Skip to main content

Showing 1–30 of 30 results for author: Scandariato, R

Searching in archive cs. Search in all archives.
.
  1. arXiv:2502.09117  [pdf, other

    cs.CR cs.SE

    In Specs we Trust? Conformance-Analysis of Implementation to Specifications in Node-RED and Associated Security Risks

    Authors: Simon Schneider, Komal Kashish, Katja Tuma, Riccardo Scandariato

    Abstract: Low-code development frameworks for IoT platforms offer a simple drag-and-drop mechanism to create applications for the billions of existing IoT devices without the need for extensive programming knowledge. The security of such software is crucial given the close integration of IoT devices in many highly sensitive areas such as healthcare or home automation. Node-RED is such a framework, where app… ▽ More

    Submitted 13 February, 2025; originally announced February 2025.

  2. arXiv:2502.04953  [pdf, other

    cs.CR cs.SE

    A Systematic Literature Review on Automated Exploit and Security Test Generation

    Authors: Quang-Cuong Bui, Emanuele Iannone, Maria Camporese, Torge Hinrichs, Catherine Tony, László Tóth, Fabio Palomba, Péter Hegedűs, Fabio Massacci, Riccardo Scandariato

    Abstract: The exploit or the Proof of Concept of the vulnerability plays an important role in developing superior vulnerability repair techniques, as it can be used as an oracle to verify the correctness of the patches generated by the tools. However, the vulnerability exploits are often unavailable and require time and expert knowledge to craft. Obtaining them from the exploit generation techniques is anot… ▽ More

    Submitted 7 February, 2025; originally announced February 2025.

    Comments: This work was partially supported by EU-funded project Sec4AI4Sec (grant no. 101120393)

    ACM Class: A.2

  3. arXiv:2502.03365  [pdf, other

    cs.SE cs.CR cs.LG

    A Match Made in Heaven? Matching Test Cases and Vulnerabilities With the VUTECO Approach

    Authors: Emanuele Iannone, Quang-Cuong Bui, Riccardo Scandariato

    Abstract: Software vulnerabilities are commonly detected via static analysis, penetration testing, and fuzzing. They can also be found by running unit tests - so-called vulnerability-witnessing tests - that stimulate the security-sensitive behavior with crafted inputs. Developing such tests is difficult and time-consuming; thus, automated data-driven approaches could help developers intercept vulnerabilitie… ▽ More

    Submitted 5 February, 2025; originally announced February 2025.

    Comments: This work was partially supported by EU-funded project Sec4AI4Sec (grant no. 101120393)

    ACM Class: D.2.5; D.2.7

  4. arXiv:2501.04454  [pdf, other

    cs.CR cs.SE

    A Taxonomy of Functional Security Features and How They Can Be Located

    Authors: Kevin Hermann, Simon Schneider, Catherine Tony, Asli Yardim, Sven Peldszus, Thorsten Berger, Riccardo Scandariato, M. Angela Sasse, Alena Naiakshina

    Abstract: Security must be considered in almost every software system. Unfortunately, selecting and implementing security features remains challenging due to the variety of security threats and possible countermeasures. While security standards are intended to help developers, they are usually too abstract and vague to help implement security features, or they merely help configure such. A resource that des… ▽ More

    Submitted 8 January, 2025; originally announced January 2025.

  5. arXiv:2412.16667  [pdf, other

    cs.SE cs.CY cs.HC

    The Good, the Bad, and the (Un)Usable: A Rapid Literature Review on Privacy as Code

    Authors: Nicolás E. Díaz Ferreyra, Sirine Khelifi, Nalin Arachchilage, Riccardo Scandariato

    Abstract: Privacy and security are central to the design of information systems endowed with sound data protection and cyber resilience capabilities. Still, developers often struggle to incorporate these properties into software projects as they either lack proper cybersecurity training or do not consider them a priority. Prior work has tried to support privacy and security engineering activities through th… ▽ More

    Submitted 2 March, 2025; v1 submitted 21 December, 2024; originally announced December 2024.

    Comments: Accepted at the 18th International Conference on Cooperative and Human Aspects of Software Engineering (CHASE '25)

  6. arXiv:2412.08352  [pdf, other

    cs.SE

    Comparison of Static Analysis Architecture Recovery Tools for Microservice Applications

    Authors: Simon Schneider, Alexander Bakhtin, Xiaozhou Li, Jacopo Soldani, Antonio Brogi, Tomas Cerny, Riccardo Scandariato, Davide Taibi

    Abstract: Architecture recovery tools help software engineers obtain an overview of the structure of their software systems during all phases of the software development life cycle. This is especially important for microservice applications because they consist of multiple interacting microservices, which makes it more challenging to oversee the architecture. Various tools and techniques for architecture re… ▽ More

    Submitted 11 December, 2024; originally announced December 2024.

  7. arXiv:2407.18584  [pdf, other

    cs.SE

    Designing Secure AI-based Systems: a Multi-Vocal Literature Review

    Authors: Simon Schneider, Ananya Saha, Emanuele Mezzi, Katja Tuma, Riccardo Scandariato

    Abstract: AI-based systems leverage recent advances in the field of AI/ML by combining traditional software systems with AI components. Applications are increasingly being developed in this way. Software engineers can usually rely on a plethora of supporting information on how to use and implement any given technology. For AI-based systems, however, such information is scarce. Specifically, guidance on how… ▽ More

    Submitted 26 July, 2024; originally announced July 2024.

    Comments: IEEE Secure Development Conference (SecDev)

  8. arXiv:2407.07064  [pdf, other

    cs.SE cs.AI cs.CR cs.LG

    Prompting Techniques for Secure Code Generation: A Systematic Investigation

    Authors: Catherine Tony, Nicolás E. Díaz Ferreyra, Markus Mutas, Salem Dhiff, Riccardo Scandariato

    Abstract: Large Language Models (LLMs) are gaining momentum in software development with prompt-driven programming enabling developers to create code from natural language (NL) instructions. However, studies have questioned their ability to produce secure code and, thereby, the quality of prompt-generated software. Alongside, various prompting techniques that carefully tailor prompts have emerged to elicit… ▽ More

    Submitted 26 February, 2025; v1 submitted 9 July, 2024; originally announced July 2024.

    Comments: Work partially supported by the EU-funded project Sec4AI4Sec: Cybersecurity for AI-Augmented Systems (grant no. 101120393) - ACCEPTED at ACM Transactions on Software Engineering and Methodology (Feb. 2025)

  9. arXiv:2404.17332  [pdf, other

    cs.SE cs.CR

    Managing Security Evidence in Safety-Critical Organizations

    Authors: Mazen Mohamad, Jan-Philipp Steghöfer, Eric Knauss, Riccardo Scandariato

    Abstract: With the increasing prevalence of open and connected products, cybersecurity has become a serious issue in safety-critical domains such as the automotive industry. As a result, regulatory bodies have become more stringent in their requirements for cybersecurity, necessitating security assurance for products developed in these domains. In response, companies have implemented new or modified process… ▽ More

    Submitted 26 April, 2024; originally announced April 2024.

  10. arXiv:2403.06941  [pdf, other

    cs.SE

    Comparison of Static Analysis Architecture Recovery Tools for Microservice Applications

    Authors: Simon Schneider, Alexander Bakhtin, Xiaozhou Li, Jacopo Soldani, Antonio Brogi, Tomas Cerny, Riccardo Scandariato, Davide Taibi

    Abstract: Architecture recovery tools help software engineers obtain an overview of their software systems during all phases of the software development lifecycle. This is especially important for microservice applications because their distributed nature makes it more challenging to oversee the architecture. Various tools and techniques for this task are presented in academic and grey literature sources. P… ▽ More

    Submitted 11 March, 2024; originally announced March 2024.

  11. What Can Self-Admitted Technical Debt Tell Us About Security? A Mixed-Methods Study

    Authors: Nicolás E. Díaz Ferreyra, Mojtaba Shahin, Mansooreh Zahedi, Sodiq Quadri, Ricardo Scandariato

    Abstract: Self-Admitted Technical Debt (SATD) encompasses a wide array of sub-optimal design and implementation choices reported in software artefacts (e.g., code comments and commit messages) by developers themselves. Such reports have been central to the study of software maintenance and evolution over the last decades. However, they can also be deemed as dreadful sources of information on potentially exp… ▽ More

    Submitted 2 March, 2024; v1 submitted 23 January, 2024; originally announced January 2024.

    Comments: Accepted in the 21th International Conference on Mining Software Repositories (MSR '24)

  12. CATMA: Conformance Analysis Tool For Microservice Applications

    Authors: Clinton Cao, Simon Schneider, Nicolás E. Díaz Ferreyra, Sicco Verwer, Annibale Panichella, Riccardo Scandariato

    Abstract: The microservice architecture allows developers to divide the core functionality of their software system into multiple smaller services. However, this architectural style also makes it harder for them to debug and assess whether the system's deployment conforms to its implementation. We present CATMA, an automated tool that detects non-conformances between the system's deployment and implementati… ▽ More

    Submitted 23 January, 2024; v1 submitted 18 January, 2024; originally announced January 2024.

    Comments: 5 pages, 5 figures, ICSE '24 Demonstration Track

  13. arXiv:2401.04446  [pdf, other

    cs.SE

    How Dataflow Diagrams Impact Software Security Analysis: an Empirical Experiment

    Authors: Simon Schneider, Nicolás E. Díaz Ferreyra, Pierre-Jean Quéval, Georg Simhandl, Uwe Zdun, Riccardo Scandariato

    Abstract: Models of software systems are used throughout the software development lifecycle. Dataflow diagrams (DFDs), in particular, are well-established resources for security analysis. Many techniques, such as threat modelling, are based on DFDs of the analysed application. However, their impact on the performance of analysts in a security analysis setting has not been explored before. In this paper, we… ▽ More

    Submitted 9 January, 2024; originally announced January 2024.

  14. arXiv:2304.12769  [pdf, other

    cs.SE

    Automatic Extraction of Security-Rich Dataflow Diagrams for Microservice Applications written in Java

    Authors: Simon Schneider, Riccardo Scandariato

    Abstract: Dataflow diagrams (DFDs) are a valuable asset for securing applications, as they are the starting point for many security assessment techniques. Their creation, however, is often done manually, which is time-consuming and introduces problems concerning their correctness. Furthermore, as applications are continuously extended and modified in CI/CD pipelines, the DFDs need to be kept in sync, which… ▽ More

    Submitted 25 April, 2023; originally announced April 2023.

  15. arXiv:2303.09384  [pdf, other

    cs.SE cs.IR cs.LG

    LLMSecEval: A Dataset of Natural Language Prompts for Security Evaluations

    Authors: Catherine Tony, Markus Mutas, Nicolás E. Díaz Ferreyra, Riccardo Scandariato

    Abstract: Large Language Models (LLMs) like Codex are powerful tools for performing code completion and code generation tasks as they are trained on billions of lines of code from publicly available sources. Moreover, these models are capable of generating code snippets from Natural Language (NL) descriptions by learning languages and programming practices from public GitHub repositories. Although LLMs prom… ▽ More

    Submitted 16 March, 2023; originally announced March 2023.

    Comments: Accepted at MSR '23 Data and Tool Showcase Track

  16. Regret, Delete, (Do Not) Repeat: An Analysis of Self-Cleaning Practices on Twitter After the Outbreak of the COVID-19 Pandemic

    Authors: Nicolás E. Díaz Ferreyra, Gautam Kishore Shahi, Catherine Tony, Stefan Stieglitz, Riccardo Scandariato

    Abstract: During the outbreak of the COVID-19 pandemic, many people shared their symptoms across Online Social Networks (OSNs) like Twitter, hoping for others' advice or moral support. Prior studies have shown that those who disclose health-related information across OSNs often tend to regret it and delete their publications afterwards. Hence, deleted posts containing sensitive data can be seen as manifesta… ▽ More

    Submitted 16 March, 2023; originally announced March 2023.

    Comments: Accepted at CHI '23 Late Breaking Work (LBW)

  17. arXiv:2303.01822  [pdf, other

    cs.SE cs.HC cs.SI

    Developers Need Protection, Too: Perspectives and Research Challenges for Privacy in Social Coding Platforms

    Authors: Nicolás E. Díaz Ferreyra, Abdessamad Imine, Melina Vidoni, Riccardo Scandariato

    Abstract: Social Coding Platforms (SCPs) like GitHub have become central to modern software engineering thanks to their collaborative and version-control features. Like in mainstream Online Social Networks (OSNs) such as Facebook, users of SCPs are subjected to privacy attacks and threats given the high amounts of personal and project-related data available in their profiles and software repositories. Howev… ▽ More

    Submitted 3 March, 2023; originally announced March 2023.

    Comments: Accepted at the 16th International Conference on Cooperative and Human Aspects of Software Engineering (CHASE 2023)

  18. arXiv:2211.13498  [pdf, other

    cs.CR cs.LG cs.SE

    GitHub Considered Harmful? Analyzing Open-Source Projects for the Automatic Generation of Cryptographic API Call Sequences

    Authors: Catherine Tony, Nicolás E. Díaz Ferreyra, Riccardo Scandariato

    Abstract: GitHub is a popular data repository for code examples. It is being continuously used to train several AI-based tools to automatically generate code. However, the effectiveness of such tools in correctly demonstrating the usage of cryptographic APIs has not been thoroughly assessed. In this paper, we investigate the extent and severity of misuses, specifically caused by incorrect cryptographic API… ▽ More

    Submitted 24 November, 2022; originally announced November 2022.

    Comments: Accepted at QRS 2022

  19. arXiv:2207.01529  [pdf, other

    cs.HC cs.CR cs.SE cs.SI

    Cybersecurity Discussions in Stack Overflow: A Developer-Centred Analysis of Engagement and Self-Disclosure Behaviour

    Authors: Nicolás E. Díaz Ferreyra, Melina Vidoni, Maritta Heisel, Riccardo Scandariato

    Abstract: Stack Overflow (SO) is a popular platform among developers seeking advice on various software-related topics, including privacy and security. As for many knowledge-sharing websites, the value of SO depends largely on users' engagement, namely their willingness to answer, comment or post technical questions. Still, many of these questions (including cybersecurity-related ones) remain unanswered, pu… ▽ More

    Submitted 4 July, 2022; originally announced July 2022.

    Comments: Submitted for publication

  20. arXiv:2205.06200  [pdf, other

    cs.HC cs.CR cs.SE

    Conversational DevBots for Secure Programming: An Empirical Study on SKF Chatbot

    Authors: Catherine Tony, Mohana Balasubramanian, Nicolás E. Díaz Ferreyra, Riccardo Scandariato

    Abstract: Conversational agents or chatbots are widely investigated and used across different fields including healthcare, education, and marketing. Still, the development of chatbots for assisting secure coding practices is in its infancy. In this paper, we present the results of an empirical study on SKF chatbot, a software-development bot (DevBot) designed to answer queries about software security. To th… ▽ More

    Submitted 12 May, 2022; originally announced May 2022.

    Comments: Accepted paper at the 2022 International Conference on Evaluation and Assessment in Software Engineering (EASE)

  21. SoK: Security of Microservice Applications: A Practitioners' Perspective on Challenges and Best Practices

    Authors: Priyanka Billawa, Anusha Bambhore Tukaram, Nicolás E. Díaz Ferreyra, Jan-Philipp Steghöfer, Riccardo Scandariato, Georg Simhandl

    Abstract: Cloud-based application deployment is becoming increasingly popular among businesses, thanks to the emergence of microservices. However, securing such architectures is a challenging task since traditional security concepts cannot be directly applied to microservice architectures due to their distributed nature. The situation is exacerbated by the scattered nature of guidelines and best practices a… ▽ More

    Submitted 2 September, 2022; v1 submitted 3 February, 2022; originally announced February 2022.

    Comments: Accepted at the 17th International Conference on Availability, Reliability and Security (ARES 2022)

    ACM Class: D.4.6

  22. Checking Security Compliance between Models and Code

    Authors: Katja Tuma, Sven Peldszus, Daniel Strüber, Riccardo Scandariato, Jan Jürjens

    Abstract: It is challenging to verify that the planned security mechanisms are actually implemented in the software. In the context of model-based development, the implemented security mechanisms must capture all intended security properties that were considered in the design models. Assuring this compliance manually is labor intensive and can be error-prone. This work introduces the first semi-automatic te… ▽ More

    Submitted 18 March, 2022; v1 submitted 19 August, 2021; originally announced August 2021.

  23. arXiv:2103.03331  [pdf, other

    cs.SE

    Secure Software Development in the Era of Fluid Multi-party Open Software and Services

    Authors: Ivan Pashchenko, Riccardo Scandariato, Antonino Sabetta, Fabio Massacci

    Abstract: Pushed by market forces, software development has become fast-paced. As a consequence, modern development projects are assembled from 3rd-party components. Security & privacy assurance techniques once designed for large, controlled updates over months or years, must now cope with small, continuous changes taking place within a week, and happening in sub-components that are controlled by third-part… ▽ More

    Submitted 4 March, 2021; originally announced March 2021.

    Comments: 7 pages, 1 figure, to be published in Proceedings of International Conference on Software Engineering - New Ideas and Emerging Results

    ACM Class: D.2.0; D.2.13

  24. arXiv:2006.04098  [pdf, other

    cs.CR cs.SE

    Contextualisation of Data Flow Diagrams for security analysis

    Authors: Shamal Faily, Riccardo Scandariato, Adam Shostack, Laurens Sion, Duncan Ki-Aries

    Abstract: Data flow diagrams (DFDs) are popular for sketching systems for subsequent threat modelling. Their limited semantics make reasoning about them difficult, but enriching them endangers their simplicity and subsequent ease of take up. We present an approach for reasoning about tainted data flows in design-level DFDs by putting them in context with other complementary usability and requirements models… ▽ More

    Submitted 7 June, 2020; originally announced June 2020.

    Comments: Workshop pre-print

  25. arXiv:2003.14151  [pdf, other

    cs.SE

    Security Assurance Cases -- State of the Art of an Emerging Approach

    Authors: Mazen Mohamad, Jan-Philipp Steghöfer, Riccardo Scandariato

    Abstract: Security Assurance Cases (SAC) are a form of structured argumentation used to reason about the security properties of a system. After the successful adoption of assurance cases for safety, SACs are getting significant traction in recent years, especially in safety-critical industries (e.g., automotive), where there is an increasing pressure to be compliant with several security standards and regul… ▽ More

    Submitted 31 March, 2020; originally announced March 2020.

  26. arXiv:2003.14134  [pdf, other

    cs.SE

    Cross-project Classification of Security-related Requirements

    Authors: Mazen Mohamad, Jan-Philipp Steghöfer, Riccardo Scandariato

    Abstract: We investigate the feasibility of using a classifier for security-related requirements trained on requirement specifications available online. This is helpful in case different requirement types are not differentiated in a large existing requirement specification. Our work is motivated by the need to identify security requirements for the creation of security assurance cases that become a necessit… ▽ More

    Submitted 31 March, 2020; originally announced March 2020.

  27. arXiv:2003.14106  [pdf, other

    cs.SE

    Security Assurance Cases for Road Vehicles: an Industry Perspective

    Authors: Mazen Mohamad, Alexander Åström, Örjan Askerdal, Jörgen Borg, Riccardo Scandariato

    Abstract: Assurance cases are structured arguments that are commonly used to reason about the safety of a product or service. Currently, there is an ongoing push towards using assurance cases for also cybersecurity, especially in safety-critical domains, like automotive. While the industry is faced with the challenge of defining a sound methodology to build security assurance cases, the state of the art is… ▽ More

    Submitted 31 March, 2020; originally announced March 2020.

  28. arXiv:2001.02553  [pdf, other

    cs.SE cs.AI cs.HC

    Perception and Acceptance of an Autonomous Refactoring Bot

    Authors: Marvin Wyrich, Regina Hebig, Stefan Wagner, Riccardo Scandariato

    Abstract: The use of autonomous bots for automatic support in software development tasks is increasing. In the past, however, they were not always perceived positively and sometimes experienced a negative bias compared to their human counterparts. We conducted a qualitative study in which we deployed an autonomous refactoring bot for 41 days in a student software development project. In between and at the e… ▽ More

    Submitted 8 January, 2020; originally announced January 2020.

    Comments: 8 pages, 2 figures. To be published at 12th International Conference on Agents and Artificial Intelligence (ICAART 2020)

  29. arXiv:1910.03422  [pdf, other

    cs.SE

    Finding Security Threats That Matter: An Industrial Case Study

    Authors: Katja Tuma, Christian Sandberg, Urban Thorsson, Mathias Widman, Riccardo Scandariato

    Abstract: Recent trends in the software engineering (i.e., Agile, DevOps) have shortened the development life-cycle limiting resources spent on security analysis of software designs. In this context, architecture models are (often manually) analyzed for potential security threats. Risk-last threat analysis suggests identifying all security threats before prioritizing them. In contrast, risk-first threat ana… ▽ More

    Submitted 8 October, 2019; originally announced October 2019.

  30. arXiv:1906.01961  [pdf, other

    cs.SE

    Inspection Guidelines to Identify Security Design Flaws

    Authors: Katja Tuma, Danial Hosseini, Kyriakos Malamas, Riccardo Scandariato

    Abstract: Recent trends in the software development practices (Agile, DevOps, CI) have shortened the development life-cycle causing the need for efficient security-by-design approaches. In this context, software architectures are analyzed for potential vulnerabilities and design flaws. Yet, design flaws are often documented with natural language and require a manual analysis, which is inefficient. Besides l… ▽ More

    Submitted 5 June, 2019; originally announced June 2019.