Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- short-paperJuly 2022
iFixDataloss: a tool for detecting and fixing data loss issues in Android apps
ISSTA 2022: Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and AnalysisPages 785–788https://doi.org/10.1145/3533767.3543297Android apps are event-driven, and their execution is often interrupted by external events. This interruption can cause data loss issues that annoy users. For instance, when the screen is rotated, the current app page will be destroyed and recreated. If ...
Detecting and fixing data loss issues in Android apps
ISSTA 2022: Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and AnalysisPages 605–616https://doi.org/10.1145/3533767.3534402Android apps are event-driven, and their execution is often interrupted by external events. This interruption can cause data loss issues that annoy users. For instance, when the screen is rotated, the current app page will be destroyed and recreated. If ...
- research-articleApril 2021
Cat and Mouse Game: Patching Bureaucratic Work Relations by Patching Technologies
Proceedings of the ACM on Human-Computer Interaction (PACMHCI), Volume 5, Issue CSCW1Article No.: 186, Pages 1–21https://doi.org/10.1145/3449285This article uses findings from a field study of the world's largest guaranteed employment scheme (NREGA) in India to understand how digital technology mediates work relations and power dynamics within a bureaucracy. In this initiative, upper-level ...
- research-articleJanuary 2020
Developing an Artificial Intelligence (AI) System to Patch Plywood Defects in Manufacture
Procedia Computer Science (PROCS), Volume 166, Issue CPages 139–143https://doi.org/10.1016/j.procs.2020.02.036AbstractPlywood manufacture enterprises traditionally belong to the labor-intensive enterprises that their production modes have been out of place today. The emergence and rapid development of artificial intelligence (AI) provides the basic technology for ...
- research-articleFebruary 2020
{P}Net: privacy-preserving personalization of AI-based models by anonymous inter-person similarity networks
MobiQuitous '19: Proceedings of the 16th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and ServicesPages 60–69https://doi.org/10.1145/3360774.3360819Emerging proactive applications need user data to power their underlying AI algorithms. However, both the training and inference tasks are typically performed in the provider's cloud, leading to multiple privacy issues to the data subject. Current ...
-
- articleDecember 2017
Drawing a line in the sand: commitment problem in ending software support
MIS Quarterly (MISQ), Volume 41, Issue 4Pages 1227–1247We examine the commitment problem faced by a software vendor in ending critical support, in the presence of network security risks. When releasing a new version of a product, in order to drive up its demand, the vendor must cease supporting the old ...
- research-articleNovember 2017
A Lightweight Vulnerability Mitigation Framework for IoT Devices
IoTS&P '17: Proceedings of the 2017 Workshop on Internet of Things Security and PrivacyPages 71–75https://doi.org/10.1145/3139937.3139944Many of today's Internet of Things (IoT) devices are vulnerable due to the large amount of overhead incurred when their operating systems are patched against emerging vulnerabilities. In addition, legacy IoT devices are no longer supported by their ...
- research-articleOctober 2017
Herding Vulnerable Cats: A Statistical Approach to Disentangle Joint Responsibility for Web Security in Shared Hosting
- Samaneh Tajalizadehkhoob,
- Tom Van Goethem,
- Maciej Korczyński,
- Arman Noroozian,
- Rainer Böhme,
- Tyler Moore,
- Wouter Joosen,
- Michel van Eeten
CCS '17: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications SecurityPages 553–567https://doi.org/10.1145/3133956.3133971Hosting providers play a key role in fighting web compromise, but their ability to prevent abuse is constrained by the security practices of their own customers. Shared hosting, offers a unique perspective since customers operate under restricted ...
- research-articleJune 2016
Exploring the Use of Deprecated PHP Releases in the Wild Internet: Still a LAMP Issue?
WIMS '16: Proceedings of the 6th International Conference on Web Intelligence, Mining and SemanticsArticle No.: 26, Pages 1–12https://doi.org/10.1145/2912845.2912851Many web sites utilize deprecated software products that are no longer maintained by the associated software producers. This paper explores the question of whether an existing big data collection can be used to predict the likelihood of deprecated PHP ...
- research-articleNovember 2015
Patch Management: The Importance of Implementing Central Patch Management and Our Experiences Doing So
SIGUCCS '15: Proceedings of the 2015 ACM SIGUCCS Annual ConferencePages 105–108https://doi.org/10.1145/2815546.2815561Lehigh University is implementing the Secunia CSI application to patch faculty/staff computers on campus. This paper will cover the patch management process from the beginning to end, including vendor identification, application testing, vendor ...
- articleAugust 2015
Optimal Policies for Security Patch Management
Effective patch management is critical to ensure the security of information systems that modern organizations count on today. Facing numerous patch releases from vendors, an information technology IT manager must weigh the costs of frequent patching ...
- research-articleAugust 2014
Comparing Vulnerability Severity and Exploits Using Case-Control Studies
ACM Transactions on Information and System Security (TISSEC), Volume 17, Issue 1Article No.: 1, Pages 1–20https://doi.org/10.1145/2630069(U.S.) Rule-based policies for mitigating software risk suggest using the CVSS score to measure the risk of an individual vulnerability and act accordingly. A key issue is whether the ‘danger’ score does actually match the risk of exploitation in the ...
- ArticleJuly 2012
Non-intrusive Repair of Reactive Programs
We show how, under certain conditions, programs written in the behavioral programming approach can be modified (e.g., as result of new requirements or discovered bugs) using automatically-generated code modules. Given a trace of undesired behavior, one ...
- research-articleJune 2012
Mitigating program security vulnerabilities: Approaches and challenges
ACM Computing Surveys (CSUR), Volume 44, Issue 3Article No.: 11, Pages 1–46https://doi.org/10.1145/2187671.2187673Programs are implemented in a variety of languages and contain serious vulnerabilities which might be exploited to cause security breaches. These vulnerabilities have been exploited in real life and caused damages to related stakeholders such as program ...
- research-articleOctober 2011
Virtual machines with sharable operating system
OOPSLA '11: Proceedings of the ACM international conference companion on Object oriented programming systems languages and applications companionPages 109–114https://doi.org/10.1145/2048147.2048184Virtualization technologies commonly known as Cloud model enable the execution of multiple virtual machine instances (VMs) with different operating systems (OSs) on the same physical host. Each VM instance functions independently as an isolated system ...
- research-articleJune 2011
Automated atomicity-violation fixing
PLDI '11: Proceedings of the 32nd ACM SIGPLAN Conference on Programming Language Design and ImplementationPages 389–400https://doi.org/10.1145/1993498.1993544Fixing software bugs has always been an important and time-consuming process in software development. Fixing concurrency bugs has become especially critical in the multicore era. However, fixing concurrency bugs is challenging, in part due to non-...
Also Published in:
ACM SIGPLAN Notices: Volume 46 Issue 6 - short-paperOctober 2010
Pull-patching: a combination of multicast and adaptive segmented HTTP streaming
MM '10: Proceedings of the 18th ACM international conference on MultimediaPages 799–802https://doi.org/10.1145/1873951.1874081Multicast delivery for video streaming gains credibility with the introduction of commercial IPTV. We therefore revisit patching, a video-on-demand idea from the 1990s. We have built Pull-Patching, an approach that combines the patching ideas with ...
- research-articleMarch 2010
Conservation cores: reducing the energy of mature computations
- Ganesh Venkatesh,
- Jack Sampson,
- Nathan Goulding,
- Saturnino Garcia,
- Vladyslav Bryksin,
- Jose Lugo-Martinez,
- Steven Swanson,
- Michael Bedford Taylor
ASPLOS XV: Proceedings of the fifteenth International Conference on Architectural support for programming languages and operating systemsPages 205–218https://doi.org/10.1145/1736020.1736044Growing transistor counts, limited power budgets, and the breakdown of voltage scaling are currently conspiring to create a utilization wall that limits the fraction of a chip that can run at full speed at one time. In this regime, specialized, energy-...
Also Published in:
ACM SIGARCH Computer Architecture News: Volume 38 Issue 1ACM SIGPLAN Notices: Volume 45 Issue 3 - research-articleJanuary 2010
A Life Is Short, a Half-Life Is Forever
IEEE Security and Privacy (IEEE-SEC-PRIVACY), Volume 8, Issue 1Pages 86–87https://doi.org/10.1109/MSP.2010.29What we know about immunization of people against infections has a lot in common with immunization of computers, especially when you ask "What can go wrong?"
- chapterNovember 2009
Cyber Security: Assessing Our Vulnerabilities and Developing an Effective Defense
Protecting Persons While Protecting the PeopleNovember 2009, Pages 20–33https://doi.org/10.1007/978-3-642-10233-2_3The number and sophistication of cyberattacks continues to increase, but no national policy is in place to confront them. Critical systems need to be built on secure foundations, rather than the cheapest general-purpose platform. A program that combines ...