Skip to main content

Showing 1–3 of 3 results for author: Kholoosi, M M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2408.00435  [pdf, other

    cs.SE cs.AI cs.CR

    A Qualitative Study on Using ChatGPT for Software Security: Perception vs. Practicality

    Authors: M. Mehdi Kholoosi, M. Ali Babar, Roland Croft

    Abstract: Artificial Intelligence (AI) advancements have enabled the development of Large Language Models (LLMs) that can perform a variety of tasks with remarkable semantic understanding and accuracy. ChatGPT is one such LLM that has gained significant attention due to its impressive capabilities for assisting in various knowledge-intensive tasks. Due to the knowledge-intensive nature of engineering secure… ▽ More

    Submitted 1 August, 2024; originally announced August 2024.

    Comments: Accepted for publication at International Conference on Trust, Privacy and Security - 2024

  2. arXiv:2308.11862  [pdf, other

    cs.CR cs.SE

    Empirical Analysis of Software Vulnerabilities Causing Timing Side Channels

    Authors: M. Mehdi Kholoosi, M. Ali Babar, Cemal Yilmaz

    Abstract: Timing attacks are considered one of the most damaging side-channel attacks. These attacks exploit timing fluctuations caused by certain operations to disclose confidential information to an attacker. For instance, in asymmetric encryption, operations such as multiplication and division can cause time-varying execution times that can be ill-treated to obtain an encryption key. Whilst several effor… ▽ More

    Submitted 22 August, 2023; originally announced August 2023.

  3. arXiv:2112.12595  [pdf, other

    cs.CR cs.SE

    KGSecConfig: A Knowledge Graph Based Approach for Secured Container Orchestrator Configuration

    Authors: Mubin Ul Haque, M. Mehdi Kholoosi, M. Ali Babar

    Abstract: Container Orchestrator (CO) is a vital technology for managing clusters of containers, which may form a virtualized infrastructure for developing and operating software systems. Like any other software system, securing CO is critical, but can be quite challenging task due to large number of configurable options. Manual configuration is not only knowledge intensive and time consuming, but also is e… ▽ More

    Submitted 21 December, 2021; originally announced December 2021.