109  [pdf, other

    cs.CR cs.SE

    SoK: Analysis of Software Supply Chain Security by Establishing Secure Design Properties

    Authors: Chinenye Okafor, Taylor R. Schorlemmer, Santiago Torres-Arias, James C. Davis

    Abstract: This paper systematizes knowledge about secure software supply chain patterns. It identifies four stages of a software supply chain attack and proposes three security properties crucial for a secured supply chain: transparency, validity, and separation. The paper describes current security approaches and maps them to the proposed security properties, including research ideas and case studies of su… ▽ More

    Submitted 14 June, 2024; originally announced June 2024.

    Comments: Published in the proceedings of the 1st ACM Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses (SCORED) 2022

  3. arXiv:2404.16688  [pdf, other

    cs.SE

    Reusing Deep Learning Models: Challenges and Directions in Software Engineering

    Authors: James C. Davis, Purvish Jajal, Wenxin Jiang, Taylor R. Schorlemmer, Nicholas Synovic, George K. Thiruvathukal

    Abstract: Deep neural networks (DNNs) achieve state-of-the-art performance in many areas, including computer vision, system configuration, and question-answering. However, DNNs are expensive to develop, both in intellectual effort (e.g., devising new architectures) and computational costs (e.g., training). Reusing DNNs is a promising direction to amortize costs within a company and across the computing indu… ▽ More

    Submitted 25 April, 2024; originally announced April 2024.

    Comments: Proceedings of the IEEE John Vincent Atanasoff Symposium on Modern Computing (JVA'23) 2023

  4. arXiv:2401.14635  [pdf, other

    cs.CR cs.SE

    Signing in Four Public Software Package Registries: Quantity, Quality, and Influencing Factors

    Authors: Taylor R Schorlemmer, Kelechi G Kalu, Luke Chigges, Kyung Myung Ko, Eman Abu Isghair, Saurabh Baghi, Santiago Torres-Arias, James C Davis

    Abstract: Many software applications incorporate open-source third-party packages distributed by public package registries. Guaranteeing authorship along this supply chain is a challenge. Package maintainers can guarantee package authorship through software signing. However, it is unclear how common this practice is, and whether the resulting signatures are created properly. Prior work has provided raw data… ▽ More

    Submitted 14 April, 2024; v1 submitted 25 January, 2024; originally announced January 2024.

    Comments: Accepted at IEEE Security & Privacy 2024 (S&P'24)

  5. arXiv:2308.12387  [pdf, other

    cs.SE

    Reflecting on the Use of the Policy-Process-Product Theory in Empirical Software Engineering

    Authors: Kelechi G. Kalu, Taylor R. Schorlemmer, Sophie Chen, Kyle Robinson, Erik Kocinare, James C. Davis

    Abstract: The primary theory of software engineering is that an organization's Policies and Processes influence the quality of its Products. We call this the PPP Theory. Although empirical software engineering research has grown common, it is unclear whether researchers are trying to evaluate the PPP Theory. To assess this, we analyzed half (33) of the empirical works published over the last two years in th… ▽ More

    Submitted 23 August, 2023; originally announced August 2023.

    Comments: 5 pages, published in the proceedings of the 2023 ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering in the Ideas-Visions-Reflections track (ESEC/FSE-IVR'23)

  6. arXiv:2308.04898  [pdf, other

    cs.CR cs.LG cs.SE

    An Empirical Study on Using Large Language Models to Analyze Software Supply Chain Security Failures

    Authors: Tanmay Singla, Dharun Anandayuvaraj, Kelechi G. Kalu, Taylor R. Schorlemmer, James C. Davis

    Abstract: As we increasingly depend on software systems, the consequences of breaches in the software supply chain become more severe. High-profile cyber attacks like those on SolarWinds and ShadowHammer have resulted in significant financial and data losses, underlining the need for stronger cybersecurity. One way to prevent future breaches is by studying past failures. However, traditional methods of anal… ▽ More

    Submitted 9 August, 2023; originally announced August 2023.

    Comments: 22 pages, 9 figures

  7. arXiv:2303.08934  [pdf, other

    cs.SE

    PTMTorrent: A Dataset for Mining Open-source Pre-trained Model Packages

    Authors: Wenxin Jiang, Nicholas Synovic, Purvish Jajal, Taylor R. Schorlemmer, Arav Tewari, Bhavesh Pareek, George K. Thiruvathukal, James C. Davis

    Abstract: Due to the cost of develo** and training deep learning models from scratch, machine learning engineers have begun to reuse pre-trained models (PTMs) and fine-tune them for downstream tasks. PTM registries known as "model hubs" support engineers in distributing and reusing deep learning models. PTM packages include pre-trained weights, documentation, model architectures, datasets, and metadata. M… ▽ More

    Submitted 15 March, 2023; originally announced March 2023.

    Comments: 5 pages, 2 figures, Accepted to MSR'23

  8. arXiv:2303.02552  [pdf, other

    cs.SE cs.AI cs.LG

    An Empirical Study of Pre-Trained Model Reuse in the Hugging Face Deep Learning Model Registry

    Authors: Wenxin Jiang, Nicholas Synovic, Matt Hyatt, Taylor R. Schorlemmer, Rohan Sethi, Yung-Hsiang Lu, George K. Thiruvathukal, James C. Davis

    Abstract: Deep Neural Networks (DNNs) are being adopted as components in software systems. Creating and specializing DNNs from scratch has grown increasingly difficult as state-of-the-art architectures grow more complex. Following the path of traditional software engineering, machine learning engineers have begun to reuse large-scale pre-trained models (PTMs) and fine-tune these models for downstream tasks.… ▽ More

    Submitted 4 March, 2023; originally announced March 2023.

    Comments: Proceedings of the ACM/IEEE 45th International Conference on Software Engineering (ICSE) 2023