Zobrazeno 1 - 10
of 99
pro vyhledávání: '"Mirakhorli, Mehdi"'
We investigate the use of Natural Language Inference (NLI) in automating requirements engineering tasks. In particular, we focus on three tasks: requirements classification, identification of requirements specification defects, and detection of confl
Externí odkaz:
http://arxiv.org/abs/2405.05135
To implement important quality attributes of software such as architectural security tactics, developers incorporate API of software frameworks, as building blocks, to avoid re-inventing the wheel and improve their productivity. However, this is a ch
Externí odkaz:
http://arxiv.org/abs/2403.10836
Autor:
Mirakhorli, Mehdi, Garcia, Derek, Dillon, Schuyler, Laporte, Kevin, Morrison, Matthew, Lu, Henry, Koscinski, Viktoria, Enoch, Christopher
Modern software applications heavily rely on diverse third-party components, libraries, and frameworks sourced from various vendors and open source repositories, presenting a complex challenge for securing the software supply chain. To address this c
Externí odkaz:
http://arxiv.org/abs/2402.11151
Object serialization and deserialization are widely used for storing and preserving objects in files, memory, or database as well as for transporting them across machines, enabling remote interaction among processes and many more. This mechanism reli
Externí odkaz:
http://arxiv.org/abs/2311.00943
Secure by Design has become the mainstream development approach ensuring that software systems are not vulnerable to cyberattacks. Architectural security controls need to be carefully monitored over the software development life cycle to avoid critic
Externí odkaz:
http://arxiv.org/abs/2307.05605
This paper focuses on supporting AI/ML Security Workers -- professionals involved in the development and deployment of secure AI-enabled software systems. It presents AI/ML Adversarial Techniques, Tools, and Common Knowledge (AI/ML ATT&CK) framework
Externí odkaz:
http://arxiv.org/abs/2211.05075
Software systems are increasingly relying on Artificial Intelligence (AI) and Machine Learning (ML) components. The emerging popularity of AI techniques in various application domains attracts malicious actors and adversaries. Therefore, the develope
Externí odkaz:
http://arxiv.org/abs/2202.09465
The notion of Attack Surface refers to the critical points on the boundary of a software system which are accessible from outside or contain valuable content for attackers. The ability to identify attack surface components of software system has a si
Externí odkaz:
http://arxiv.org/abs/2112.01635
Autor:
Shokri, Ali, Mirakhorli, Mehdi
Reusing code snippets shared by other programmers on Q&A forums (e.g., StackOverflow) is a common practice followed by software developers. However, lack of sufficient information about the fully qualified name (FQN) of identifiers in borrowed code s
Externí odkaz:
http://arxiv.org/abs/2108.01165
Autor:
Shokri, Ali, Mirakhorli, Mehdi
Integrated development environments (IDE) play an important role in supporting developers during program comprehension and completion. Many of these supportive features focus on low-level programming and debugging activities. Unfortunately, there is
Externí odkaz:
http://arxiv.org/abs/2103.06735