Skip to main content

Showing 1–24 of 24 results for author: Massacci, F

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.06371  [pdf, other

    cs.CR cs.SE

    Using AI Assistants in Software Development: A Qualitative Study on Security Practices and Concerns

    Authors: Jan H. Klemmer, Stefan Albert Horstmann, Nikhil Patnaik, Cordelia Ludden, Cordell Burton Jr, Carson Powers, Fabio Massacci, Akond Rahman, Daniel Votipka, Heather Richter Lipford, Awais Rashid, Alena Naiakshina, Sascha Fahl

    Abstract: Following the recent release of AI assistants, such as OpenAI's ChatGPT and GitHub Copilot, the software industry quickly utilized these tools for software development tasks, e.g., generating code or consulting AI for advice. While recent research has demonstrated that AI-generated code can contain security issues, how software professionals balance AI assistant usage and security remains unclear.… ▽ More

    Submitted 10 May, 2024; originally announced May 2024.

    Comments: 20 pages, 2 figures, 3 tables

  2. arXiv:2403.09537  [pdf, other

    cs.SE

    Analyzing and Mitigating (with LLMs) the Security Misconfigurations of Helm Charts from Artifact Hub

    Authors: Francesco Minna, Fabio Massacci, Katja Tuma

    Abstract: Background: Helm is a package manager that allows defining, installing, and upgrading applications with Kubernetes (K8s), a popular container orchestration platform. A Helm chart is a collection of files describing all dependencies, resources, and parameters required for deploying an application within a K8s cluster. Objective: The goal of this study is to mine and empirically evaluate the securit… ▽ More

    Submitted 14 March, 2024; originally announced March 2024.

    Comments: MSR 2024 - Registered Reports

  3. arXiv:2403.06300  [pdf, other

    cs.SE cs.CR

    Cross-ecosystem categorization: A manual-curation protocol for the categorization of Java Maven libraries along Python PyPI Topics

    Authors: Ranindya Paramitha, Yuan Feng, Fabio Massacci, Carlos E. Budde

    Abstract: Context: Software of different functional categories, such as text processing vs. networking, has different profiles in terms of metrics like security and updates. Using popularity to compare e.g. Java vs. Python libraries might give a skewed perspective, as the categories of the most popular software vary from one ecosystem to the next. How can one compare libraries datasets across software ecosy… ▽ More

    Submitted 10 March, 2024; originally announced March 2024.

    Comments: Submitted to the journal "Information and Software Technology"

    MSC Class: D.2.8; D.3.2; D.2.0

  4. A Graph-based Stratified Sampling Methodology for the Analysis of (Underground) Forums

    Authors: Giorgio Di Tizio, Gilberto Atondo Siu, Alice Hutchings, Fabio Massacci

    Abstract: [Context] Researchers analyze underground forums to study abuse and cybercrime activities. Due to the size of the forums and the domain expertise required to identify criminal discussions, most approaches employ supervised machine learning techniques to automatically classify the posts of interest. [Goal] Human annotation is costly. How to select samples to annotate that account for the structure… ▽ More

    Submitted 18 August, 2023; originally announced August 2023.

    Journal ref: IEEE Transactions on Information Forensics and Security, 2023

  5. Are Software Updates Useless Against Advanced Persistent Threats?

    Authors: Fabio Massacci, Giorgio Di Tizio

    Abstract: A dilemma worth Shakespeare's Hamlet is increasingly haunting companies and security researchers: ``to update or not to update, this is the question``. From the perspective of recommended common practices by software vendors the answer is unambiguous: you should keep your software up-to-date. But is common sense always good sense? We argue it is not.

    Submitted 12 June, 2023; originally announced June 2023.

    Journal ref: Communications of the ACM 66, 1 (2023)

  6. arXiv:2302.05355  [pdf, other

    cs.CR cs.CY

    Building cross-language corpora for human understanding of privacy policies

    Authors: Francesco Ciclosi, Silvia Vidor, Fabio Massacci

    Abstract: Making sure that users understand privacy policies that impact them is a key challenge for a real GDPR deployment. Research studies are mostly carried in English, but in Europe and elsewhere, users speak a language that is not English. Replicating studies in different languages requires the availability of comparable cross-language privacy policies corpora. This work provides a methodology for bui… ▽ More

    Submitted 10 February, 2023; originally announced February 2023.

    ACM Class: D.2.9; J.1; K.1; K.4.1; K.4.2; K.5.2; K.6.1; K.6.4; K.6.5; K.7.1

  7. The Data Protection Officer, an ubiquitous role nobody really knows

    Authors: Francesco Ciclosi, Fabio Massacci

    Abstract: Among all cybersecurity and privacy workers, the Data Protection Officer (DPO) stands between those auditing a company's compliance and those acting as management advisors. A person that must be somehow versed in legal, management, and cybersecurity technical skills. We describe how this role tackles socio-technical risks in everyday scenarios.

    Submitted 15 December, 2022; originally announced December 2022.

    Comments: Short version accepted for publication in IEEE Security & Privacy, Special Issue on Usable Security for Security Workers, 2023. IEEE Press. This report includes several supplemental materials not included in the journal publication

    ACM Class: D.2.9; J.1; K.1; K.4.2; K.5.2; K.6.1; K.6.5; K.7.1

  8. arXiv:2209.07211  [pdf, other

    cs.SE

    On the acceptance by code reviewers of candidate security patches suggested by Automated Program Repair tools

    Authors: Aurora Papotti, Ranindya Paramitha, Fabio Massacci

    Abstract: Background: Testing and validation of the semantic correctness of patches provided by tools for Automated Program Repairs (APR) has received a lot of attention. Yet, the eventual acceptance or rejection of suggested patches for real world projects by humans patch reviewers has received a limited attention. Objective: To address this issue, we plan to investigate whether (possibly incorrect) securi… ▽ More

    Submitted 16 September, 2022; v1 submitted 15 September, 2022; originally announced September 2022.

  9. arXiv:2207.10780  [pdf, ps, other

    cs.CR

    Cryptographic and Financial Fairness

    Authors: Daniele Friolo, Fabio Massacci, Chan Nam Ngo, Daniele Venturi

    Abstract: A recent trend in multi-party computation is to achieve cryptographic fairness via monetary penalties, i.e. each honest player either obtains the output or receives a compensation in the form of a cryptocurrency. We pioneer another type of fairness, financial fairness, that is closer to the real-world valuation of financial transactions. Intuitively, a penalty protocol is financially fair if the n… ▽ More

    Submitted 11 August, 2022; v1 submitted 21 July, 2022; originally announced July 2022.

  10. arXiv:2205.14498  [pdf, other

    cs.CR

    Towards a Security Stress-Test for Cloud Configurations

    Authors: Francesco Minna, Fabio Massacci, Katja Tuma

    Abstract: Securing cloud configurations is an elusive task, which is left up to system administrators who have to base their decisions on ``trial and error'' experimentations or by observing good practices (e.g., CIS Benchmarks). We propose a knowledge, AND/OR, graphs approach to model cloud deployment security objects and vulnerabilities. In this way, we can capture relationships between configurations, pe… ▽ More

    Submitted 7 June, 2022; v1 submitted 28 May, 2022; originally announced May 2022.

    Comments: Conference: The IEEE International Conference on Cloud Computing (CLOUD) 2022

  11. Software Updates Strategies: a Quantitative Evaluation against Advanced Persistent Threats

    Authors: Giorgio Di Tizio, Michele Armellini, Fabio Massacci

    Abstract: Software updates reduce the opportunity for exploitation. However, since updates can also introduce breaking changes, enterprises face the problem of balancing the need to secure software with updates with the need to support operations. We propose a methodology to quantitatively investigate the effectiveness of software updates strategies against attacks of Advanced Persistent Threats (APTs). We… ▽ More

    Submitted 25 May, 2022; v1 submitted 16 May, 2022; originally announced May 2022.

  12. arXiv:2103.03331  [pdf, other

    cs.SE

    Secure Software Development in the Era of Fluid Multi-party Open Software and Services

    Authors: Ivan Pashchenko, Riccardo Scandariato, Antonino Sabetta, Fabio Massacci

    Abstract: Pushed by market forces, software development has become fast-paced. As a consequence, modern development projects are assembled from 3rd-party components. Security & privacy assurance techniques once designed for large, controlled updates over months or years, must now cope with small, continuous changes taking place within a week, and happening in sub-components that are controlled by third-part… ▽ More

    Submitted 4 March, 2021; originally announced March 2021.

    Comments: 7 pages, 1 figure, to be published in Proceedings of International Conference on Software Engineering - New Ideas and Emerging Results

    ACM Class: D.2.0; D.2.13

  13. arXiv:2103.03317  [pdf, other

    cs.SE

    Technical Leverage in a Software Ecosystem: Development Opportunities and Security Risks

    Authors: Fabio Massacci, Ivan Pashchenko

    Abstract: In finance, leverage is the ratio between assets borrowed from others and one's own assets. A matching situation is present in software: by using free open-source software (FOSS) libraries a developer leverages on other people's code to multiply the offered functionalities with a much smaller own codebase. In finance as in software, leverage magnifies profits when returns from borrowing exceed cos… ▽ More

    Submitted 4 March, 2021; originally announced March 2021.

    Comments: 14 pages, 5 figures, to be published in Proceedings of International Conference on Software Engineering (ICSE 2021)

    ACM Class: D.2.8; D.2.13

  14. arXiv:1909.07227  [pdf, other

    cs.CR cs.LG

    A Convolutional Transformation Network for Malware Classification

    Authors: Duc-Ly Vu, Trong-Kha Nguyen, Tam V. Nguyen, Tu N. Nguyen, Fabio Massacci, Phu H. Phung

    Abstract: Modern malware evolves various detection avoidance techniques to bypass the state-of-the-art detection methods. An emerging trend to deal with this issue is the combination of image transformation and machine learning techniques to classify and detect malware. However, existing works in this field only perform simple image transformation methods that limit the accuracy of the detection. In this pa… ▽ More

    Submitted 16 September, 2019; originally announced September 2019.

    Comments: 6 pages, 4 figures

  15. arXiv:1808.09753  [pdf, other

    cs.SE cs.CR

    Vulnerable Open Source Dependencies: Counting Those That Matter

    Authors: Ivan Pashchenko, Henrik Plate, Serena Elisa Ponta, Antonino Sabetta, Fabio Massacci

    Abstract: BACKGROUND: Vulnerable dependencies are a known problem in today's open-source software ecosystems because OSS libraries are highly interconnected and developers do not always update their dependencies. AIMS: In this paper we aim to present a precise methodology, that combines the code-based analysis of patches with information on build, test, update dates, and group extracted from the very code r… ▽ More

    Submitted 29 August, 2018; originally announced August 2018.

    Comments: This is a pre-print of the paper that appears, with the same title, in the proceedings of the 12th International Symposium on Empirical Software Engineering and Measurement, 2018

  16. arXiv:1808.06547  [pdf, other

    cs.CY cs.CR

    The Effect of Security Education and Expertise on Security Assessments: the Case of Software Vulnerabilities

    Authors: Luca Allodi, Marco Cremonini, Fabio Massacci, Woohyun Shim

    Abstract: In spite of the growing importance of software security and the industry demand for more cyber security expertise in the workforce, the effect of security education and experience on the ability to assess complex software security problems has only been recently investigated. As proxy for the full range of software security skills, we considered the problem of assessing the severity of software vu… ▽ More

    Submitted 20 August, 2018; originally announced August 2018.

    Comments: Presented at the Workshop on the Economics of Information Security (WEIS 2018), Innsbruck, Austria, June 2018

  17. Attack Potential in Impact and Complexity

    Authors: Luca Allodi, Fabio Massacci

    Abstract: Vulnerability exploitation is reportedly one of the main attack vectors against computer systems. Yet, most vulnerabilities remain unexploited by attackers. It is therefore of central importance to identify vulnerabilities that carry a high `potential for attack'. In this paper we rely on Symantec data on real attacks detected in the wild to identify a trade-off in the Impact and Complexity of a v… ▽ More

    Submitted 15 January, 2018; originally announced January 2018.

    Journal ref: Proceedings of the 12th International Conference on Availability, Reliability and Security (ARES 2017)

  18. TestREx: a Framework for Repeatable Exploits

    Authors: Stanislav Dashevskyi, Daniel Ricardo dos Santos, Fabio Massacci, Antonino Sabetta

    Abstract: Web applications are the target of many well known exploits and also a fertile ground for the discovery of security vulnerabilities. Yet, the success of an exploit depends both on the vulnerability in the application source code and the environment in which the application is deployed and run. As execution environments are complex (application servers, databases and other supporting applications),… ▽ More

    Submitted 10 September, 2017; originally announced September 2017.

    Journal ref: Int. J. Software Tools for Technology Transfer, 2017

  19. A Systematically Empirical Evaluation of Vulnerability Discovery Models: a Study on Browsers' Vulnerabilities

    Authors: Viet Hung Nguyen, Fabio Massacci

    Abstract: A precise vulnerability discovery model (VDM) will provide a useful insight to assess software security, and could be a good prediction instrument for both software vendors and users to understand security trends and plan ahead patching schedule accordingly. Thus far, several models have been proposed and validated. Yet, no systematically independent validation by somebody other than the author ex… ▽ More

    Submitted 11 June, 2013; originally announced June 2013.

    Comments: 15 pages

    Journal ref: IEEE Transactions on Software Engineering 40(12), 2014

  20. arXiv:1305.2136  [pdf, other

    cs.CR

    MAP-REDUCE Runtime Enforcement of Information Flow Policies

    Authors: Minh Ngo, Fabio Massacci, Olga Gadyatskaya

    Abstract: We propose a flexible framework that can be easily customized to enforce a large variety of information flow properties. Our framework combines the ideas of secure multi-execution and map-reduce computations. The information flow property of choice can be obtained by simply changes to a map (or reduce) program that control parallel executions. We present the architecture of the enforcement mecha… ▽ More

    Submitted 9 May, 2013; originally announced May 2013.

    Comments: 40 pages

    Report number: DISI-13-019 ACM Class: D.4.6; D.2.4

  21. arXiv:1302.4133  [pdf, other

    cs.CR

    The (Un)Reliability of NVD Vulnerable Versions Data: an Empirical Experiment on Google Chrome Vulnerabilities

    Authors: Viet Hung Nguyen, Fabio Massacci

    Abstract: NVD is one of the most popular databases used by researchers to conduct empirical research on data sets of vulnerabilities. Our recent analysis on Chrome vulnerability data reported by NVD has revealed an abnormally phenomenon in the data where almost vulnerabilities were originated from the first versions. This inspires our experiment to validate the reliability of the NVD vulnerable version data… ▽ More

    Submitted 17 February, 2013; originally announced February 2013.

  22. My Software has a Vulnerability, should I worry?

    Authors: Luca Allodi, Fabio Massacci

    Abstract: (U.S) Rule-based policies to mitigate software risk suggest to use the CVSS score to measure the individual vulnerability risk and act accordingly: an HIGH CVSS score according to the NVD (National (U.S.) Vulnerability Database) is therefore translated into a "Yes". A key issue is whether such rule is economically sensible, in particular if reported vulnerabilities have been actually exploited in… ▽ More

    Submitted 24 September, 2013; v1 submitted 7 January, 2013; originally announced January 2013.

    Comments: 12 pages, 4 figures

    Journal ref: ACM TISSEC Vol 17 Issue 1, 2014

  23. arXiv:1203.5830  [pdf, other

    cs.CR

    An Independent Validation of Vulnerability Discovery Models

    Authors: Viet Hung Nguyen, Fabio Massacci

    Abstract: Having a precise vulnerability discovery model (VDM) would provide a useful quantitative insight to assess software security. Thus far, several models have been proposed with some evidence supporting their goodness-of-fit. In this work we describe an independent validation of the applicability of six existing VDMs in seventeen releases of the three popular browsers Firefox, Google Chrome and Int… ▽ More

    Submitted 26 March, 2012; originally announced March 2012.

    Comments: This paper is to appear in ASIACCS'12

  24. arXiv:cs/0003039  [pdf, ps, other

    cs.AI

    DES: a Challenge Problem for Nonmonotonic Reasoning Systems

    Authors: Maarit Hietalahti, Fabio Massacci, Ilkka Niemela

    Abstract: The US Data Encryption Standard, DES for short, is put forward as an interesting benchmark problem for nonmonotonic reasoning systems because (i) it provides a set of test cases of industrial relevance which shares features of randomly generated problems and real-world problems, (ii) the representation of DES using normal logic programs with the stable model semantics is simple and easy to under… ▽ More

    Submitted 8 March, 2000; originally announced March 2000.

    Comments: 10 pages, 1 Postscript figure, uses aaai.sty and graphicx.sty

    ACM Class: I.2.3; I.2.4