Skip to main content

Showing 1–28 of 28 results for author: Nejati, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.20072  [pdf, other

    cs.CR cs.DM cs.LO cs.SC

    SHA-256 Collision Attack with Programmatic SAT

    Authors: Nahiyan Alamgir, Saeed Nejati, Curtis Bright

    Abstract: Cryptographic hash functions play a crucial role in ensuring data security, generating fixed-length hashes from variable-length inputs. The hash function SHA-256 is trusted for data security due to its resilience after over twenty years of intense scrutiny. One of its critical properties is collision resistance, meaning that it is infeasible to find two different inputs with the same hash. Current… ▽ More

    Submitted 28 June, 2024; originally announced June 2024.

    Comments: To appear in the 2024 Proceedings of the International Workshop on Satisfiability Checking and Symbolic Computation

  2. arXiv:2405.11141  [pdf, other

    cs.CR cs.SE

    Enhancing Automata Learning with Statistical Machine Learning: A Network Security Case Study

    Authors: Negin Ayoughi, Shiva Nejati, Mehrdad Sabetzadeh, Patricio Saavedra

    Abstract: Intrusion detection systems are crucial for network security. Verification of these systems is complicated by various factors, including the heterogeneity of network platforms and the continuously changing landscape of cyber threats. In this paper, we use automata learning to derive state machines from network-traffic data with the objective of supporting behavioural verification of intrusion dete… ▽ More

    Submitted 17 May, 2024; originally announced May 2024.

  3. arXiv:2405.01695  [pdf, other

    cs.SE

    Requirements-driven Slicing of Simulink Models Using LLMs

    Authors: Dipeeka Luitel, Shiva Nejati, Mehrdad Sabetzadeh

    Abstract: Model slicing is a useful technique for identifying a subset of a larger model that is relevant to fulfilling a given requirement. Notable applications of slicing include reducing inspection effort when checking design adequacy to meet requirements of interest and when conducting change impact analysis. In this paper, we present a method based on large language models (LLMs) for extracting model s… ▽ More

    Submitted 2 May, 2024; originally announced May 2024.

    Comments: This paper will appear at the 11th International Workshop on Artificial Intelligence and Requirements Engineering (AIRE'24)

  4. arXiv:2404.17020  [pdf, other

    cs.SE cs.AI

    Generating Minimalist Adversarial Perturbations to Test Object-Detection Models: An Adaptive Multi-Metric Evolutionary Search Approach

    Authors: Cristopher McIntyre-Garcia, Adrien Heymans, Beril Borali, Won-Sook Lee, Shiva Nejati

    Abstract: Deep Learning (DL) models excel in computer vision tasks but can be susceptible to adversarial examples. This paper introduces Triple-Metric EvoAttack (TM-EVO), an efficient algorithm for evaluating the robustness of object-detection DL models against adversarial attacks. TM-EVO utilizes a multi-metric fitness function to guide an evolutionary search efficiently in creating effective adversarial t… ▽ More

    Submitted 25 April, 2024; originally announced April 2024.

  5. arXiv:2404.11542  [pdf, other

    cs.SE

    A Lean Simulation Framework for Stress Testing IoT Cloud Systems

    Authors: Jia Li, Behrad Moeini, Shiva Nejati, Mehrdad Sabetzadeh, Michael McCallen

    Abstract: The Internet of Things connects a plethora of smart devices globally across various applications like smart cities, autonomous vehicles and health monitoring. Simulation plays a key role in the testing of IoT systems, noting that field testing of a complete IoT product may be infeasible or prohibitively expensive. This paper addresses a specific yet important need in simulation-based testing for I… ▽ More

    Submitted 3 June, 2024; v1 submitted 17 April, 2024; originally announced April 2024.

    Comments: Accepted to the IEEE Transactions on Software Engineering. arXiv admin note: text overlap with arXiv:2208.06954

  6. arXiv:2403.08798  [pdf, other

    cs.DC

    Self-adaptive, Requirements-driven Autoscaling of Microservices

    Authors: João Paulo Karol Santos Nunes, Shiva Nejati, Mehrdad Sabetzadeh, Elisa Yumi Nakagawa

    Abstract: Microservices architecture offers various benefits, including granularity, flexibility, and scalability. A crucial feature of this architecture is the ability to autoscale microservices, i.e., adjust the number of replicas and/or manage resources. Several autoscaling solutions already exist. Nonetheless, when employed for diverse microservices compositions, current solutions may exhibit suboptimal… ▽ More

    Submitted 1 February, 2024; originally announced March 2024.

    Comments: This paper has been accepted at the 19th International Conference on Software Engineering for Adaptive and Self-Managing Systems (SEAMS 2024)

  7. arXiv:2312.05631  [pdf, other

    cs.SE

    Test Generation Strategies for Building Failure Models and Explaining Spurious Failures

    Authors: Baharin Aliashrafi Jodat, Abhishek Chandar, Shiva Nejati, Mehrdad Sabetzadeh

    Abstract: Test inputs fail not only when the system under test is faulty but also when the inputs are invalid or unrealistic. Failures resulting from invalid or unrealistic test inputs are spurious. Avoiding spurious failures improves the effectiveness of testing in exercising the main functions of a system, particularly for compute-intensive (CI) systems where a single test execution takes significant time… ▽ More

    Submitted 9 December, 2023; originally announced December 2023.

    Comments: This paper is accepted at the ACM Transactions on Software Engineering and Methodology (TOSEM) in December 2023

  8. arXiv:2311.18768  [pdf, other

    cs.SE cs.AI

    Evaluating the Impact of Flaky Simulators on Testing Autonomous Driving Systems

    Authors: Mohammad Hossein Amini, Shervin Naseri, Shiva Nejati

    Abstract: Simulators are widely used to test Autonomous Driving Systems (ADS), but their potential flakiness can lead to inconsistent test results. We investigate test flakiness in simulation-based testing of ADS by addressing two key questions: (1) How do flaky ADS simulations impact automated testing that relies on randomized algorithms? and (2) Can machine learning (ML) effectively identify flaky ADS tes… ▽ More

    Submitted 30 November, 2023; originally announced November 2023.

    Comments: Accepted for publication by Empirical Software Engineering Journal (EMSE) (in November 2023)

  9. arXiv:2306.00316  [pdf, other

    cs.SE

    Using Genetic Programming to Build Self-Adaptivity into Software-Defined Networks

    Authors: Jia Li, Shiva Nejati, Mehrdad Sabetzadeh

    Abstract: Self-adaptation solutions need to periodically monitor, reason about, and adapt a running system. The adaptation step involves generating an adaptation strategy and applying it to the running system whenever an anomaly arises. In this article, we argue that, rather than generating individual adaptation strategies, the goal should be to adapt the control logic of the running system in such a way th… ▽ More

    Submitted 15 August, 2023; v1 submitted 31 May, 2023; originally announced June 2023.

    Comments: Accepted for publication by ACM Transactions on Autonomous and Adaptive Systems (TAAS) (in Aug 2023). arXiv admin note: substantial text overlap with arXiv:2205.04352

  10. arXiv:2305.00083  [pdf, other

    cs.SE

    Reflections on Surrogate-Assisted Search-Based Testing: A Taxonomy and Two Replication Studies based on Industrial ADAS and Simulink Models

    Authors: Shiva Nejati, Lev Sorokin, Damir Safin, Federico Formica, Mohammad Mahdi Mahboob, Claudio Menghi

    Abstract: Surrogate-assisted search-based testing (SA-SBT) aims to reduce the computational time for testing compute-intensive systems. Surrogates enhance testing techniques by improving test case generation focusing the testing budget on the most critical portions of the input domain. In addition, they can serve as approximations of the system under test (SUT) to predict tests' results instead of executing… ▽ More

    Submitted 28 April, 2023; originally announced May 2023.

    Comments: Submitted to the Information and Software Technology Journal

  11. arXiv:2302.10288  [pdf, other

    cs.SE

    Probabilistic Safe WCET Estimation for Weakly Hard Real-Time Systems at Design Stages

    Authors: Jaekwon Lee, Seung Yeob Shin, Lionel Briand, Shiva Nejati

    Abstract: Weakly hard real-time systems can, to some degree, tolerate deadline misses, but their schedulability still needs to be analyzed to ensure their quality of service. Such analysis usually occurs at early design stages to provide implementation guidelines to engineers so that they can make better design decisions. Estimating worst-case execution times (WCET) is a key input to schedulability analysis… ▽ More

    Submitted 11 August, 2023; v1 submitted 20 February, 2023; originally announced February 2023.

    Comments: Accepted for publication by TOSEM (in Aug 2023)

  12. arXiv:2212.08726  [pdf, other

    cs.SE

    Learning Non-robustness using Simulation-based Testing: a Network Traffic-sha** Case Study

    Authors: Baharin Aliashrafi Jodat, Shiva Nejati, Mehrdad Sabetzadeh, Patricio Saavedra

    Abstract: An input to a system reveals a non-robust behaviour when, by making a small change in the input, the output of the system changes from acceptable (passing) to unacceptable (failing) or vice versa. Identifying inputs that lead to non-robust behaviours is important for many types of systems, e.g., cyber-physical and network systems, whose inputs are prone to perturbations. In this paper, we propose… ▽ More

    Submitted 22 January, 2023; v1 submitted 16 December, 2022; originally announced December 2022.

    Comments: This paper is accepted at the 16th IEEE International Conference on Software Testing, Verification and Validation (ICST 2023)

  13. arXiv:2208.06954  [pdf, other

    cs.SE

    A Domain-Specific Language for Simulation-Based Testing of IoT Edge-to-Cloud Solutions

    Authors: Jia Li, Shiva Nejati, Mehrdad Sabetzadeh, Michael McCallen

    Abstract: The Internet of things (IoT) is increasingly prevalent in domains such as emergency response, smart cities and autonomous vehicles. Simulation plays a key role in the testing of IoT systems, noting that field testing of a complete IoT product may be infeasible or prohibitively expensive. In this paper, we propose a domain-specific language (DSL) for generating edge-to-cloud simulators. An edge-to-… ▽ More

    Submitted 14 August, 2022; originally announced August 2022.

  14. arXiv:2206.12492  [pdf, other

    cs.SE

    Guidelines for Artifacts to Support Industry-Relevant Research on Self-Adaptation

    Authors: Danny Weyns, Ilias Gerostathopoulos, Barbora Buhnova, Nicolas Cardozo, Emilia Cioroaica, Ivana Dusparic, Lars Grunske, Pooyan Jamshidi, Christine Julien, Judith Michael, Gabriel Moreno, Shiva Nejati, Patrizio Pelliccione, Federico Quin, Genaina Rodrigues, Bradley Schmerl, Marco Vieira, Thomas Vogel, Rebekka Wohlrab

    Abstract: Artifacts support evaluating new research results and help comparing them with the state of the art in a field of interest. Over the past years, several artifacts have been introduced to support research in the field of self-adaptive systems. While these artifacts have shown their value, it is not clear to what extent these artifacts support research on problems in self-adaptation that are relevan… ▽ More

    Submitted 24 June, 2022; originally announced June 2022.

    Comments: 7 pages

  15. arXiv:2205.04352  [pdf, other

    cs.SE

    Learning Self-adaptations for IoT Networks: A Genetic Programming Approach

    Authors: Jia Li, Shiva Nejati, Mehrdad Sabetzadeh

    Abstract: Internet of Things (IoT) is a pivotal technology in application domains that require connectivity and interoperability between large numbers of devices. IoT systems predominantly use a software-defined network (SDN) architecture as their core communication backbone. This architecture offers several advantages, including the flexibility to make IoT networks self-adaptive through software programmab… ▽ More

    Submitted 9 May, 2022; originally announced May 2022.

  16. Optimal Priority Assignment for Real-Time Systems: A Coevolution-Based Approach

    Authors: Jaekwon Lee, Seung Yeob Shin, Shiva Nejati, Lionel C. Briand

    Abstract: In real-time systems, priorities assigned to real-time tasks determine the order of task executions, by relying on an underlying task scheduling policy. Assigning optimal priority values to tasks is critical to allow the tasks to complete their executions while maximizing safety margins from their specified deadlines. This enables real-time systems to tolerate unexpected overheads in task executio… ▽ More

    Submitted 21 March, 2022; v1 submitted 15 February, 2021; originally announced February 2021.

  17. Can Offline Testing of Deep Neural Networks Replace Their Online Testing?

    Authors: Fitash Ul Haq, Donghwan Shin, Shiva Nejati, Lionel Briand

    Abstract: We distinguish two general modes of testing for Deep Neural Networks (DNNs): Offline testing where DNNs are tested as individual units based on test datasets obtained without involving the DNNs under test, and online testing where DNNs are embedded into a specific application environment and tested in a closed-loop mode in interaction with the application environment. Typically, DNNs are subjected… ▽ More

    Submitted 30 April, 2021; v1 submitted 26 January, 2021; originally announced January 2021.

    Comments: Journal extension of arXiv:1912.00805; To appear in Empirical Software Engineering

    Journal ref: Empir Software Eng 26, 90 (2021)

  18. arXiv:2101.01933  [pdf, other

    cs.SE

    Combining Genetic Programming and Model Checking to Generate Environment Assumptions

    Authors: Khouloud Gaaloul, Claudio Menghi, Shiva Nejati, Lionel C. Briand, Yago Isasi Parache

    Abstract: Software verification may yield spurious failures when environment assumptions are not accounted for. Environment assumptions are the expectations that a system or a component makes about its operational environment and are often specified in terms of conditions over the inputs of that system or component. In this article, we propose an approach to automatically infer environment assumptions for C… ▽ More

    Submitted 6 January, 2021; originally announced January 2021.

  19. arXiv:2012.13188  [pdf, other

    cs.CV cs.HC

    Control of Computer Pointer Using Hand Gesture Recognition in Motion Pictures

    Authors: Yalda Foroutan, Ahmad Kalhor, Saeid Mohammadi Nejati, Samad Sheikhaei

    Abstract: This paper presents a user interface designed to enable computer cursor control through hand detection and gesture classification. A comprehensive hand dataset comprising 6720 image samples was collected, encompassing four distinct classes: fist, palm, pointing to the left, and pointing to the right. The images were captured from 15 individuals in various settings, including simple backgrounds wit… ▽ More

    Submitted 9 June, 2023; v1 submitted 24 December, 2020; originally announced December 2020.

    Comments: 9 pages, 6 figures, 2 tables

  20. arXiv:2012.06822  [pdf, other

    cs.SE cs.AI

    Digital Twins Are Not Monozygotic -- Cross-Replicating ADAS Testing in Two Industry-Grade Automotive Simulators

    Authors: Markus Borg, Raja Ben Abdessalem, Shiva Nejati, Francois-Xavier Jegeden, Donghwan Shin

    Abstract: The increasing levels of software- and data-intensive driving automation call for an evolution of automotive software testing. As a recommended practice of the Verification and Validation (V&V) process of ISO/PAS 21448, a candidate standard for safety of the intended functionality for road vehicles, simulation-based testing has the potential to reduce both risks and costs. There is a growing body… ▽ More

    Submitted 28 January, 2021; v1 submitted 12 December, 2020; originally announced December 2020.

    Comments: To appear in the Proc. of the IEEE International Conference on Software Testing, Verification and Validation (ICST) 2021

  21. Estimating Probabilistic Safe WCET Ranges of Real-Time Systems at Design Stages

    Authors: Jaekwon Lee, Seung Yeob Shin, Shiva Nejati, Lionel C. Briand, Yago Isasi Parache

    Abstract: Estimating worst-case execution times (WCET) is an important activity at early design stages of real-time systems. Based on WCET estimates, engineers make design and implementation decisions to ensure that task executions always complete before their specified deadlines. However, in practice, engineers often cannot provide precise point WCET estimates and prefer to provide plausible WCET ranges. G… ▽ More

    Submitted 7 June, 2022; v1 submitted 20 July, 2020; originally announced July 2020.

  22. arXiv:2005.13415  [pdf, other

    cs.LO cs.CR

    CDCL(Crypto) SAT Solvers for Cryptanalysis

    Authors: Saeed Nejati, Vijay Ganesh

    Abstract: Over the last two decades, we have seen a dramatic improvement in the efficiency of conflict-driven clause-learning Boolean satisfiability (CDCL SAT) solvers on industrial problems from a variety of domains. The availability of such powerful general-purpose search tools as SAT solvers has led many researchers to propose SAT-based methods for cryptanalysis, including techniques for finding collisio… ▽ More

    Submitted 27 May, 2020; originally announced May 2020.

    Comments: Proceedings of the 29th Annual International Conference on Computer Science and Software Engineering 2019 (CASCON 2019)

  23. Comparing Offline and Online Testing of Deep Neural Networks: An Autonomous Car Case Study

    Authors: Fitash Ul Haq, Donghwan Shin, Shiva Nejati, Lionel Briand

    Abstract: There is a growing body of research on develo** testing techniques for Deep Neural Networks (DNN). We distinguish two general modes of testing for DNNs: Offline testing where DNNs are tested as individual units based on test datasets obtained independently from the DNNs under test, and online testing where DNNs are embedded into a specific application and tested in a close-loop mode in interacti… ▽ More

    Submitted 28 November, 2019; originally announced December 2019.

  24. arXiv:1910.02837  [pdf, other

    cs.SE

    Approximation-Refinement Testing of Compute-Intensive Cyber-Physical Models: An Approach Based on System Identification

    Authors: Claudio Menghi, Shiva Nejati, Lionel C. Briand, Yago Isasi Parache

    Abstract: Black-box testing has been extensively applied to test models of Cyber-Physical systems (CPS) since these models are not often amenable to static and symbolic testing and verification. Black-box testing, however, requires to execute the model under test for a large number of candidate test inputs. This poses a challenge for a large and practically-important category of CPS models, known as compute… ▽ More

    Submitted 7 October, 2019; originally announced October 2019.

  25. Dynamic Adaptation of Software-defined Networks for IoT Systems: A Search-based Approach

    Authors: Seung Yeob Shin, Shiva Nejati, Mehrdad Sabetzadeh, Lionel C. Briand, Chetan Arora, Frank Zimmer

    Abstract: The concept of Internet of Things (IoT) has led to the development of many complex and critical systems such as smart emergency management systems. IoT-enabled applications typically depend on a communication network for transmitting large volumes of data in unpredictable and changing environments. These networks are prone to congestion when there is a burst in demand, e.g., as an emergency situat… ▽ More

    Submitted 15 May, 2020; v1 submitted 29 May, 2019; originally announced May 2019.

    Comments: This paper has been accepted at IEEE/ACM 15th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS 2020)

  26. arXiv:1905.03490  [pdf, other

    cs.SE

    Evaluating Model Testing and Model Checking for Finding Requirements Violations in Simulink Models

    Authors: Shiva Nejati, Khouloud Gaaloul, Claudio Menghi, Lionel C. Briand, Stephen Foster, David Wolfe

    Abstract: Matlab/Simulink is a development and simulation language that is widely used by the Cyber-Physical System (CPS) industry to model dynamical systems. There are two mainstream approaches to verify CPS Simulink models: model testing that attempts to identify failures in models by executing them for a number of sampled test inputs, and model checking that attempts to exhaustively check the correctness… ▽ More

    Submitted 9 May, 2019; originally announced May 2019.

    Comments: 10 pages + 2 page references

  27. arXiv:1903.03399  [pdf, other

    cs.SE

    Generating Automated and Online Test Oracles for Simulink Models with Continuous and Uncertain Behaviors

    Authors: Claudio Menghi, Shiva Nejati, Khouloud Gaaloul, Lionel Briand

    Abstract: Test automation requires automated oracles to assess test outputs. For cyber physical systems (CPS), oracles, in addition to be automated, should ensure some key objectives: (i) they should check test outputs in an online manner to stop expensive test executions as soon as a failure is detected; (ii) they should handle time- and magnitude-continuous CPS behaviors; (iii) they should provide a quant… ▽ More

    Submitted 8 March, 2019; originally announced March 2019.

  28. arXiv:1608.04720  [pdf, other

    cs.CR

    Adaptive Restart and CEGAR-based Solver for Inverting Cryptographic Hash Functions

    Authors: Saeed Nejati, Jia Hui Liang, Vijay Ganesh, Catherine Gebotys, Krzysztof Czarnecki

    Abstract: SAT solvers are increasingly being used for cryptanalysis of hash functions and symmetric encryption schemes. Inspired by this trend, we present MapleCrypt which is a SAT solver-based cryptanalysis tool for inverting hash functions. We reduce the hash function inversion problem for fixed targets into the satisfiability problem for Boolean logic, and use MapleCrypt to construct preimages for these… ▽ More

    Submitted 16 August, 2016; originally announced August 2016.