Skip to main content

Showing 1–13 of 13 results for author: Alalfi, M H

Searching in archive cs. Search in all archives.
.
  1. arXiv:2308.14974  [pdf, other

    cs.SE

    SimSched: A tool for Simulating Autosar Implementaion in Simulink

    Authors: Jian Chen, Manar H. Alalfi, Thomas R. Dean, Ramesh S

    Abstract: AUTOSAR (AUTomotive Open System ARchitecture) is an open industry standard for the automotive sector. It defines the three-layered automotive software architecture. One of these layers is the application layer, where functional behaviors are encapsulated in Software Components (SW-Cs). Inside SW-Cs, a set of runnable entities represents the internal behavior and is realized as a set of tasks. To a… ▽ More

    Submitted 28 August, 2023; originally announced August 2023.

    Comments: 21 pages

    ACM Class: K.6.3

  2. arXiv:2301.00835  [pdf, other

    cs.SE

    Timed Model-Based Mutation Operators for Simulink Models

    Authors: Jian Chen, Manar H. Alalfi, Thomas R. Dean

    Abstract: Model-based mutation analysis is a recent research area, and real-time system testing can benefit from using model mutants. Model-based mutation testing (MBMT) is a particular branch of model-based testing. It generates faulty versions of a model using mutation operators to evaluate and improve test cases. Mutation testing is an effective way to ensure software correctness and has been applied to… ▽ More

    Submitted 2 January, 2023; originally announced January 2023.

  3. arXiv:2205.11406  [pdf, other

    cs.SE cs.CR

    A Model-Driven-Engineering Approach for Detecting Privilege Escalation in IoT Systems

    Authors: Atheer Abu Zaid, Manar H. Alalfi, Ali Miri

    Abstract: Software vulnerabilities in access control models can represent a serious threat in a system. In fact, OWASP lists broken access control as number 5 in severity among the top 10 vulnerabilities. In this paper, we study the permission model of an emerging Smart-Home platform, SmartThings, and explore an approach that detects privilege escalation in its permission model. Our approach is based on Mod… ▽ More

    Submitted 23 May, 2022; originally announced May 2022.

  4. arXiv:2203.01464  [pdf, other

    cs.CR cs.SE

    A Survey of Analysis Methods for Security and Safety verification in IoT Systems

    Authors: Lobna Abuserrieh, Manar H. Alalfi

    Abstract: Internet of Things (IoT) has been rapidly growing in the past few years in all life disciplines. IoT provides automation and smart control to its users in different domains such as home automation, healthcare systems, automotive, and many more. Given the tremendous number of connected IoT devices, this growth leads to enormous automatic interactions among sizeable IoT apps in their environment, ma… ▽ More

    Submitted 2 March, 2022; originally announced March 2022.

  5. arXiv:2203.00771  [pdf, other

    cs.SE

    Mining Domain Models in Ethereum DApps using Code Cloning

    Authors: Noama Fatima Samreen, Manar H. Alalfi

    Abstract: This research study explores the use of near-miss clone detection to support the characterization of domain models of smart contracts for each of the popular domains in which smart contracts are being rapidly adopted. In this paper, we leverage the code clone detection techniques to detect similarities in functions of the smart contracts deployed onto the Ethereum blockchain network. We analyze th… ▽ More

    Submitted 1 March, 2022; originally announced March 2022.

  6. arXiv:2203.00769  [pdf, other

    cs.CR

    VOLCANO: Detecting Vulnerabilities of Ethereum Smart Contracts Using Code Clone Analysis

    Authors: Noama Fatima Samreen, Manar H. Alalfi

    Abstract: Ethereum Smart Contracts based on Blockchain Technology (BT) enables monetary transactions among peers on a blockchain network independent of a central authorizing agency. Ethereum Smart Contracts are programs that are deployed as decentralized applications, having the building blocks of the blockchain consensus protocol. This enables consumers to make agreements in a transparent and conflict-free… ▽ More

    Submitted 1 March, 2022; originally announced March 2022.

  7. arXiv:2202.02895  [pdf, other

    cs.SE cs.CR

    An Automated Approach for Privacy Leakage Identification in IoT Apps

    Authors: Bara' Nazzal, Manar H. Alalfi

    Abstract: This paper presents a fully automated static analysis approach and a tool, Taint-Things, for the identification of tainted flows in SmartThings IoT apps. Taint-Things accurately identifies all tainted flows reported by one of the state-of-the-art tools with at least 4 times improved performance. Our approach reports potential vulnerable tainted flows in a form of a concise security slice, where th… ▽ More

    Submitted 6 February, 2022; originally announced February 2022.

  8. arXiv:2201.02677  [pdf, other

    cs.CR cs.SE

    Predicting sensitive information leakage in IoT applications using flows-aware machine learning approach

    Authors: Hajra Naeem, Manar H. Alalfi

    Abstract: This paper presents an approach for identification of vulnerable IoT applications. The approach focuses on a category of vulnerabilities that leads to sensitive information leakage which can be identified by using taint flow analysis. Tainted flows vulnerability is very much impacted by the structure of the program and the order of the statements in the code, designing an approach to detect such v… ▽ More

    Submitted 7 January, 2022; originally announced January 2022.

  9. arXiv:2110.05562  [pdf, other

    cs.CR cs.SE

    A Mutation Framework for Evaluating Security Analysis tools in IoT Applications

    Authors: Manar H. Alalfi, Sajeda Parveen, Bara Nazzal

    Abstract: With the growing and widespread use of Internet of Things (IoT) in our daily life, its security is becoming more crucial. To ensure information security, we require better security analysis tools for IoT applications. Hence, this paper presents an automated framework to evaluate taint-flow analysis tools in the domain of IoT applications. First, we propose a set of mutational operators tailored to… ▽ More

    Submitted 11 October, 2021; originally announced October 2021.

  10. arXiv:2105.06974  [pdf, other

    cs.CR

    A Survey of Security Vulnerabilities in Ethereum Smart Contracts

    Authors: Noama Fatima Samreen, Manar H. Alalfi

    Abstract: Ethereum Smart Contracts based on Blockchain Technology (BT)enables monetary transactions among peers on a blockchain network independent of a central authorizing agency. Ethereum smart contracts are programs that are deployed as decentralized applications, having the building blocks of the blockchain consensus protocol. This enables consumers to make agreements in a transparent and conflict-free… ▽ More

    Submitted 14 May, 2021; originally announced May 2021.

    Journal ref: CASCON20 Proceedings of the 30th Annual International Conference on Computer Science and Software Engineering November 2020

  11. Reentrancy Vulnerability Identification in Ethereum Smart Contracts

    Authors: Noama Fatima Samreen, Manar H. Alalfi

    Abstract: Ethereum Smart contracts use blockchain to transfer values among peers on networks without central agency. These programs are deployed on decentralized applications running on top of the blockchain consensus protocol to enable people to make agreements in a transparent and conflict-free environment. The security vulnerabilities within those smart contracts are a potential threat to the application… ▽ More

    Submitted 6 May, 2021; originally announced May 2021.

    Comments: arXiv admin note: text overlap with arXiv:2105.02852

    Journal ref: 2020 IEEE International Workshop on Blockchain Oriented Software Engineering (IWBOSE)

  12. arXiv:2105.02852  [pdf, other

    cs.CR

    SmartScan: An approach to detect Denial of Service Vulnerability in Ethereum Smart Contracts

    Authors: Noama Fatima Samreen, Manar H. Alalfi

    Abstract: Blockchain technology (BT) Ethereum Smart Contracts allows programmable transactions that involve the transfer of monetary assets among peers on a BT network independent of a central authorizing agency. Ethereum Smart Contracts are programs that are deployed as decentralized applications, having the building blocks of the blockchain consensus protocol. This technology enables consumers to make agr… ▽ More

    Submitted 20 May, 2021; v1 submitted 6 May, 2021; originally announced May 2021.

    Journal ref: ICSEW 21 Proceedings of the IEEE/ACM 43rd International Conference on Software Engineering Workshops May 2021

  13. arXiv:2011.04066  [pdf, other

    cs.CR cs.SE

    An Approach for the Identification of Information Leakage in Automotive Infotainment systems

    Authors: Abdul Moiz, Manar H. Alalfi

    Abstract: The advancements in the digitization world has revolutionized the automotive industry. Today's modern cars are equipped with internet, computers that can provide autonomous driving functionalities as well as infotainment systems that can run mobile operating systems, like Android Auto and Apple CarPlay. Android Automotive is Google's android operating system tailored to run natively on vehicle's i… ▽ More

    Submitted 8 November, 2020; originally announced November 2020.