Zum Hauptinhalt springen

Showing 1–6 of 6 results for author: Okutan, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2307.05605  [pdf, other

    cs.SE

    A Novel Approach to Identify Security Controls in Source Code

    Authors: Ahmet Okutan, Ali Shokri, Viktoria Koscinski, Mohamad Fazelinia, Mehdi Mirakhorli

    Abstract: Secure by Design has become the mainstream development approach ensuring that software systems are not vulnerable to cyberattacks. Architectural security controls need to be carefully monitored over the software development life cycle to avoid critical design flaws. Unfortunately, functional requirements usually get in the way of the security features, and the development team may not correctly ad… ▽ More

    Submitted 10 July, 2023; originally announced July 2023.

  2. arXiv:2211.05075  [pdf, other

    cs.CR

    Supporting AI/ML Security Workers through an Adversarial Techniques, Tools, and Common Knowledge (AI/ML ATT&CK) Framework

    Authors: Mohamad Fazelnia, Ahmet Okutan, Mehdi Mirakhorli

    Abstract: This paper focuses on supporting AI/ML Security Workers -- professionals involved in the development and deployment of secure AI-enabled software systems. It presents AI/ML Adversarial Techniques, Tools, and Common Knowledge (AI/ML ATT&CK) framework to enable AI/ML Security Workers intuitively to explore offensive and defensive tactics.

    Submitted 9 November, 2022; originally announced November 2022.

    Comments: AI/ML ATT&CK

  3. arXiv:2112.01635  [pdf

    cs.SE

    A Grounded Theory Based Approach to Characterize Software Attack Surfaces

    Authors: Sara Moshtari, Ahmet Okutan, Mehdi Mirakhorli

    Abstract: The notion of Attack Surface refers to the critical points on the boundary of a software system which are accessible from outside or contain valuable content for attackers. The ability to identify attack surface components of software system has a significant role in effectiveness of vulnerability analysis approaches. Most prior works focus on vulnerability techniques that use an approximation of… ▽ More

    Submitted 30 March, 2022; v1 submitted 2 December, 2021; originally announced December 2021.

    Comments: This paper has been accepted in the IEEE/ACM International Conference on Software Engineering (ICSE 2022) and is going to be published. Please feel free to cite it

  4. arXiv:2103.13902  [pdf, other

    cs.CR

    Near Real-time Learning and Extraction of Attack Models from Intrusion Alerts

    Authors: Shanchieh Jay Yang, Ahmet Okutan, Gordon Werner, Shao-Hsuan Su, Ayush Goel, Nathan D. Cahill

    Abstract: Critical and sophisticated cyberattacks often take multitudes of reconnaissance, exploitations, and obfuscation techniques to penetrate through well protected enterprise networks. The discovery and detection of attacks, though needing continuous efforts, is no longer sufficient. Security Operation Center (SOC) analysts are overwhelmed by the significant volume of intrusion alerts without being abl… ▽ More

    Submitted 25 March, 2021; originally announced March 2021.

  5. arXiv:1808.10033  [pdf, other

    cs.SE

    Use of Source Code Similarity Metrics in Software Defect Prediction

    Authors: Ahmet Okutan

    Abstract: In recent years, defect prediction has received a great deal of attention in the empirical software engineering world. Predicting software defects before the maintenance phase is very important not only to decrease the maintenance costs but also increase the overall quality of a software product. There are different types of product, process, and developer based software metrics proposed so far to… ▽ More

    Submitted 29 August, 2018; originally announced August 2018.

    Comments: A novel approach that uses source code similarity metrics for Software Defect Prediction

  6. arXiv:1803.09560  [pdf, other

    cs.CR

    Forecasting Cyber Attacks with Imbalanced Data Sets and Different Time Granularities

    Authors: Ahmet Okutan, Shanchieh Jay Yang, Katie McConky

    Abstract: If cyber incidents are predicted a reasonable amount of time before they occur, defensive actions to prevent their destructive effects could be planned. Unfortunately, most of the time we do not have enough observables of the malicious activities before they are already under way. Therefore, this work suggests to use unconventional signals extracted from various data sources with different time gr… ▽ More

    Submitted 26 March, 2018; originally announced March 2018.