Zum Hauptinhalt springen

Showing 1–17 of 17 results for author: Cito, J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.02106  [pdf, ps, other

    cs.CR

    Got Root? A Linux Priv-Esc Benchmark

    Authors: Andreas Happe, Jürgen Cito

    Abstract: Linux systems are integral to the infrastructure of modern computing environments, necessitating robust security measures to prevent unauthorized access. Privilege escalation attacks represent a significant threat, typically allowing attackers to elevate their privileges from an initial low-privilege account to the all-powerful root account. A benchmark set of vulnerable systems is of high impor… ▽ More

    Submitted 6 May, 2024; v1 submitted 3 May, 2024; originally announced May 2024.

    Comments: arXiv admin note: text overlap with arXiv:2310.11409

  2. arXiv:2402.15632  [pdf, other

    cs.SE

    Statically Inferring Usage Bounds for Infrastructure as Code

    Authors: Feitong Qiao, Aryana Mohammadi, Jürgen Cito, Mark Santolucito

    Abstract: Infrastructure as Code (IaC) has enabled cloud customers to have more agility in creating and modifying complex deployments of cloud-provisioned resources. By writing a configuration in IaC languages such as CloudFormation, users can declaratively specify their infrastructure and CloudFormation will handle the creation of the resources. However, understanding the complexity of IaC deployments has… ▽ More

    Submitted 23 February, 2024; originally announced February 2024.

  3. arXiv:2310.11409  [pdf, other

    cs.CR cs.AI

    LLMs as Hackers: Autonomous Linux Privilege Escalation Attacks

    Authors: Andreas Happe, Aaron Kaplan, Juergen Cito

    Abstract: Penetration testing, an essential component of software security testing, allows organizations to identify and remediate vulnerabilities in their systems, thus bolstering their defense mechanisms against cyberattacks. One recent advancement in the realm of penetration testing is the utilization of Language Models (LLMs). We explore the intersection of LLMs and penetration testing to gain insight i… ▽ More

    Submitted 1 August, 2024; v1 submitted 17 October, 2023; originally announced October 2023.

    Comments: 12 pages

  4. Understanding Hackers' Work: An Empirical Study of Offensive Security Practitioners

    Authors: Andreas Happe, Jürgen Cito

    Abstract: Offensive security-tests are a common way to pro-actively discover potential vulnerabilities. They are performed by specialists, often called penetration-testers or white-hat hackers. The chronic lack of available white-hat hackers prevents sufficient security test coverage of software. Research into automation tries to alleviate this problem by improving the efficiency of security testing. To ach… ▽ More

    Submitted 23 August, 2023; v1 submitted 14 August, 2023; originally announced August 2023.

  5. arXiv:2308.00121  [pdf, other

    cs.CL cs.AI cs.CR cs.SE

    Getting pwn'd by AI: Penetration Testing with Large Language Models

    Authors: Andreas Happe, Jürgen Cito

    Abstract: The field of software security testing, more specifically penetration testing, is an activity that requires high levels of expertise and involves many manual testing and analysis steps. This paper explores the potential usage of large-language models, such as GPT3.5, to augment penetration testers with AI sparring partners. We explore the feasibility of supplementing penetration testers with AI mo… ▽ More

    Submitted 17 August, 2023; v1 submitted 24 July, 2023; originally announced August 2023.

  6. arXiv:2304.09733  [pdf, ps, other

    cs.SE

    An Exploratory Study of Ad Hoc Parsers in Python

    Authors: Michael Schröder, Marc Goritschnig, Jürgen Cito

    Abstract: Background: Ad hoc parsers are pieces of code that use common string functions like split, trim, or slice to effectively perform parsing. Whether it is handling command-line arguments, reading configuration files, parsing custom file formats, or any number of other minor string processing tasks, ad hoc parsing is ubiquitous -- yet poorly understood. Objective: This study aims to reveal the commo… ▽ More

    Submitted 19 April, 2023; originally announced April 2023.

    Comments: 5 pages, accepted as a registered report for MSR 2023 with Continuity Acceptance (CA)

  7. arXiv:2208.04351  [pdf, other

    cs.SE cs.LG

    Learning to Learn to Predict Performance Regressions in Production at Meta

    Authors: Moritz Beller, Hongyu Li, Vivek Nair, Vijayaraghavan Murali, Imad Ahmad, Jürgen Cito, Drew Carlson, Ari Aye, Wes Dyer

    Abstract: Catching and attributing code change-induced performance regressions in production is hard; predicting them beforehand, even harder. A primer on automatically learning to predict performance regressions in software, this article gives an account of the experiences we gained when researching and deploying an ML-based regression prediction pipeline at Meta. In this paper, we report on a comparative… ▽ More

    Submitted 22 May, 2023; v1 submitted 8 August, 2022; originally announced August 2022.

  8. Grammars for Free: Toward Grammar Inference for Ad Hoc Parsers

    Authors: Michael Schröder, Jürgen Cito

    Abstract: Ad hoc parsers are everywhere: they appear any time a string is split, looped over, interpreted, transformed, or otherwise processed. Every ad hoc parser gives rise to a language: the possibly infinite set of input strings that the program accepts without going wrong. Any language can be described by a formal grammar: a finite set of rules that can generate all strings of that language. But progra… ▽ More

    Submitted 2 February, 2022; originally announced February 2022.

    Journal ref: 2022 IEEE/ACM 44th International Conference on Software Engineering: New Ideas and Emerging Results (ICSE-NIER)

  9. arXiv:2111.05711  [pdf, other

    cs.SE cs.AI cs.LG

    Counterfactual Explanations for Models of Code

    Authors: Jürgen Cito, Isil Dillig, Vijayaraghavan Murali, Satish Chandra

    Abstract: Machine learning (ML) models play an increasingly prevalent role in many software engineering tasks. However, because most models are now powered by opaque deep neural networks, it can be difficult for developers to understand why the model came to a certain conclusion and how to act upon the model's prediction. Motivated by this problem, this paper explores counterfactual explanations for models… ▽ More

    Submitted 10 November, 2021; originally announced November 2021.

    Comments: 10 pages, 6 listings, 2 algorithms, 2 tables, 1 figure

  10. arXiv:2105.02023  [pdf, other

    cs.SE

    Interactive Static Software Performance Analysis in the IDE

    Authors: Aaron Beigelbeck, Maurício Aniche, Jürgen Cito

    Abstract: Detecting performance issues due to suboptimal code during the development process can be a daunting task, especially when it comes to localizing them after noticing performance degradation after deployment. Static analysis has the potential to provide early feedback on performance problems to developers without having to run profilers with expensive (and often unavailable) performance tests. We d… ▽ More

    Submitted 4 May, 2021; originally announced May 2021.

  11. arXiv:2103.15787  [pdf, other

    cs.HC

    Meeting in the notebook: a notebook-based environment for micro-submissions in data science collaborations

    Authors: Micah J. Smith, Jürgen Cito, Kalyan Veeramachaneni

    Abstract: Developers in data science and other domains frequently use computational notebooks to create exploratory analyses and prototype models. However, they often struggle to incorporate existing software engineering tooling into these notebook-based workflows, leading to fragile development processes. We introduce Assemblé, a new development environment for collaborative data science projects, in which… ▽ More

    Submitted 29 March, 2021; originally announced March 2021.

  12. An Empirical Investigation of Command-Line Customization

    Authors: Michael Schröder, Jürgen Cito

    Abstract: The interactive command line, also known as the shell, is a prominent mechanism used extensively by a wide range of software professionals (engineers, system administrators, data scientists, etc.). Shell customizations can therefore provide insight into the tasks they repeatedly perform, how well the standard environment supports those tasks, and ways in which the environment could be productively… ▽ More

    Submitted 6 August, 2021; v1 submitted 18 December, 2020; originally announced December 2020.

    Journal ref: Empir Software Eng 27, 30 (2022)

  13. arXiv:2012.07816  [pdf, other

    cs.LG cs.HC cs.SE

    Enabling Collaborative Data Science Development with the Ballet Framework

    Authors: Micah J. Smith, Jürgen Cito, Kelvin Lu, Kalyan Veeramachaneni

    Abstract: While the open-source software development model has led to successful large-scale collaborations in building software systems, data science projects are frequently developed by individuals or small teams. We describe challenges to scaling data science collaborations and present a conceptual framework and ML programming model to address them. We instantiate these ideas in Ballet, a lightweight fra… ▽ More

    Submitted 22 October, 2021; v1 submitted 14 December, 2020; originally announced December 2020.

    Journal ref: Proc. ACM Hum.-Comput. Interact. 5, CSCW2, Article 431 (October 2021), 39 pages

  14. arXiv:1907.06535  [pdf, other

    cs.SE cs.HC

    Characterizing Developer Use of Automatically Generated Patches

    Authors: José Pablo Cambronero, Jiasi Shen, Jürgen Cito, Elena Glassman, Martin Rinard

    Abstract: We present a study that characterizes the way developers use automatically generated patches when fixing software defects. Our study tasked two groups of developers with repairing defects in C programs. Both groups were provided with the defective line of code. One was also provided with five automatically generated and validated patches, all of which modified the defective line of code, and one o… ▽ More

    Submitted 22 November, 2019; v1 submitted 15 July, 2019; originally announced July 2019.

  15. arXiv:1411.2429  [pdf, other

    cs.DC

    Patterns in the Chaos - a Study of Performance Variation and Predictability in Public IaaS Clouds

    Authors: Philipp Leitner, Juergen Cito

    Abstract: Benchmarking the performance of public cloud providers is a common research topic. Previous research has already extensively evaluated the performance of different cloud platforms for different use cases, and under different constraints and experiment setups. In this paper, we present a principled, large-scale literature review to collect and codify existing research regarding the predictability o… ▽ More

    Submitted 19 January, 2016; v1 submitted 10 November, 2014; originally announced November 2014.

  16. arXiv:1409.6502  [pdf, other

    cs.SE

    The Making of Cloud Applications An Empirical Study on Software Development for the Cloud

    Authors: Jürgen Cito, Philipp Leitner, Thomas Fritz, Harald C. Gall

    Abstract: Cloud computing is gaining more and more traction as a deployment and provisioning model for software. While a large body of research already covers how to optimally operate a cloud system, we still lack insights into how professional software engineers actually use clouds, and how the cloud impacts development practices. This paper reports on the first systematic study on how software developers… ▽ More

    Submitted 17 March, 2015; v1 submitted 23 September, 2014; originally announced September 2014.

  17. arXiv:1408.4565  [pdf, other

    cs.SE

    Cloud WorkBench - Infrastructure-as-Code Based Cloud Benchmarking

    Authors: Joel Scheuner, Philipp Leitner, Jurgen Cito, Harald Gall

    Abstract: To optimally deploy their applications, users of Infrastructure-as-a-Service clouds are required to evaluate the costs and performance of different combinations of cloud configurations to find out which combination provides the best service level for their specific application. Unfortunately, benchmarking cloud services is cumbersome and error-prone. In this paper, we propose an architecture and c… ▽ More

    Submitted 20 August, 2014; originally announced August 2014.