Skip to main content

Showing 1–25 of 25 results for author: Forrest, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2506.00212  [pdf

    cs.CY

    Concerning the Responsible Use of AI in the US Criminal Justice System

    Authors: Cristopher Moore, Catherine Gill, Nadya Bliss, Kevin Butler, Stephanie Forrest, Daniel Lopresti, Mary Lou Maher, Helena Mentis, Shashi Shekhar, Amanda Stent, Matthew Turk

    Abstract: Artificial intelligence (AI) is increasingly being adopted in most industries, and for applications such as note taking and checking grammar, there is typically not a cause for concern. However, when constitutional rights are involved, as in the justice system, transparency is paramount. While AI can assist in areas such as risk assessment and forensic evidence generation, its "black box" nature r… ▽ More

    Submitted 30 May, 2025; originally announced June 2025.

  2. arXiv:2408.12137  [pdf, other

    nlin.AO cs.NE q-bio.PE

    Self-Organization in Computation & Chemistry: Return to AlChemy

    Authors: Cole Mathis, Devansh Patel, Westley Weimer, Stephanie Forrest

    Abstract: How do complex adaptive systems, such as life, emerge from simple constituent parts? In the 1990s Walter Fontana and Leo Buss proposed a novel modeling approach to this question, based on a formal model of computation known as $λ$ calculus. The model demonstrated how simple rules, embedded in a combinatorially large space of possibilities, could yield complex, dynamically stable organizations, rem… ▽ More

    Submitted 23 August, 2024; v1 submitted 22 August, 2024; originally announced August 2024.

  3. arXiv:2405.05455  [pdf, ps, other

    cs.SE cs.LG

    Automated Program Repair: Emerging trends pose and expose problems for benchmarks

    Authors: Joseph Renzullo, Pemma Reiter, Westley Weimer, Stephanie Forrest

    Abstract: Machine learning (ML) now pervades the field of Automated Program Repair (APR). Algorithms deploy neural machine translation and large language models (LLMs) to generate software patches, among other tasks. But, there are important differences between these applications of ML and earlier work. Evaluations and comparisons must take care to ensure that results are valid and likely to generalize. A c… ▽ More

    Submitted 8 May, 2024; originally announced May 2024.

    Comments: 16 pages, 1 table, submitted to ACM Computing Surveys

  4. arXiv:2310.10211  [pdf, other

    cs.LG

    GEVO-ML: Optimizing Machine Learning Code with Evolutionary Computation

    Authors: Jhe-Yu Liou, Stephanie Forrest, Carole-Jean Wu

    Abstract: Parallel accelerators, such as GPUs, are key enablers for large-scale Machine Learning (ML) applications. However, ML model developers often lack detailed knowledge of the underlying system architectures, while system programmers usually do not have a high-level understanding of the ML model that runs on the specific system. To mitigate this gap between two relevant aspects of domain knowledge, th… ▽ More

    Submitted 16 October, 2023; originally announced October 2023.

  5. arXiv:2208.12350  [pdf, other

    cs.SE cs.DC cs.PF

    Understanding the Power of Evolutionary Computation for GPU Code Optimization

    Authors: Jhe-Yu Liou, Muaaz Awan, Steven Hofmeyr, Stephanie Forrest, Carole-Jean Wu

    Abstract: Achieving high performance for GPU codes requires developers to have significant knowledge in parallel programming and GPU architectures, and in-depth understanding of the application. This combination makes it challenging to find performance optimizations for GPU-based applications, especially in scientific computing. This paper shows that significant speedups can be achieved on two quite differe… ▽ More

    Submitted 25 August, 2022; originally announced August 2022.

  6. arXiv:2202.12336  [pdf, other

    cs.CR cs.SE

    Automatically Mitigating Vulnerabilities in Binary Programs via Partially Recompilable Decompilation

    Authors: Pemma Reiter, Hui Jun Tay, Westley Weimer, Adam Doupé, Ruoyu Wang, Stephanie Forrest

    Abstract: Vulnerabilities are challenging to locate and repair, especially when source code is unavailable and binary patching is required. Manual methods are time-consuming, require significant expertise, and do not scale to the rate at which new vulnerabilities are discovered. Automated methods are an attractive alternative, and we propose Partially Recompilable Decompilation (PRD). PRD lifts suspect bina… ▽ More

    Submitted 12 June, 2023; v1 submitted 24 February, 2022; originally announced February 2022.

  7. arXiv:2201.07328  [pdf, other

    cs.NI cs.SI physics.data-an physics.soc-ph

    Cutting Through the Noise to Infer Autonomous System Topology

    Authors: Kirtus G. Leyba, Joshua J. Daymude, Jean-Gabriel Young, M. E. J. Newman, Jennifer Rexford, Stephanie Forrest

    Abstract: The Border Gateway Protocol (BGP) is a distributed protocol that manages interdomain routing without requiring a centralized record of which autonomous systems (ASes) connect to which others. Many methods have been devised to infer the AS topology from publicly available BGP data, but none provide a general way to handle the fact that the data are notoriously incomplete and subject to error. This… ▽ More

    Submitted 18 January, 2022; originally announced January 2022.

    Comments: 10 pages, 8 figures, 1 table. To appear at IEEE INFOCOM 2022. © IEEE 2022

    Journal ref: Proceedings of the IEEE Conference on Computer Communications (INFOCOM 2022), pp. 1609-1618

  8. arXiv:2107.10344  [pdf

    cs.CY q-bio.PE

    Challenges in cybersecurity: Lessons from biological defense systems

    Authors: Edward Schrom, Ann Kinzig, Stephanie Forrest, Andrea L. Graham, Simon A. Levin, Carl T. Bergstrom, Carlos Castillo-Chavez, James P. Collins, Rob J. de Boer, Adam Doupé, Roya Ensafi, Stuart Feldman, Bryan T. Grenfell. Alex Halderman, Silvie Huijben, Carlo Maley, Melanie Mosesr, Alan S. Perelson, Charles Perrings, Joshua Plotkin, Jennifer Rexford, Mohit Tiwari

    Abstract: We explore the commonalities between methods for assuring the security of computer systems (cybersecurity) and the mechanisms that have evolved through natural selection to protect vertebrates against pathogens, and how insights derived from studying the evolution of natural defenses can inform the design of more effective cybersecurity systems. More generally, security challenges are crucial for… ▽ More

    Submitted 21 July, 2021; originally announced July 2021.

    Comments: 20 pages

    MSC Class: A.0

  9. Preventing Extreme Polarization of Political Attitudes

    Authors: Robert Axelrod, Joshua J. Daymude, Stephanie Forrest

    Abstract: Extreme polarization can undermine democracy by making compromise impossible and transforming politics into a zero-sum game. Ideological polarization - the extent to which political views are widely dispersed - is already strong among elites, but less so among the general public (McCarty, 2019, p. 50-68). Strong mutual distrust and hostility between Democrats and Republicans in the U.S., combined… ▽ More

    Submitted 14 June, 2021; v1 submitted 11 March, 2021; originally announced March 2021.

    Comments: 23 pages, 15 figures, 1 table

  10. arXiv:2101.07328  [pdf, other

    cs.CR

    MIMOSA: Reducing Malware Analysis Overhead with Coverings

    Authors: Mohsen Ahmadi, Kevin Leach, Ryan Dougherty, Stephanie Forrest, Westley Weimer

    Abstract: There is a growing body of malware samples that evade automated analysis and detection tools. Malware may measure fingerprints ("artifacts") of the underlying analysis tool or environment and change their behavior when artifacts are detected. While analysis tools can mitigate artifacts to reduce exposure, such concealment is expensive. However, not every sample checks for every type of artifact-an… ▽ More

    Submitted 18 January, 2021; originally announced January 2021.

  11. arXiv:2004.08140  [pdf, other

    cs.NE

    GEVO: GPU Code Optimization using Evolutionary Computation

    Authors: Jhe-Yu Liou, Xiaodong Wang, Stephanie Forrest, Carole-Jean Wu

    Abstract: GPUs are a key enabler of the revolution in machine learning and high performance computing, functioning as de facto co-processors to accelerate large-scale computation. As the programming stack and tool support have matured, GPUs have also become accessible to programmers, who may lack detailed knowledge of the underlying architecture and fail to fully leverage the GPU's computation power. GEVO (… ▽ More

    Submitted 27 April, 2020; v1 submitted 17 April, 2020; originally announced April 2020.

  12. arXiv:1904.11052  [pdf, other

    cs.CR

    Risky Business: Assessing Security with External Measurements

    Authors: Benjamin Edwards, Jay Jacobs, Stephanie Forrest

    Abstract: Security practices in large organizations are notoriously difficult to assess. The challenge only increases when organizations turn to third parties to provide technology and business services, which typically require tight network integration and sharing of confidential data, potentially increasing the organization's attack surface. The security maturity of an organization describes how well it m… ▽ More

    Submitted 22 May, 2019; v1 submitted 24 April, 2019; originally announced April 2019.

    Comments: Updated data provider capitalization in text abstract

  13. Using Dynamic Analysis to Generate Disjunctive Invariants

    Authors: ThanhVu Nguyen, Deepak Kapur, Westley Weimer, Stephanie Forrest

    Abstract: Program invariants are important for defect detection, program verification, and program repair. However, existing techniques have limited support for important classes of invariants such as disjunctions, which express the semantics of conditional statements. We propose a method for generating disjunctive invariants over numerical domains, which are inexpressible using classical convex polyhedra.… ▽ More

    Submitted 16 April, 2019; originally announced April 2019.

    Comments: appear in ICSE 2014

  14. arXiv:1903.11765  [pdf, ps, other

    cs.PL

    Connecting Program Synthesis and Reachability: Automatic Program Repair using Test-Input Generation

    Authors: ThanhVu Nguyen, Westley Weimer, Deepak Kapur, Stephanie Forrest

    Abstract: We prove that certain formulations of program synthesis and reachability are equivalent. Specifically, our constructive proof shows the reductions between the template-based synthesis problem, which generates a program in a pre-specified form, and the reachability problem, which decides the reachability of a program location. This establishes a link between the two research fields and allows for t… ▽ More

    Submitted 27 March, 2019; originally announced March 2019.

    Journal ref: Tools and Algorithms for the Construction and Analysis of Systems (TACAS), pages 301--318. Springer, 2017

  15. arXiv:1803.03453  [pdf, other

    cs.NE

    The Surprising Creativity of Digital Evolution: A Collection of Anecdotes from the Evolutionary Computation and Artificial Life Research Communities

    Authors: Joel Lehman, Jeff Clune, Dusan Misevic, Christoph Adami, Lee Altenberg, Julie Beaulieu, Peter J. Bentley, Samuel Bernard, Guillaume Beslon, David M. Bryson, Patryk Chrabaszcz, Nick Cheney, Antoine Cully, Stephane Doncieux, Fred C. Dyer, Kai Olav Ellefsen, Robert Feldt, Stephan Fischer, Stephanie Forrest, Antoine Frénoy, Christian Gagné, Leni Le Goff, Laura M. Grabowski, Babak Hodjat, Frank Hutter , et al. (28 additional authors not shown)

    Abstract: Biological evolution provides a creative fount of complex and subtle adaptations, often surprising the scientists who discover them. However, because evolution is an algorithmic process that transcends the substrate in which it occurs, evolution's creativity is not limited to nature. Indeed, many researchers in the field of digital evolution have observed their evolving algorithms and organisms su… ▽ More

    Submitted 21 November, 2019; v1 submitted 9 March, 2018; originally announced March 2018.

  16. Satisfiability Checking meets Symbolic Computation (Project Paper)

    Authors: E. Abraham, J. Abbott, B. Becker, A. M. Bigatti, M. Brain, B. Buchberger, A. Cimatti, J. H. Davenport, M. England, P. Fontaine, S. Forrest, A. Griggio, D. Kroening, W. M. Seiler, T. Sturm

    Abstract: Symbolic Computation and Satisfiability Checking are two research areas, both having their individual scientific focus but sharing also common interests in the development, implementation and application of decision procedures for arithmetic theories. Despite their commonalities, the two communities are rather weakly connected. The aim of our newly accepted SC-square project (H2020-FETOPEN-CSA) is… ▽ More

    Submitted 27 July, 2016; originally announced July 2016.

    Journal ref: M. Kohlhase, M. Johansson, B. Miller, L. de Moura, F. Tompa, eds., Intelligent Computer Mathematics (Proceedings of CICM 2016), pp. 28-43, (Lecture Notes in Computer Science, 9791). Springer International Publishing, 2016

  17. Satisfiability Checking and Symbolic Computation

    Authors: E. Abraham, J. Abbott, B. Becker, A. M. Bigatti, M. Brain, B. Buchberger, A. Cimatti, J. H. Davenport, M. England, P. Fontaine, S. Forrest, A. Griggio, D. Kroening, W. M. Seiler, T. Sturm

    Abstract: Symbolic Computation and Satisfiability Checking are viewed as individual research areas, but they share common interests in the development, implementation and application of decision procedures for arithmetic theories. Despite these commonalities, the two communities are currently only weakly connected. We introduce a new project SC-square to build a joint community in this area, supported by a… ▽ More

    Submitted 23 July, 2016; originally announced July 2016.

    Comments: 3 page Extended Abstract to accompany an ISSAC 2016 poster. Poster available at http://www.sc-square.org/SC2-AnnouncementPoster.pdf

    Journal ref: ACM Communications in Computer Algebra, 50:4 (issue 198), pp. 145-147, ACM, 2016

  18. arXiv:1204.4224  [pdf, ps, other

    cs.SE

    Software Mutational Robustness

    Authors: Eric Schulte, Zachary P. Fry, Ethan Fast, Westley Weimer, Stephanie Forrest

    Abstract: Neutral landscapes and mutational robustness are believed to be important enablers of evolvability in biology. We apply these concepts to software, defining mutational robustness to be the fraction of random mutations that leave a program's behavior unchanged. Test cases are used to measure program behavior and mutation operators are taken from genetic programming. Although software is often viewe… ▽ More

    Submitted 27 June, 2013; v1 submitted 18 April, 2012; originally announced April 2012.

  19. arXiv:1202.4008  [pdf, other

    cs.NI cs.CR cs.MA

    Modeling Internet-Scale Policies for Cleaning up Malware

    Authors: Steven Hofmeyr, Tyler Moore, Stephanie Forrest, Benjamin Edwards, George Stelle

    Abstract: An emerging consensus among policy makers is that interventions undertaken by Internet Service Providers are the best way to counter the rising incidence of malware. However, assessing the suitability of countermeasures at this scale is hard. In this paper, we use an agent-based model, called ASIM, to investigate the impact of policy interventions at the Autonomous System level of the Internet. Fo… ▽ More

    Submitted 17 February, 2012; originally announced February 2012.

    Comments: 22 pages, 9 Figures, Presented at the Tenth Workshop on the Economics of Information Security, Jun 2011

    ACM Class: K.5.5; K.6.m; C.2.0

  20. arXiv:1202.3993  [pdf, other

    cs.NI cs.SI

    Internet Topology over Time

    Authors: Benjamin Edwards, Steven Hofmeyr, George Stelle, Stephanie Forrest

    Abstract: There are few studies that look closely at how the topology of the Internet evolves over time; most focus on snapshots taken at a particular point in time. In this paper, we investigate the evolution of the topology of the Autonomous Systems graph of the Internet, examining how eight commonly-used topological measures change from January 2002 to January 2010. We find that the distributions of most… ▽ More

    Submitted 17 February, 2012; originally announced February 2012.

    Comments: 6 pages, 5 figures

    ACM Class: C.2.5; H.3.4

  21. arXiv:1202.3987  [pdf, other

    cs.CR cs.SI

    Beyond the Blacklist: Modeling Malware Spread and the Effect of Interventions

    Authors: Benjamin Edwards, Tyler Moore, George Stelle, Steven Hofmeyr, Stephanie Forrest

    Abstract: Malware spread among websites and between websites and clients is an increasing problem. Search engines play an important role in directing users to websites and are a natural control point for intervening, using mechanisms such as blacklisting. The paper presents a simple Markov model of malware spread through large populations of websites and studies the effect of two interventions that might be… ▽ More

    Submitted 17 February, 2012; originally announced February 2012.

    Comments: 13 pages, 11 figures

    ACM Class: K.6.5; K.6.m

  22. arXiv:0903.3218  [pdf, other

    cs.NI cs.CR cs.CY

    Nation-State Routing: Censorship, Wiretapping, and BGP

    Authors: Josh Karlin, Stephanie Forrest, Jennifer Rexford

    Abstract: The treatment of Internet traffic is increasingly affected by national policies that require the ISPs in a country to adopt common protocols or practices. Examples include government enforced censorship, wiretapping, and protocol deployment mandates for IPv6 and DNSSEC. If an entire nation's worth of ISPs apply common policies to Internet traffic, the global implications could be significant. Fo… ▽ More

    Submitted 18 March, 2009; originally announced March 2009.

  23. arXiv:0802.3283  [pdf, ps, other

    cs.NI

    An integrated model of traffic, geography and economy in the Internet

    Authors: Petter Holme, Josh Karlin, Stephanie Forrest

    Abstract: Modeling Internet growth is important both for understanding the current network and to predict and improve its future. To date, Internet models have typically attempted to explain a subset of the following characteristics: network structure, traffic flow, geography, and economy. In this paper we present a discrete, agent-based model, that integrates all of them. We show that the model generates… ▽ More

    Submitted 22 February, 2008; originally announced February 2008.

    Journal ref: ACM SIGCOMM Computer Communication Review 38, 7-15 (2008)

  24. arXiv:cs/0608088  [pdf, ps, other

    cs.NI physics.soc-ph

    Radial Structure of the Internet

    Authors: Petter Holme, Josh Karlin, Stephanie Forrest

    Abstract: The structure of the Internet at the Autonomous System (AS) level has been studied by both the Physics and Computer Science communities. We extend this work to include features of the core and the periphery, taking a radial perspective on AS network structure. New methods for plotting AS data are described, and they are used to analyze data sets that have been extended to contain edges missing f… ▽ More

    Submitted 22 August, 2006; originally announced August 2006.

    Journal ref: Proc. R. Soc. A 463, (2007) 1231-1246

  25. arXiv:cs/0407048  [pdf, ps, other

    cs.NI cs.CY

    Technological networks and the spread of computer viruses

    Authors: Justin Balthrop, Stephanie Forrest, M. E. J. Newman, Matthew M. Williamson

    Abstract: Computer infections such as viruses and worms spread over networks of contacts between computers, with different types of networks being exploited by different types of infections. Here we analyze the structures of several of these networks, exploring their implications for modes of spread and the control of infection. We argue that vaccination strategies that focus on a limited number of networ… ▽ More

    Submitted 19 July, 2004; originally announced July 2004.

    Comments: 9 pages, 1 figure

    Journal ref: Science 304, 527-529 (2004)