Challenges and practices of deep learning model reengineering: A case study on computer vision

W Jiang, V Banna, N Vivek, A Goel, N Synovic… - arXiv preprint arXiv …, 2023 - arxiv.org
Many engineering organizations are reimplementing and extending deep neural networks
from the research community. We describe this process as deep learning model …

Signing in four public software package registries: Quantity, quality, and influencing factors

TR Schorlemmer, KG Kalu, L Chigges, KM Ko… - arXiv preprint arXiv …, 2024 - arxiv.org
Many software applications incorporate open-source third-party packages distributed by
third-party package registries. Guaranteeing authorship along this supply chain is a …

Analysis of failures and risks in deep learning model converters: A case study in the onnx ecosystem

P Jajal, W Jiang, A Tewari, J Woo… - arXiv preprint arXiv …, 2023 - arxiv.org
Many software engineers develop, fine-tune, and deploy deep learning (DL) models. They
use DL models in a variety of development frameworks and deploy to a range of runtime …

Systematically Detecting Packet Validation Vulnerabilities in Embedded Network Stacks

PC Amusuo, RAC Méndez, Z Xu… - 2023 38th IEEE/ACM …, 2023 - ieeexplore.ieee.org
Embedded Network Stacks (ENS) enable low-resource devices to communicate with the
outside world, facilitating the development of Internet of Things and Cyber-Physical Systems …

An empirical study on using large language models to analyze software supply chain security failures

T Singla, D Anandayuvaraj, KG Kalu… - Proceedings of the …, 2023 - dl.acm.org
As we increasingly depend on software systems, the consequences of breaches in the
software supply chain become more severe. High-profile cyber attacks like SolarWinds and …

Reflecting on the Use of the Policy-Process-Product Theory in Empirical Software Engineering

KG Kalu, TR Schorlemmer, S Chen… - Proceedings of the 31st …, 2023 - dl.acm.org
The primary theory of software engineering is that an organization's Policies and Processes
influence the quality of its Products. We call this the PPP Theory. Although empirical …

Towards rehosting embedded applications as linux applications

J Srinivasan, SR Tanksalkar… - 2023 53rd Annual …, 2023 - ieeexplore.ieee.org
Dynamic analysis of embedded firmware is a necessary capability for many security tasks,
eg, vulnerability detection. Rehosting is a technique that enables dynamic analysis by …

Incorporating failure knowledge into design decisions for iot systems: A controlled experiment on novices

D Anandayuvaraj, P Thulluri, J Figueroa… - 2023 IEEE/ACM 5th …, 2023 - ieeexplore.ieee.org
Internet of Things (IoT) systems allow software to directly interact with the physical world.
Recent IoT failures can be attributed to recurring software design flaws, suggesting IoT …

Can Large Language Models Analyze Software Failures in the News? An End-to-End Automated Pipeline with FAIL

D Anandayuvaraj, M Campbell, A Tewari… - arXiv preprint arXiv …, 2024 - arxiv.org
Software failures inform engineering work, standards, regulations. For example, the Log4J
vulnerability brought government and industry attention to evaluating and securing software …

A Unified Taxonomy and Evaluation of IoT Security Guidelines

J Chen, D Anandayuvaraj, JC Davis… - arXiv preprint arXiv …, 2023 - arxiv.org
Cybersecurity concerns about Internet of Things (IoT) devices and infrastructure are growing
each year. In response, organizations worldwide have published IoT cybersecurity …