Skip to main content

Showing 1–41 of 41 results for author: Ghafari, M

  1. arXiv:2406.06164  [pdf, other

    cs.CR

    Time to Separate from StackOverflow and Match with ChatGPT for Encryption

    Authors: Ehsan Firouzi, Mohammad Ghafari

    Abstract: Cryptography is known as a challenging topic for developers. We studied StackOverflow posts to identify the problems that developers encounter when using Java Cryptography Architecture (JCA) for symmetric encryption. We investigated security risks that are disseminated in these posts, and we examined whether ChatGPT helps avoid cryptography issues. We found that developers frequently struggle with… ▽ More

    Submitted 10 June, 2024; originally announced June 2024.

    Comments: Accepted in "Journal of Systems and Software", June 10, 2024

  2. arXiv:2406.06153  [pdf, other

    cs.SE cs.CR

    Gameful Introduction to Cryptography for Dyslexic Students

    Authors: Argianto Rahartomo, Harpreet Kaur, Mohammad Ghafari

    Abstract: Cryptography has a pivotal role in securing our digital world. Nonetheless, it is a challenging topic to learn. In this paper, we show that despite its complex nature, dyslexia$-$a learning disorder that influences reading and writing skills$-$does not hinder one's ability to comprehend cryptography. In particular, we conducted a gameful workshop with 14 high-school dyslexic students and taught th… ▽ More

    Submitted 10 June, 2024; originally announced June 2024.

    Comments: 36th IEEE Conference on Software Engineering Education and Training (CSEE&T 2024)

  3. Mining REST APIs for Potential Mass Assignment Vulnerabilities

    Authors: Arash Mazidi, Davide Corradini, Mohammad Ghafari

    Abstract: REST APIs have a pivotal role in accessing protected resources. Despite the availability of security testing tools, mass assignment vulnerabilities are common in REST APIs, leading to unauthorized manipulation of sensitive data. We propose a lightweight approach to mine the REST API specifications and identify operations and attributes that are prone to mass assignment. We conducted a preliminary… ▽ More

    Submitted 4 May, 2024; v1 submitted 2 May, 2024; originally announced May 2024.

    Comments: EASE 2024

  4. LLM Security Guard for Code

    Authors: Arya Kavian, Mohammad Mehdi Pourhashem Kallehbasti, Sajjad Kazemi, Ehsan Firouzi, Mohammad Ghafari

    Abstract: Many developers rely on Large Language Models (LLMs) to facilitate software development. Nevertheless, these models have exhibited limited capabilities in the security domain. We introduce LLMSecGuard, a framework to offer enhanced code security through the synergy between static code analyzers and LLMs. LLMSecGuard is open source and aims to equip developers with code solutions that are more secu… ▽ More

    Submitted 3 May, 2024; v1 submitted 2 May, 2024; originally announced May 2024.

    Comments: SECUTE, EASE 2024

  5. Insecure by Design in the Backbone of Critical Infrastructure

    Authors: Jos Wetzels, Daniel dos Santos, Mohammad Ghafari

    Abstract: We inspected 45 actively deployed Operational Technology (OT) product families from ten major vendors and found that every system suffers from at least one trivial vulnerability. We reported a total of 53 weaknesses, stemming from insecure by design practices or basic security design failures. They enable attackers to take a device offline, manipulate its operational parameters, and execute arbitr… ▽ More

    Submitted 22 March, 2023; originally announced March 2023.

    Comments: IEEE/ACM Workshop on the Internet of Safe Things 2023

  6. Wasmizer: Curating WebAssembly-driven Projects on GitHub

    Authors: Alexander Nicholson, Quentin Stiévenart, Arash Mazidi, Mohammad Ghafari

    Abstract: WebAssembly has attracted great attention as a portable compilation target for programming languages. To facilitate in-depth studies about this technology, we have deployed Wasmizer, a tool that regularly mines GitHub projects and makes an up-to-date dataset of WebAssembly sources and their binaries publicly available. Presently, we have collected 2 540 C and C++ projects that are highly-related t… ▽ More

    Submitted 16 March, 2023; originally announced March 2023.

    Comments: 11 pages + 1 page of references Preprint of MSR'23 publication

  7. arXiv:2301.04862  [pdf, ps, other

    cs.PL cs.CR cs.SE

    Naturalistic Static Program Analysis

    Authors: Mohammad Mehdi Pourhashem Kallehbasti, Mohammad Ghafari

    Abstract: Static program analysis development is a non-trivial and time-consuming task. We present a framework through which developers can define static program analyses in natural language. We show the application of this framework to identify cryptography misuses in Java programs, and we discuss how it facilitates static program analysis development for developers.

    Submitted 12 January, 2023; originally announced January 2023.

    Comments: The 30th IEEE International Conference on Software Analysis, Evolution and Reengineering, March 21st-24th, 2023

  8. arXiv:2208.00264  [pdf

    cs.SE

    Mining unit test cases to synthesize API usage examples

    Authors: Mohammad Ghafari, Konstantin Rubinov, Mohammad Mehdi Pourhashem K

    Abstract: Software developers study and reuse existing source code to understand how to properly use application programming interfaces (APIs). However, manually finding sufficient and adequate code examples for a given API is a difficult and a time-consuming activity. Existing approaches to find or generate examples assume availability of a reasonable set of client code that uses the API. This assumption d… ▽ More

    Submitted 30 July, 2022; originally announced August 2022.

    Comments: Journal of Software: Evolution and Process

  9. arXiv:2208.00258  [pdf

    cs.CR cs.SE

    Developers Struggle with Authentication in Blazor WebAssembly

    Authors: Pascal Marc André, Quentin Stiévenart, Mohammad Ghafari

    Abstract: WebAssembly is a growing technology to build cross-platform applications. We aim to understand the security issues that developers encounter when adopting WebAssembly. We mined WebAssembly questions on Stack Overflow and identified 359 security-related posts. We classified these posts into 8 themes, reflecting developer intentions, and 19 topics, representing developer issues in this domain. We fo… ▽ More

    Submitted 30 July, 2022; originally announced August 2022.

    Comments: ICSME 2022: 38th IEEE International Conference on Software Maintenance and Evolution

  10. arXiv:2204.01077  [pdf, other

    math.CO cs.CG math.MG

    Brillouin Zones of Integer Lattices and Their Perturbations

    Authors: Herbert Edelsbrunner, Alexey Garber, Mohadese Ghafari, Teresa Heiss, Morteza Saghafian, Mathijs Wintraecken

    Abstract: For a locally finite set, $A \subseteq \mathbb{R}^d$, the $k$-th Brillouin zone of $a \in A$ is the region of points $x \in \mathbb{R}^d$ for which $\|x-a\|$ is the $k$-th smallest among the Euclidean distances between $x$ and the points in $A$. If $A$ is a lattice, the $k$-th Brillouin zones of the points in $A$ are translates of each other, which tile space. Depending on the value of $k$, they e… ▽ More

    Submitted 21 March, 2024; v1 submitted 3 April, 2022; originally announced April 2022.

    MSC Class: 52C22; 52C35; 05B45

  11. arXiv:2204.01076  [pdf, other

    math.CO cs.CG math.MG math.PR

    On Angles in Higher Order Brillouin Tessellations and Related Tilings in the Plane

    Authors: Herbert Edelsbrunner, Alexey Garber, Mohadese Ghafari, Teresa Heiss, Morteza Saghafian

    Abstract: For a locally finite set in $\mathbb{R}^2$, the order-$k$ Brillouin tessellations form an infinite sequence of convex face-to-face tilings of the plane. If the set is coarsely dense and generic, then the corresponding infinite sequences of minimum and maximum angles are both monotonic in $k$. As an example, a stationary Poisson point process in $\mathbb{R}^2$ is locally finite, coarsely dense, and… ▽ More

    Submitted 3 April, 2022; originally announced April 2022.

  12. arXiv:2201.05203  [pdf

    cs.SI

    An Intelligent System for Multi-topic Social Spam Detection in Microblogging

    Authors: Bilal Abu-Salih, Dana Al Qudah, Malak Al-Hassan, Seyed Mohssen Ghafari, Tomayess Issa, Ibrahim Aljarah, Amin Beheshti, Sulaiman Alqahtan

    Abstract: The communication revolution has perpetually reshaped the means through which people send and receive information. Social media is an important pillar of this revolution and has brought profound changes to various aspects of our lives. However, the open environment and popularity of these platforms inaugurate windows of opportunities for various cyber threats, thus social networks have become a fe… ▽ More

    Submitted 13 January, 2022; originally announced January 2022.

  13. arXiv:2201.04853  [pdf

    cs.CR

    FuzzingDriver: the Missing Dictionary to Increase Code Coverage in Fuzzers

    Authors: Arash Ale Ebrahim, Mohammadreza Hazhirpasand, Oscar Nierstrasz, Mohammad Ghafari

    Abstract: We propose a tool, called FuzzingDriver, to generate dictionary tokens for coverage-based greybox fuzzers (CGF) from the codebase of any target program. FuzzingDriver does not add any overhead to the fuzzing job as it is run beforehand. We compared FuzzingDriver to Google dictionaries by fuzzing six open-source targets, and we found that FuzzingDriver consistently achieves higher code coverage in… ▽ More

    Submitted 13 January, 2022; originally announced January 2022.

    Comments: 29th edition of the IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER), 2022

  14. Security Risks of Porting C Programs to WebAssembly

    Authors: Quentin Stiévenart, Coen De Roover, Mohammad Ghafari

    Abstract: WebAssembly is a compilation target for cross-platform applications that is increasingly being used. In this paper, we investigate whether one can transparently cross-compile C programs to WebAssembly, and if not, what impact porting can have on their security. We compile 17,802 programs that exhibit common vulnerabilities to 64-bit x86 and to WebAssembly binaries, and we observe that the executio… ▽ More

    Submitted 22 December, 2021; originally announced December 2021.

    Comments: The 37th ACM/SIGAPP Symposium on Applied Computing (SAC'22), 2022. arXiv admin note: text overlap with arXiv:2111.01421

  15. How Do Developers Deal with Security Issue Reports on GitHub?

    Authors: Noah Bühlmann, Mohammad Ghafari

    Abstract: Security issue reports are the primary means of informing development teams of security risks in projects, but little is known about current practices. We aim to understand the characteristics of these reports in open-source projects and uncover opportunities to improve developer practices. We analysed 3,493 security issue reports in 182 different projects on GitHub and manually studied 333 report… ▽ More

    Submitted 20 December, 2021; originally announced December 2021.

    Comments: The 37th ACM/SIGAPP Symposium on Applied Computing, April 25--29, 2022

  16. arXiv:2111.03859  [pdf

    cs.CR

    Cryptography Vulnerabilities on HackerOne

    Authors: Mohammadreza Hazhirpasand, Mohammad Ghafari

    Abstract: Previous studies have shown that cryptography is hard for developers to use and misusing cryptography leads to severe security vulnerabilities. We studied relevant vulnerability reports on the HackerOne bug bounty platform to understand what types of cryptography vulnerabilities exist in the wild. We extracted eight themes of vulnerabilities from the vulnerability reports and discussed their real-… ▽ More

    Submitted 6 November, 2021; originally announced November 2021.

    Comments: The 21st IEEE International Conference on Software Quality, Reliability and Security (QRS 2021)

  17. arXiv:2111.03601  [pdf

    cs.CR cs.SE

    Security Header Fields in HTTP Clients

    Authors: Pascal Gadient, Oscar Nierstrasz, Mohammad Ghafari

    Abstract: HTTP headers are commonly used to establish web communications, and some of them are relevant for security. However, we have only little information about the usage and support of security-relevant headers in mobile applications. We explored the adoption of such headers in mobile app communication by querying 9,714 distinct URLs that were used in 3,376 apps and collected each server's response inf… ▽ More

    Submitted 5 November, 2021; originally announced November 2021.

    Comments: The 21st IEEE International Conference on Software Quality, Reliability and Security (QRS 2021)

  18. arXiv:2111.03596  [pdf, other

    cs.CR cs.HC

    Phish What You Wish

    Authors: Pascal Gadient, Pascal Gerig, Oscar Nierstrasz, Mohammad Ghafari

    Abstract: IT professionals have no simple tool to create phishing websites and raise the awareness of users. We developed a prototype that can dynamically mimic websites by using enriched screenshots, which requires no additional programming experience and is simple to set up. The generated websites are functional and remain up-to-date. We found that 98% of the hyperlinks in mimicked websites are functional… ▽ More

    Submitted 5 November, 2021; originally announced November 2021.

    Comments: The 21st IEEE International Conference on Software Quality, Reliability and Security (QRS 2021)

  19. arXiv:2111.01421  [pdf

    cs.CR cs.PL

    The Security Risk of Lacking Compiler Protection in WebAssembly

    Authors: Quentin Stiévenart, Coen De Roover, Mohammad Ghafari

    Abstract: WebAssembly is increasingly used as the compilation target for cross-platform applications. In this paper, we investigate whether one can rely on the security measures enforced by existing C compilers when compiling C programs to WebAssembly. We compiled 4,469 C programs with known buffer overflow vulnerabilities to x86 code and to WebAssembly, and observed the outcome of the execution of the gene… ▽ More

    Submitted 2 November, 2021; originally announced November 2021.

    Comments: The 21st IEEE International Conference on Software Quality, Reliability and Security (QRS 2021)

  20. arXiv:2111.01406  [pdf, ps, other

    cs.CR cs.SE

    Dazed and Confused: What's Wrong with Crypto Libraries?

    Authors: Mohammadreza Hazhirpasand, Oscar Nierstrasz, Mohammad Ghafari

    Abstract: Recent studies have shown that developers have difficulties in using cryptographic APIs, which often led to security flaws. We are interested to tackle this matter by looking into what types of problems exist in various crypto libraries. We manually studied 500 posts on Stack Overflow associated with 20 popular crypto libraries. We realized there are 10 themes in the discussions. Interestingly, th… ▽ More

    Submitted 2 November, 2021; originally announced November 2021.

    Comments: 18th Annual International Conference on Privacy, Security and Trust (PST2021)

  21. arXiv:2109.15093  [pdf, other

    cs.CR

    Crypto Experts Advise What They Adopt

    Authors: Mohammadreza Hazhirpasand, Oscar Nierstrasz, Mohammad Ghafari

    Abstract: Previous studies have shown that developers regularly seek advice on online forums to resolve their cryptography issues. We investigated whether users who are active in cryptography discussions also use cryptography in practice. We collected the top 1% of responders who have participated in crypto discussions on Stack Overflow, and we manually analyzed their crypto contributions to open source pro… ▽ More

    Submitted 30 September, 2021; originally announced September 2021.

    Comments: 2021 36th IEEE/ACM International Conference on Automated Software Engineering Workshops (ASEW)

  22. arXiv:2109.14363  [pdf, other

    cs.CR

    Worrisome Patterns in Developers: A Survey in Cryptography

    Authors: Mohammadreza Hazhirpasand, Oscar Nierstrasz, Mohammad Ghafari

    Abstract: We surveyed 97 developers who had used cryptography in open-source projects, in the hope of identifying developer security and cryptography practices. We asked them about individual and company-level practices, and divided respondents into three groups (i.e., high, medium, and low) based on their level of knowledge. We found differences between the high-profile developers and the other two groups.… ▽ More

    Submitted 30 September, 2021; v1 submitted 29 September, 2021; originally announced September 2021.

    Comments: 2021 36th IEEE/ACM International Conference on Automated Software Engineering Workshops (ASEW)

  23. What Do Developers Discuss about Code Comments?

    Authors: Pooja Rani, Mathias Birrer, Sebastiano Panichella, Mohammad Ghafari, Oscar Nierstrasz

    Abstract: Code comments are important for program comprehension, development, and maintenance tasks. Given the varying standards for code comments, and their unstructured or semi-structured nature, developers get easily confused (especially novice developers) about which convention(s) to follow, or what tools to use while writing code documentation. Thus, they post related questions on external online sourc… ▽ More

    Submitted 17 August, 2021; originally announced August 2021.

    Comments: 21st IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM'21)

  24. arXiv:2108.07211  [pdf, other

    cs.CR cs.SE

    FluentCrypto: Cryptography in Easy Mode

    Authors: Simon Kafader, Mohammad Ghafari

    Abstract: Research has shown that cryptography concepts are hard to understand for developers, and secure use of cryptography APIs is challenging for mainstream developers. We have developed a fluent API named FluentCrypto to ease the secure and correct adoption of cryptography in the Node.js JavaScript runtime environment. It provides a task-based solution i.e., it hides the low-level complexities that inv… ▽ More

    Submitted 16 August, 2021; originally announced August 2021.

    Comments: 37th International Conference on Software Maintenance and Evolution (ICSME'21)

  25. Security Smells Pervade Mobile App Servers

    Authors: Pascal Gadient, Marc-Andrea Tarnutzer, Oscar Nierstrasz, Mohammad Ghafari

    Abstract: [Background] Web communication is universal in cyberspace, and security risks in this domain are devastating. [Aims] We analyzed the prevalence of six security smells in mobile app servers, and we investigated the consequence of these smells from a security perspective. [Method] We used an existing dataset that includes 9714 distinct URLs used in 3376 Android mobile apps. We exercised these URLs t… ▽ More

    Submitted 16 August, 2021; originally announced August 2021.

    Comments: ACM / IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM 2021)

  26. arXiv:2108.07141  [pdf, other

    cs.CR cs.SE

    Hurdles for Developers in Cryptography

    Authors: Mohammadreza Hazhirpasand, Oscar Nierstrasz, Mohammadhossein Shabani, Mohammad Ghafari

    Abstract: Prior research has shown that cryptography is hard to use for developers. We aim to understand what cryptography issues developers face in practice. We clustered 91954 cryptography-related questions on the Stack Overflow website, and manually analyzed a significant sample (i.e., 383) of the questions to comprehend the crypto challenges developers commonly face in this domain. We found that either… ▽ More

    Submitted 16 August, 2021; originally announced August 2021.

    Comments: ICSME 2021 - NIER Track

  27. arXiv:2009.01101  [pdf, other

    cs.CR cs.SE

    Java Cryptography Uses in the Wild

    Authors: Mohammadreza Hazhirpasand, Mohammad Ghafari, Oscar Nierstrasz

    Abstract: [Background] Previous research has shown that developers commonly misuse cryptography APIs. [Aim] We have conducted an exploratory study to find out how crypto APIs are used in open-source Java projects, what types of misuses exist, and why developers make such mistakes. [Method] We used a static analysis tool to analyze hundreds of open-source Java projects that rely on Java Cryptography Architec… ▽ More

    Submitted 2 September, 2020; originally announced September 2020.

    Comments: The ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM) 2020

  28. Why Research on Test-Driven Development is Inconclusive?

    Authors: Mohammad Ghafari, Timm Gross, Davide Fucci, Michael Felderer

    Abstract: [Background] Recent investigations into the effects of Test-Driven Development (TDD) have been contradictory and inconclusive. This hinders development teams to use research results as the basis for deciding whether and how to apply TDD. [Aim] To support researchers when designing a new study and to increase the applicability of TDD research in the decision-making process in the industrial context… ▽ More

    Submitted 19 July, 2020; originally announced July 2020.

    Comments: ESEM '20: ACM / IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM), October 8--9, 2020, Bari, Italy

  29. Security Smells in Android

    Authors: Mohammad Ghafari, Pascal Gadient, Oscar Nierstrasz

    Abstract: The ubiquity of smartphones, and their very broad capabilities and usage, make the security of these devices tremendously important. Unfortunately, despite all progress in security and privacy mechanisms, vulnerabilities continue to proliferate. Research has shown that many vulnerabilities are due to insecure programming practices. However, each study has often dealt with a specific issue, making… ▽ More

    Submitted 1 June, 2020; originally announced June 2020.

    Comments: 2017 IEEE 17th International Working Conference on Source Code Analysis and Manipulation (SCAM)

  30. What do class comments tell us? An investigation of comment evolution and practices in Pharo Smalltalk

    Authors: Pooja Rani, Sebastiano Panichella, Manuel Leuenberger, Mohammad Ghafari, Oscar Nierstrasz

    Abstract: Previous studies have characterized code comments in various programming languages to support better program comprehension activities and maintenance tasks. However, very few studies have focused on understanding developer practices to write comments. None of them has compared such developer practices to the standard comment guidelines to study the extent to which developers follow the guidelines.… ▽ More

    Submitted 15 June, 2021; v1 submitted 23 May, 2020; originally announced May 2020.

    Comments: 35 pages, 26 figures, 10 tables, Journal format, five authors, three research questions

    Journal ref: Empirical Software Engineering, 2021

  31. arXiv:2003.09543  [pdf, other

    cs.SI cs.LG cs.NE

    Towards Time-Aware Context-Aware Deep Trust Prediction in Online Social Networks

    Authors: Seyed Mohssen Ghafari

    Abstract: Trust can be defined as a measure to determine which source of information is reliable and with whom we should share or from whom we should accept information. There are several applications for trust in Online Social Networks (OSNs), including social spammer detection, fake news detection, retweet behaviour detection and recommender systems. Trust prediction is the process of predicting a new tru… ▽ More

    Submitted 20 March, 2020; originally announced March 2020.

    Comments: 158 pages, 20 figures, and 19 tables. This is my PhD thesis in Macquarie University, Sydney, Australia

    MSC Class: 68-02 ACM Class: E.0

  32. arXiv:2002.08463  [pdf, other

    cs.CR

    Tricking Johnny into Granting Web Permissions

    Authors: Mohammadreza Hazhirpasand, Mohammad Ghafari, Oscar Nierstrasz

    Abstract: We studied the web permission API dialog box in popular mobile and desktop browsers, and found that it typically lacks measures to protect users from unwittingly granting web permission when clicking too fast. We developed a game that exploits this issue, and tricks users into granting webcam permission. We conducted three experiments, each with 40 different participants, on both desktop and mob… ▽ More

    Submitted 19 February, 2020; originally announced February 2020.

    Comments: The 24th International Conference on Evaluation and Assessment in Software Engineering (EASE 2020)

  33. arXiv:2002.08458  [pdf, ps, other

    cs.SE

    Caveats in Eliciting Mobile App Requirements

    Authors: Nitish Patkar, Mohammad Ghafari, Oscar Nierstrasz, Sofija Hotomski

    Abstract: Factors such as app stores or platform choices heavily affect functional and non-functional mobile app requirements. We surveyed 45 companies and interviewed ten experts to explore how factors that impact mobile app requirements are understood by requirements engineers in the mobile app industry. We observed a lack of knowledge in several areas. For instance, we observed that all practitioners w… ▽ More

    Submitted 19 February, 2020; originally announced February 2020.

    Comments: The 24th International Conference on Evaluation and Assessment in Software Engineering (EASE 2020)

  34. arXiv:2001.04825  [pdf

    cs.IR cs.CY cs.LG stat.ML

    Enabling the Analysis of Personality Aspects in Recommender Systems

    Authors: Shahpar Yakhchi, Amin Beheshti, Seyed Mohssen Ghafari, Mehmet Orgun

    Abstract: Existing Recommender Systems mainly focus on exploiting users' feedback, e.g., ratings, and reviews on common items to detect similar users. Thus, they might fail when there are no common items of interest among users. We call this problem the Data Sparsity With no Feedback on Common Items (DSW-n-FCI). Personality-based recommender systems have shown a great success to identify similar users based… ▽ More

    Submitted 7 January, 2020; originally announced January 2020.

    Comments: This article contains 3 figures and 14 pages

    ACM Class: H.3.3; H.4.0; J.4; E.0

    Journal ref: Twenty-Third Pacific Asia Conference on Information Systems, China 2019

  35. arXiv:2001.00773  [pdf, other

    cs.SE cs.CR

    CryptoExplorer: An Interactive Web Platform Supporting Secure Use of Cryptography APIs

    Authors: Mohammadreza Hazhirpasand, Mohammad Ghafari, Oscar Nierstrasz

    Abstract: Research has shown that cryptographic APIs are hard to use. Consequently, developers resort to using code examples available in online information sources that are often not secure. We have developed a web platform, named CryptoExplorer, stocked with numerous real-world secure and insecure examples that developers can explore to learn how to use cryptographic APIs properly. This platform currently… ▽ More

    Submitted 3 January, 2020; originally announced January 2020.

    Comments: 27th IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER). London, Ontario, Canada, February 18-21, 2020

  36. Web APIs in Android through the Lens of Security

    Authors: Pascal Gadient, Mohammad Ghafari, Marc-Andrea Tarnutzer, Oscar Nierstrasz

    Abstract: Web communication has become an indispensable characteristic of mobile apps. However, it is not clear what data the apps transmit, to whom, and what consequences such transmissions have. We analyzed the web communications found in mobile apps from the perspective of security. We first manually studied 160 Android apps to identify the commonly-used communication libraries, and to understand how the… ▽ More

    Submitted 1 June, 2020; v1 submitted 1 January, 2020; originally announced January 2020.

    Comments: 27th IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER). London, Ontario, Canada, February 18-21, 2020

  37. arXiv:1908.01489  [pdf, other

    cs.CR cs.SE

    The Impact of Developer Experience in Using Java Cryptography

    Authors: Mohammadreza Hazhirpasand, Mohammad Ghafari, Stefan Krüger, Eric Bodden, Oscar Nierstrasz

    Abstract: Previous research has shown that crypto APIs are hard for developers to understand and difficult for them to use. They consequently rely on unvalidated boilerplate code from online resources where security vulnerabilities are common. We analyzed 2,324 open-source Java projects that rely on Java Cryptography Architecture (JCA) to understand how crypto APIs are used in practice, and what factors a… ▽ More

    Submitted 5 August, 2019; originally announced August 2019.

    Comments: The ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM)

  38. arXiv:1908.01476  [pdf, other

    cs.SE

    Testability First!

    Authors: Mohammad Ghafari, Markus Eggiman, Oscar Nierstrasz

    Abstract: The pivotal role of testing in high-quality software production has driven a significant effort in evaluating and assessing testing practices. We explore the state of testing in a large industrial project over an extended period. We study the interplay between bugs in the project and its test cases, and interview developers and stakeholders to uncover reasons underpinning our observations. We real… ▽ More

    Submitted 5 August, 2019; originally announced August 2019.

    Comments: The ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM)

  39. Security Code Smells in Android ICC

    Authors: Pascal Gadient, Mohammad Ghafari, Patrick Frischknecht, Oscar Nierstrasz

    Abstract: Android Inter-Component Communication (ICC) is complex, largely unconstrained, and hard for developers to understand. As a consequence, ICC is a common source of security vulnerability in Android apps. To promote secure programming practices, we have reviewed related research, and identified avoidable ICC vulnerabilities in Android-run devices and the security code smells that indicate their prese… ▽ More

    Submitted 10 December, 2018; v1 submitted 30 November, 2018; originally announced November 2018.

    Comments: Accepted on 28 Nov 2018, Empirical Software Engineering Journal (EMSE), 2018

  40. Goal-Oriented Mutation Testing with Focal Methods

    Authors: Sten Vercammen, Mohammad Ghafari, Serge Demeyer, Markus Borg

    Abstract: Mutation testing is the state-of-the-art technique for assessing the fault-detection capacity of a test suite. Unfortunately, mutation testing consumes enormous computing resources because it runs the whole test suite for each and every injected mutant. In this paper we explore fine-grained traceability links at method level (named focal methods), to reduce the execution time of mutation testing a… ▽ More

    Submitted 9 October, 2018; v1 submitted 28 July, 2018; originally announced July 2018.

    Comments: A-TEST 2018

  41. arXiv:1807.04486  [pdf, other

    cs.SE

    The Impact of Feature Selection on Predicting the Number of Bugs

    Authors: Haidar Osman, Mohammad Ghafari, Oscar Nierstrasz

    Abstract: Bug prediction is the process of training a machine learning model on software metrics and fault information to predict bugs in software entities. While feature selection is an important step in building a robust prediction model, there is insufficient evidence about its impact on predicting the number of bugs in software systems. We study the impact of both correlation-based feature selection (CF… ▽ More

    Submitted 12 July, 2018; originally announced July 2018.