Challenges and practices of deep learning model reengineering: A case study on computer vision
Many engineering organizations are reimplementing and extending deep neural networks
from the research community. We describe this process as deep learning model …
from the research community. We describe this process as deep learning model …
Signing in four public software package registries: Quantity, quality, and influencing factors
Many software applications incorporate open-source third-party packages distributed by
third-party package registries. Guaranteeing authorship along this supply chain is a …
third-party package registries. Guaranteeing authorship along this supply chain is a …
Analysis of failures and risks in deep learning model converters: A case study in the onnx ecosystem
Many software engineers develop, fine-tune, and deploy deep learning (DL) models. They
use DL models in a variety of development frameworks and deploy to a range of runtime …
use DL models in a variety of development frameworks and deploy to a range of runtime …
Systematically Detecting Packet Validation Vulnerabilities in Embedded Network Stacks
PC Amusuo, RAC Méndez, Z Xu… - 2023 38th IEEE/ACM …, 2023 - ieeexplore.ieee.org
Embedded Network Stacks (ENS) enable low-resource devices to communicate with the
outside world, facilitating the development of Internet of Things and Cyber-Physical Systems …
outside world, facilitating the development of Internet of Things and Cyber-Physical Systems …
An empirical study on using large language models to analyze software supply chain security failures
As we increasingly depend on software systems, the consequences of breaches in the
software supply chain become more severe. High-profile cyber attacks like SolarWinds and …
software supply chain become more severe. High-profile cyber attacks like SolarWinds and …
Reflecting on the Use of the Policy-Process-Product Theory in Empirical Software Engineering
KG Kalu, TR Schorlemmer, S Chen… - Proceedings of the 31st …, 2023 - dl.acm.org
The primary theory of software engineering is that an organization's Policies and Processes
influence the quality of its Products. We call this the PPP Theory. Although empirical …
influence the quality of its Products. We call this the PPP Theory. Although empirical …
Towards rehosting embedded applications as linux applications
J Srinivasan, SR Tanksalkar… - 2023 53rd Annual …, 2023 - ieeexplore.ieee.org
Dynamic analysis of embedded firmware is a necessary capability for many security tasks,
eg, vulnerability detection. Rehosting is a technique that enables dynamic analysis by …
eg, vulnerability detection. Rehosting is a technique that enables dynamic analysis by …
Incorporating failure knowledge into design decisions for iot systems: A controlled experiment on novices
D Anandayuvaraj, P Thulluri, J Figueroa… - 2023 IEEE/ACM 5th …, 2023 - ieeexplore.ieee.org
Internet of Things (IoT) systems allow software to directly interact with the physical world.
Recent IoT failures can be attributed to recurring software design flaws, suggesting IoT …
Recent IoT failures can be attributed to recurring software design flaws, suggesting IoT …
Can Large Language Models Analyze Software Failures in the News? An End-to-End Automated Pipeline with FAIL
D Anandayuvaraj, M Campbell, A Tewari… - arXiv preprint arXiv …, 2024 - arxiv.org
Software failures inform engineering work, standards, regulations. For example, the Log4J
vulnerability brought government and industry attention to evaluating and securing software …
vulnerability brought government and industry attention to evaluating and securing software …
A Unified Taxonomy and Evaluation of IoT Security Guidelines
J Chen, D Anandayuvaraj, JC Davis… - arXiv preprint arXiv …, 2023 - arxiv.org
Cybersecurity concerns about Internet of Things (IoT) devices and infrastructure are growing
each year. In response, organizations worldwide have published IoT cybersecurity …
each year. In response, organizations worldwide have published IoT cybersecurity …