Skip to main content

Showing 1–6 of 6 results for author: Peldszus, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2501.11546  [pdf, other

    cs.SE cs.CR

    An Exploratory Study on the Engineering of Security Features

    Authors: Kevin Hermann, Sven Peldszus, Jan-Philipp Steghöfer, Thorsten Berger

    Abstract: Software security is of utmost importance for most software systems. Developers must systematically select, plan, design, implement, and especially, maintain and evolve security features -- functionalities to mitigate attacks or protect personal data such as cryptography or access control -- to ensure the security of their software. Although security features are usually available in libraries, in… ▽ More

    Submitted 12 February, 2025; v1 submitted 20 January, 2025; originally announced January 2025.

    Comments: Accepted at the 47th IEEE/ACM International Conference on Software Engineering (ICSE 2025)

  2. arXiv:2501.04454  [pdf, other

    cs.CR cs.SE

    A Taxonomy of Functional Security Features and How They Can Be Located

    Authors: Kevin Hermann, Simon Schneider, Catherine Tony, Asli Yardim, Sven Peldszus, Thorsten Berger, Riccardo Scandariato, M. Angela Sasse, Alena Naiakshina

    Abstract: Security must be considered in almost every software system. Unfortunately, selecting and implementing security features remains challenging due to the variety of security threats and possible countermeasures. While security standards are intended to help developers, they are usually too abstract and vague to help implement security features, or they merely help configure such. A resource that des… ▽ More

    Submitted 8 January, 2025; originally announced January 2025.

  3. arXiv:2408.06226  [pdf, other

    cs.SE cs.AI cs.LG

    A Large-Scale Study of Model Integration in ML-Enabled Software Systems

    Authors: Yorick Sens, Henriette Knopp, Sven Peldszus, Thorsten Berger

    Abstract: The rise of machine learning (ML) and its integration into software systems has drastically changed development practices. While software engineering traditionally focused on manually created code artifacts with dedicated processes and architectures, ML-enabled systems require additional data-science methods and tools to create ML artifacts -- especially ML models and training data. However, integ… ▽ More

    Submitted 24 February, 2025; v1 submitted 12 August, 2024; originally announced August 2024.

    Comments: Accepted at International Conference on Software Engineering (ICSE) 2025

  4. arXiv:2408.06219  [pdf, other

    cs.CR cs.SE

    120 Domain-Specific Languages for Security

    Authors: Markus Krausz, Sven Peldszus, Francesco Regazzoni, Thorsten Berger, Tim Güneysu

    Abstract: Security engineering, from security requirements engineering to the implementation of cryptographic protocols, is often supported by domain-specific languages (DSLs). Unfortunately, a lack of knowledge about these DSLs, such as which security aspects are addressed and when, hinders their effective use and further research. This systematic literature review examines 120 security-oriented DSLs based… ▽ More

    Submitted 13 August, 2024; v1 submitted 12 August, 2024; originally announced August 2024.

  5. Software Reconfiguration in Robotics

    Authors: Sven Peldszus, Davide Brugali, Daniel Strüber, Patrizio Pelliccione, Thorsten Berger

    Abstract: Robots often need to be reconfigurable$-$to customize, calibrate, or optimize robots operating in varying environments with different hardware). A particular challenge in robotics is the automated and dynamic reconfiguration to load and unload software components, as well as parameterizing them. Over the last decades, a large variety of software reconfiguration techniques has been presented in the… ▽ More

    Submitted 9 April, 2025; v1 submitted 2 October, 2023; originally announced October 2023.

    Journal ref: Empir Software Eng 30, 94 (2025)

  6. Checking Security Compliance between Models and Code

    Authors: Katja Tuma, Sven Peldszus, Daniel Strüber, Riccardo Scandariato, Jan Jürjens

    Abstract: It is challenging to verify that the planned security mechanisms are actually implemented in the software. In the context of model-based development, the implemented security mechanisms must capture all intended security properties that were considered in the design models. Assuring this compliance manually is labor intensive and can be error-prone. This work introduces the first semi-automatic te… ▽ More

    Submitted 18 March, 2022; v1 submitted 19 August, 2021; originally announced August 2021.