Search Results for author: M. Ali Babar

Found 14 papers, 7 papers with code

Are Latent Vulnerabilities Hidden Gems for Software Vulnerability Prediction? An Empirical Study

1 code implementation20 Jan 2024 Triet H. M. Le, Xiaoning Du, M. Ali Babar

To bridge these gaps, we conduct a large-scale study on the latent vulnerable functions in two commonly used SV datasets and their utilization for function-level and line-level SV predictions.

METAL: Metamorphic Testing Framework for Analyzing Large-Language Model Qualities

no code implementations11 Dec 2023 Sangwon Hyun, Mingyu Guo, M. Ali Babar

Through the experiments conducted with three prominent LLMs, we have confirmed that the METAL framework effectively evaluates essential QAs on primary LLM tasks and reveals the quality risks in LLMs.

Fairness Language Modelling +1

On the Use of Fine-grained Vulnerable Code Statements for Software Vulnerability Assessment Models

1 code implementation16 Mar 2022 Triet H. M. Le, M. Ali Babar

We show that vulnerable statements are 5. 8 times smaller in size, yet exhibit 7. 5-114. 5% stronger assessment performance (Matthews Correlation Coefficient (MCC)) than non-vulnerable statements.

Automated Security Assessment for the Internet of Things

no code implementations9 Sep 2021 Xuanyu Duan, Mengmeng Ge, Triet H. M. Le, Faheem Ullah, Shang Gao, Xuequan Lu, M. Ali Babar

This security model automatically assesses the security of the IoT network by capturing potential attack paths.

DeepCVA: Automated Commit-level Vulnerability Assessment with Deep Multi-task Learning

1 code implementation18 Aug 2021 Triet H. M. Le, David Hin, Roland Croft, M. Ali Babar

It is increasingly suggested to identify Software Vulnerabilities (SVs) in code commits to give early warnings about potential security risks.

Multi-Task Learning

A Survey on Data-driven Software Vulnerability Assessment and Prioritization

1 code implementation18 Jul 2021 Triet H. M. Le, Huaming Chen, M. Ali Babar

Software Vulnerabilities (SVs) are increasing in complexity and scale, posing great security risks to many software systems.

ReinforceBug: A Framework to Generate Adversarial Textual Examples

no code implementations NAACL 2021 Bushra Sabir, M. Ali Babar, Raj Gaire

Adversarial Examples (AEs) generated by perturbing original training examples are useful in improving the robustness of Deep Learning (DL) based models.

Semantic Similarity Semantic Textual Similarity

End-Users' Knowledge and Perception about Security of Mobile Health Apps: A Case Study with Two Saudi Arabian mHealth Providers

no code implementations25 Jan 2021 Bakheet Aljedaani, Aakash Ahmad, Mansooreh Zahedi, M. Ali Babar

Findings indicate that majority of the end-users are aware of the existing security features provided by the apps (e. g., restricted app permissions); however, they desire usable security (e. g., biometric authentication) and are concerned about privacy of their health information (e. g., data anonymization).

Cryptography and Security Software Engineering

Machine Learning for Detecting Data Exfiltration: A Review

no code implementations17 Dec 2020 Bushra Sabir, Faheem Ullah, M. Ali Babar, Raj Gaire

Objective: This paper aims at systematically reviewing ML-based data exfiltration countermeasures to identify and classify ML approaches, feature engineering techniques, evaluation datasets, and performance metrics used for these countermeasures.

Automated Feature Engineering BIG-bench Machine Learning +1

Challenges in Docker Development: A Large-scale Study Using Stack Overflow

no code implementations11 Aug 2020 Mubin Ul Haque, Leonardo Horn Iwaya, M. Ali Babar

As a fast-growing technology, it is important to identify the Docker-related topics that are most popular as well as existing challenges and difficulties that developers face.

Management

Reliability and Robustness analysis of Machine Learning based Phishing URL Detectors

1 code implementation18 May 2020 Bushra Sabir, M. Ali Babar, Raj Gaire, Alsharif Abuadbba

Therefore, the security vulnerabilities of these systems, in general, remain primarily unknown which calls for testing the robustness of these systems.

PUMiner: Mining Security Posts from Developer Question and Answer Websites with PU Learning

1 code implementation8 Mar 2020 Triet H. M. Le, David Hin, Roland Croft, M. Ali Babar

Using PUMiner, we provide the largest and up-to-date security content on Q&A websites for practitioners and researchers.

Cannot find the paper you are looking for? You can Submit a new open access paper.