Skip to main content

Showing 1–8 of 8 results for author: Zahan, N

Searching in archive cs. Search in all archives.
.
  1. arXiv:2403.17382  [pdf, other

    cs.SE cs.CR

    Characterizing Dependency Update Practice of NPM, PyPI and Cargo Packages

    Authors: Imranur Rahman, Nusrat Zahan, Stephen Magill, William Enck, Laurie Williams

    Abstract: Kee** dependencies up-to-date prevents software supply chain attacks through outdated and vulnerable dependencies. Developers may use packages' dependency update practice as one of the selection criteria for choosing a package as a dependency. However, the lack of metrics characterizing packages' dependency update practice makes this assessment difficult. To measure the up-to-date characteristic… ▽ More

    Submitted 26 March, 2024; originally announced March 2024.

    Comments: currently under review

    ACM Class: D.2.8; D.2.7

  2. arXiv:2403.12196  [pdf, other

    cs.CR cs.AI

    Shifting the Lens: Detecting Malware in npm Ecosystem with Large Language Models

    Authors: Nusrat Zahan, Philipp Burckhardt, Mikola Lysenko, Feross Aboukhadijeh, Laurie Williams

    Abstract: The Gartner 2022 report predicts that 45% of organizations worldwide will encounter software supply chain attacks by 2025, highlighting the urgency to improve software supply chain security for community and national interests. Current malware detection techniques aid in the manual review process by filtering benign and malware packages, yet such techniques have high false-positive rates and limit… ▽ More

    Submitted 18 March, 2024; originally announced March 2024.

    Comments: 13 pages, 1 Figure, 7 tables

  3. arXiv:2312.17726  [pdf, ps, other

    cs.CR cs.SE

    Comparing Effectiveness and Efficiency of Interactive Application Security Testing (IAST) and Runtime Application Self-Protection (RASP) Tools in a Large Java-based System

    Authors: Aishwarya Seth, Saikath Bhattacharya, Sarah Elder, Nusrat Zahan, Laurie Williams

    Abstract: Security resources are scarce, and practitioners need guidance in the effective and efficient usage of techniques and tools available in the cybersecurity industry. Two emerging tool types, Interactive Application Security Testing (IAST) and Runtime Application Self-Protection (RASP), have not been thoroughly evaluated against well-established counterparts such as Dynamic Application Security Test… ▽ More

    Submitted 29 December, 2023; originally announced December 2023.

  4. arXiv:2210.14884  [pdf, other

    cs.CR cs.SE

    Do Software Security Practices Yield Fewer Vulnerabilities?

    Authors: Nusrat Zahan, Shohanuzzaman Shohan, Dan Harris, Laurie Williams

    Abstract: Due to the ever-increasing security breaches, practitioners are motivated to produce more secure software. In the United States, the White House Office released a memorandum on Executive Order (EO) 14028 that mandates organizations provide self-attestation of the use of secure software development practices. The OpenSSF Scorecard project allows practitioners to measure the use of software security… ▽ More

    Submitted 15 June, 2023; v1 submitted 20 October, 2022; originally announced October 2022.

    Comments: 12 pages, 2 Figures

  5. OpenSSF Scorecard: On the Path Toward Ecosystem-wide Automated Security Metrics

    Authors: Nusrat Zahan, Parth Kanakiya, Brian Hambleton, Shohanuzzaman Shohan, Laurie Williams

    Abstract: The OpenSSF Scorecard project is an automated tool to monitor the security health of open-source software. This study evaluates the applicability of the Scorecard tool and compares the security practices and gaps in the npm and PyPI ecosystems.

    Submitted 15 June, 2023; v1 submitted 5 August, 2022; originally announced August 2022.

    Comments: 10 pages, 2 figures and 2 tables

  6. arXiv:2208.01595  [pdf, other

    cs.SE cs.CR

    Do I really need all this work to find vulnerabilities? An empirical case study comparing vulnerability detection techniques on a Java application

    Authors: Sarah Elder, Nusrat Zahan, Rui Shu, Monica Metro, Valeri Kozarev, Tim Menzies, Laurie Williams

    Abstract: CONTEXT: Applying vulnerability detection techniques is one of many tasks using the limited resources of a software project. OBJECTIVE: The goal of this research is to assist managers and other decision-makers in making informed choices about the use of software vulnerability detection techniques through an empirical study of the efficiency and effectiveness of four techniques on a Java-based we… ▽ More

    Submitted 2 August, 2022; originally announced August 2022.

    ACM Class: D.2.5

  7. arXiv:2112.10165  [pdf, other

    cs.CR cs.CY cs.SE

    What are Weak Links in the npm Supply Chain?

    Authors: Nusrat Zahan, Thomas Zimmermann, Patrice Godefroid, Brendan Murphy, Chandra Maddila, Laurie Williams

    Abstract: Modern software development frequently uses third-party packages, raising the concern of supply chain security attacks. Many attackers target popular package managers, like npm, and their users with supply chain attacks. In 2021 there was a 650% year-on-year growth in security attacks by exploiting Open Source Software's supply chain. Proactive approaches are needed to predict package vulnerabilit… ▽ More

    Submitted 14 February, 2022; v1 submitted 19 December, 2021; originally announced December 2021.

    Comments: (e.g.: 10 pages, 1 figure)

  8. arXiv:2103.05088  [pdf, other

    cs.SE cs.CR

    Structuring a Comprehensive Software Security Course Around the OWASP Application Security Verification Standard

    Authors: Sarah Elder, Nusrat Zahan, Val Kozarev, Rui Shu, Tim Menzies, Laurie Williams

    Abstract: Lack of security expertise among software practitioners is a problem with many implications. First, there is a deficit of security professionals to meet current needs. Additionally, even practitioners who do not plan to work in security may benefit from increased understanding of security. The goal of this paper is to aid software engineering educators in designing a comprehensive software securit… ▽ More

    Submitted 8 March, 2021; originally announced March 2021.

    Comments: 10 pages, 5 figures, 1 table, submitted to International Conference on Software Engineering: Joint Track on Software Engineering Education and Training (ICSE-JSEET)

    ACM Class: K.3.0; D.2.0; K.6.5