Skip to main content

Showing 1–16 of 16 results for author: Mirakhorli, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.05135  [pdf, ps, other

    cs.SE cs.CL cs.LG

    Lessons from the Use of Natural Language Inference (NLI) in Requirements Engineering Tasks

    Authors: Mohamad Fazelnia, Viktoria Koscinski, Spencer Herzog, Mehdi Mirakhorli

    Abstract: We investigate the use of Natural Language Inference (NLI) in automating requirements engineering tasks. In particular, we focus on three tasks: requirements classification, identification of requirements specification defects, and detection of conflicts in stakeholders' requirements. While previous research has demonstrated significant benefit in using NLI as a universal method for a broad spectr… ▽ More

    Submitted 24 April, 2024; originally announced May 2024.

  2. arXiv:2403.10836  [pdf, other

    cs.SE

    IPSynth: Interprocedural Program Synthesis for Software Security Implementation

    Authors: Ali Shokri, Ibrahim Jameel Mujhid, Mehdi Mirakhorli

    Abstract: To implement important quality attributes of software such as architectural security tactics, developers incorporate API of software frameworks, as building blocks, to avoid re-inventing the wheel and improve their productivity. However, this is a challenging and error-prone task, especially for novice programmers. Despite the advances in the field of API-based program synthesis, the state-of-the-… ▽ More

    Submitted 16 March, 2024; originally announced March 2024.

  3. arXiv:2402.11151  [pdf

    cs.SE

    A Landscape Study of Open Source and Proprietary Tools for Software Bill of Materials (SBOM)

    Authors: Mehdi Mirakhorli, Derek Garcia, Schuyler Dillon, Kevin Laporte, Matthew Morrison, Henry Lu, Viktoria Koscinski, Christopher Enoch

    Abstract: Modern software applications heavily rely on diverse third-party components, libraries, and frameworks sourced from various vendors and open source repositories, presenting a complex challenge for securing the software supply chain. To address this complexity, the adoption of a Software Bill of Materials (SBOM) has emerged as a promising solution, offering a centralized repository that inventories… ▽ More

    Submitted 16 February, 2024; originally announced February 2024.

  4. arXiv:2311.00943  [pdf

    cs.SE

    Sound Call Graph Construction for Java Object Deserialization

    Authors: Joanna C. S. Santos, Mehdi Mirakhorli, Ali Shokri

    Abstract: Object serialization and deserialization is widely used for storing and preserving objects in files, memory, or database as well as for transporting them across machines, enabling remote interaction among processes and many more. This mechanism relies on reflection, a dynamic language that introduces serious challenges for static analyses. Current state-of-the-art call graph construction algorithm… ▽ More

    Submitted 1 November, 2023; originally announced November 2023.

  5. arXiv:2307.05605  [pdf, other

    cs.SE

    A Novel Approach to Identify Security Controls in Source Code

    Authors: Ahmet Okutan, Ali Shokri, Viktoria Koscinski, Mohamad Fazelinia, Mehdi Mirakhorli

    Abstract: Secure by Design has become the mainstream development approach ensuring that software systems are not vulnerable to cyberattacks. Architectural security controls need to be carefully monitored over the software development life cycle to avoid critical design flaws. Unfortunately, functional requirements usually get in the way of the security features, and the development team may not correctly ad… ▽ More

    Submitted 10 July, 2023; originally announced July 2023.

  6. arXiv:2211.05075  [pdf, other

    cs.CR

    Supporting AI/ML Security Workers through an Adversarial Techniques, Tools, and Common Knowledge (AI/ML ATT&CK) Framework

    Authors: Mohamad Fazelnia, Ahmet Okutan, Mehdi Mirakhorli

    Abstract: This paper focuses on supporting AI/ML Security Workers -- professionals involved in the development and deployment of secure AI-enabled software systems. It presents AI/ML Adversarial Techniques, Tools, and Common Knowledge (AI/ML ATT&CK) framework to enable AI/ML Security Workers intuitively to explore offensive and defensive tactics.

    Submitted 9 November, 2022; originally announced November 2022.

    Comments: AI/ML ATT&CK

  7. arXiv:2202.09465  [pdf, other

    cs.CR cs.LG

    Attacks, Defenses, And Tools: A Framework To Facilitate Robust AI/ML Systems

    Authors: Mohamad Fazelnia, Igor Khokhlov, Mehdi Mirakhorli

    Abstract: Software systems are increasingly relying on Artificial Intelligence (AI) and Machine Learning (ML) components. The emerging popularity of AI techniques in various application domains attracts malicious actors and adversaries. Therefore, the developers of AI-enabled software systems need to take into account various novel cyber-attacks and vulnerabilities that these systems may be susceptible to.… ▽ More

    Submitted 18 February, 2022; originally announced February 2022.

  8. arXiv:2112.01635  [pdf

    cs.SE

    A Grounded Theory Based Approach to Characterize Software Attack Surfaces

    Authors: Sara Moshtari, Ahmet Okutan, Mehdi Mirakhorli

    Abstract: The notion of Attack Surface refers to the critical points on the boundary of a software system which are accessible from outside or contain valuable content for attackers. The ability to identify attack surface components of software system has a significant role in effectiveness of vulnerability analysis approaches. Most prior works focus on vulnerability techniques that use an approximation of… ▽ More

    Submitted 30 March, 2022; v1 submitted 2 December, 2021; originally announced December 2021.

    Comments: This paper has been accepted in the IEEE/ACM International Conference on Software Engineering (ICSE 2022) and is going to be published. Please feel free to cite it

  9. arXiv:2108.01165  [pdf, other

    cs.SE

    DepRes: A Tool for Resolving Fully Qualified Names and Their Dependencies

    Authors: Ali Shokri, Mehdi Mirakhorli

    Abstract: Reusing code snippets shared by other programmers on Q&A forums (e.g., StackOverflow) is a common practice followed by software developers. However, lack of sufficient information about the fully qualified name (FQN) of identifiers in borrowed code snippets, results in serious compile errors. Programmers either have to manually search for the correct FQN of identifiers which is a tedious and error… ▽ More

    Submitted 2 August, 2021; originally announced August 2021.

  10. ArCode: A Tool for Supporting Comprehension andImplementation of Architectural Concerns

    Authors: Ali Shokri, Mehdi Mirakhorli

    Abstract: Integrated development environments (IDE) play an important role in supporting developers during program comprehension and completion. Many of these supportive features focus on low-level programming and debugging activities. Unfortunately, there is less support in understanding and implementing architectural concerns in the form of patterns, tactics and/or other concerns. In this paper we present… ▽ More

    Submitted 11 March, 2021; originally announced March 2021.

    Comments: This paper has been accepted in 29th IEEE/ACM International Conference on Program Comprehension (ICPC 2021) and is going to be published. Please feel free to cite it

  11. ArCode: Facilitating the Use of Application Frameworks to Implement Tactics and Patterns

    Authors: Ali Shokri, Joanna C. S. Santos, Mehdi Mirakhorli

    Abstract: Software designers and developers are increasingly relying on application frameworks as first-class design concepts. They instantiate the services that frameworks provide to implement various architectural tactics and patterns. One of the challenges in using frameworks for such tasks is the difficulty of learning and correctly using frameworks' APIs. This paper introduces a learning-based approach… ▽ More

    Submitted 16 February, 2021; originally announced February 2021.

    Comments: This paper has been accepted in the main track of 2021 IEEE International Conference on Software Architecture (ICSA 2021) and is going to be published. Please feel free to cite it

  12. Did You Remember to Test Your Tokens?

    Authors: Danielle Gonzalez, Michael Rath, Mehdi Mirakhorli

    Abstract: Authentication is a critical security feature for confirming the identity of a system's users, typically implemented with help from frameworks like Spring Security. It is a complex feature which should be robustly tested at all stages of development. Unit testing is an effective technique for fine-grained verification of feature behaviors that is not widely-used to test authentication. Part of the… ▽ More

    Submitted 25 June, 2020; originally announced June 2020.

    Comments: In 17th International Conference on Mining Software Repositories (MSR) 2020, Technical Track, Virtual. 11 pages

  13. arXiv:1909.13693  [pdf, other

    cs.SE

    Automated Characterization of Software Vulnerabilities

    Authors: Danielle Gonzalez, Holly Hastings, Mehdi Mirakhorli

    Abstract: Preventing vulnerability exploits is a critical software maintenance task, and software engineers often rely on Common Vulnerability and Exposure (CVEs) reports for information about vulnerable systems and libraries. These reports include descriptions, disclosure sources, and manually-populated vulnerability characteristics such as root cause from the NIST Vulnerability Description Ontology (VDO).… ▽ More

    Submitted 30 September, 2019; originally announced September 2019.

    Comments: Accepted to the 2019 IEEE International Conference on Software Maintenance and Evolution (ICSME) in Cleveland, Ohio

  14. arXiv:1904.07163  [pdf

    eess.IV cs.LG stat.ML

    Graph-Based Method for Anomaly Prediction in Brain Network

    Authors: Jalal Mirakhorli, Hamidreza Amindavar, Mojgan Mirakhorli

    Abstract: Resting-state functional MRI (rs-fMRI) in functional neuroimaging techniques have improved in brain disorders, dysfunction studies via map** the topology of the brain connections, i.e. connectopic map**. Since, there are the slight differences between healthy and unhealthy brain regions and functions, investigation into the complex topology of functional and structural brain networks in human… ▽ More

    Submitted 17 July, 2019; v1 submitted 15 April, 2019; originally announced April 2019.

  15. A Fine-Grained Approach for Automated Conversion of JUnit Assertions to English

    Authors: Danielle Gonzalez, Suzanne Prentice, Mehdi Mirakhorli

    Abstract: Converting source or unit test code to English has been shown to improve the maintainability, understandability, and analysis of software and tests. Code summarizers identify important statements in the source/tests and convert them to easily understood English sentences using static analysis and NLP techniques. However, current test summarization approaches handle only a subset of the variation a… ▽ More

    Submitted 12 November, 2018; originally announced November 2018.

    Comments: In Proceedings of the 4th ACM SIGSOFT International Workshop on NLP for Software Engineering (NL4SE 18), November 4, 2018, Lake Buena Vista, FL, USA. ACM, New York, NY, USA, 4 pages

  16. A Large-Scale Study on the Usage of Testing Patterns that Address Maintainability Attributes (Patterns for Ease of Modification, Diagnoses, and Comprehension)

    Authors: Danielle Gonzalez, Joanna C. S. Santos, Andrew Popovich, Mehdi Mirakhorli, Mei Nagappan

    Abstract: Test case maintainability is an important concern, especially in open source and distributed development environments where projects typically have high contributor turnover with varying backgrounds and experience, and where code ownership changes often. Similar to design patterns, patterns for unit testing promote maintainability quality attributes such as ease of diagnoses, modifiability, and co… ▽ More

    Submitted 26 April, 2017; originally announced April 2017.

    Comments: Mining Software Repositories (MSR) 2017 Research Track

    Journal ref: 017 IEEE/ACM 14th International Conference on Mining Software Repositories (MSR), Buenos Aires, 2017, pp. 391-401