Skip to main content

Showing 1–3 of 3 results for author: Kharma, M

.
  1. arXiv:2502.01853  [pdf, ps, other

    cs.CR cs.LG cs.SE

    Security and Quality in LLM-Generated Code: A Multi-Language, Multi-Model Analysis

    Authors: Mohammed Kharma, Soohyeon Choi, Mohammed AlKhanafseh, David Mohaisen

    Abstract: Artificial Intelligence (AI)-driven code generation tools are increasingly used throughout the software development lifecycle to accelerate coding tasks. However, the security of AI-generated code using Large Language Models (LLMs) remains underexplored, with studies revealing various risks and weaknesses. This paper analyzes the security of code generated by LLMs across different programming lang… ▽ More

    Submitted 3 February, 2025; originally announced February 2025.

    Comments: 12 pages, 10 tables. In submission to IEEE Transactions on Dependable and Secure Computing

  2. arXiv:2308.07096  [pdf, other

    cs.CR

    Towards a Cloud-Based Ontology for Service Model Security -- Technical Report

    Authors: Mohammed Kharma, Ahmed Sabbah, Mustafa Jarrar

    Abstract: The adoption of cloud computing has brought significant advancements in the operational models of businesses. However, this shift also brings new security challenges by expanding the attack surface. The offered services in cloud computing have various service models. Each cloud service model has a defined responsibility divided based on the stack layers between the service user and their cloud pro… ▽ More

    Submitted 14 August, 2023; originally announced August 2023.

    Comments: 8 pages

  3. arXiv:2308.02640  [pdf, other

    cs.CR

    Creating Android Malware Knowledge Graph Based on a Malware Ontology

    Authors: Ahmed Sabbah, Mohammed Kharma, Mustafa Jarrar

    Abstract: As mobile and smart connectivity continue to grow, malware presents a permanently evolving threat to different types of critical domains such as health, logistics, banking, and community segments. Different types of malware have dynamic behaviors and complicated characteristics that are shared among members of the same malware family. Malware threat intelligence reports play a crucial role in desc… ▽ More

    Submitted 4 August, 2023; originally announced August 2023.