Skip to main content

Showing 1–6 of 6 results for author: Pashchenko, I

Searching in archive cs. Search in all archives.
.
  1. arXiv:2103.03331  [pdf, other

    cs.SE

    Secure Software Development in the Era of Fluid Multi-party Open Software and Services

    Authors: Ivan Pashchenko, Riccardo Scandariato, Antonino Sabetta, Fabio Massacci

    Abstract: Pushed by market forces, software development has become fast-paced. As a consequence, modern development projects are assembled from 3rd-party components. Security & privacy assurance techniques once designed for large, controlled updates over months or years, must now cope with small, continuous changes taking place within a week, and happening in sub-components that are controlled by third-part… ▽ More

    Submitted 4 March, 2021; originally announced March 2021.

    Comments: 7 pages, 1 figure, to be published in Proceedings of International Conference on Software Engineering - New Ideas and Emerging Results

    ACM Class: D.2.0; D.2.13

  2. arXiv:2103.03317  [pdf, other

    cs.SE

    Technical Leverage in a Software Ecosystem: Development Opportunities and Security Risks

    Authors: Fabio Massacci, Ivan Pashchenko

    Abstract: In finance, leverage is the ratio between assets borrowed from others and one's own assets. A matching situation is present in software: by using free open-source software (FOSS) libraries a developer leverages on other people's code to multiply the offered functionalities with a much smaller own codebase. In finance as in software, leverage magnifies profits when returns from borrowing exceed cos… ▽ More

    Submitted 4 March, 2021; originally announced March 2021.

    Comments: 14 pages, 5 figures, to be published in Proceedings of International Conference on Software Engineering (ICSE 2021)

    ACM Class: D.2.8; D.2.13

  3. arXiv:2011.06244  [pdf, other

    cs.SE

    A Fine-grained Data Set and Analysis of Tangling in Bug Fixing Commits

    Authors: Steffen Herbold, Alexander Trautsch, Benjamin Ledel, Alireza Aghamohammadi, Taher Ahmed Ghaleb, Kuljit Kaur Chahal, Tim Bossenmaier, Bhaveet Nagaria, Philip Makedonski, Matin Nili Ahmadabadi, Kristof Szabados, Helge Spieker, Matej Madeja, Nathaniel Hoy, Valentina Lenarduzzi, Shangwen Wang, Gema Rodríguez-Pérez, Ricardo Colomo-Palacios, Roberto Verdecchia, Paramvir Singh, Yihao Qin, Debasish Chakroborti, Willard Davis, Vijay Walunj, Hongjun Wu , et al. (23 additional authors not shown)

    Abstract: Context: Tangled commits are changes to software that address multiple concerns at once. For researchers interested in bugs, tangled commits mean that they actually study not only bugs, but also other concerns irrelevant for the study of bugs. Objective: We want to improve our understanding of the prevalence of tangling and the types of changes that are tangled within bug fixing commits. Metho… ▽ More

    Submitted 13 October, 2021; v1 submitted 12 November, 2020; originally announced November 2020.

    Comments: Status: Accepted at Empirical Software Engineering

  4. arXiv:1808.09753  [pdf, other

    cs.SE cs.CR

    Vulnerable Open Source Dependencies: Counting Those That Matter

    Authors: Ivan Pashchenko, Henrik Plate, Serena Elisa Ponta, Antonino Sabetta, Fabio Massacci

    Abstract: BACKGROUND: Vulnerable dependencies are a known problem in today's open-source software ecosystems because OSS libraries are highly interconnected and developers do not always update their dependencies. AIMS: In this paper we aim to present a precise methodology, that combines the code-based analysis of patches with information on build, test, update dates, and group extracted from the very code r… ▽ More

    Submitted 29 August, 2018; originally announced August 2018.

    Comments: This is a pre-print of the paper that appears, with the same title, in the proceedings of the 12th International Symposium on Empirical Software Engineering and Measurement, 2018

  5. arXiv:1712.02875  [pdf, ps, other

    cs.CR

    One More Way to Encrypt a Message

    Authors: Irina Pashchenko

    Abstract: This work describes an example of an application of a novel method for symmetric cryptography. Its purpose is to show how a regular message can be encrypted and then decrypted in an easy, yet secure way. The encrypting method introduced in this work is different from others because it involves decimals as well as integers, encrypting the same initial message differently every time, and inserting m… ▽ More

    Submitted 6 August, 2023; v1 submitted 7 December, 2017; originally announced December 2017.

    Comments: 33 pages, 5 formulas, 3 C++ programs

  6. arXiv:cs/9906022  [pdf, ps, other

    cs.CG cs.DM

    Zero-Parity Stabbing Information

    Authors: Joseph O'Rourke, Irena Pashchenko

    Abstract: Everett et al. introduced several varieties of stabbing information for the lines determined by pairs of vertices of a simple polygon P, and established their relationships to vertex visibility and other combinatorial data. In the same spirit, we define the ``zero-parity (ZP) stabbing information'' to be a natural weakening of their ``weak stabbing information,'' retaining only the distinction a… ▽ More

    Submitted 22 June, 1999; originally announced June 1999.

    ACM Class: F.2.2

    Journal ref: Proc. Japan Conf. Discrete Comput. Geom. '98, Dec. 1998, 93--97