Zum Hauptinhalt springen

Showing 1–7 of 7 results for author: Shar, L K

Searching in archive cs. Search in all archives.
.
  1. arXiv:2408.07321  [pdf, other

    cs.SE cs.CR

    LLM-Enhanced Static Analysis for Precise Identification of Vulnerable OSS Versions

    Authors: Yiran Cheng, Lwin Khin Shar, Ting Zhang, Shouguo Yang, Chaopeng Dong, David Lo, Shichao Lv, Zhiqiang Shi, Limin Sun

    Abstract: Open-source software (OSS) has experienced a surge in popularity, attributed to its collaborative development model and cost-effective nature. However, the adoption of specific software versions in development projects may introduce security risks when these versions bring along vulnerabilities. Current methods of identifying vulnerable versions typically analyze and trace the code involved in vul… ▽ More

    Submitted 14 August, 2024; originally announced August 2024.

  2. arXiv:2407.16893  [pdf, other

    cs.CY cs.AI cs.CL

    The Price of Prompting: Profiling Energy Use in Large Language Models Inference

    Authors: Erik Johannes Husom, Arda Goknil, Lwin Khin Shar, Sagar Sen

    Abstract: In the rapidly evolving realm of artificial intelligence, deploying large language models (LLMs) poses increasingly pressing computational and environmental challenges. This paper introduces MELODI - Monitoring Energy Levels and Optimization for Data-driven Inference - a multifaceted framework crafted to monitor and analyze the energy consumed during LLM inference processes. MELODI enables detaile… ▽ More

    Submitted 4 July, 2024; originally announced July 2024.

    Comments: 11 pages, 5 figures. Submitted to NeurIPS 2024. The released code and dataset are available at https://github.com/ejhusom/MELODI

  3. arXiv:2404.07527  [pdf, other

    cs.CR

    Security Modelling for Cyber-Physical Systems: A Systematic Literature Review

    Authors: Shaofei Huang, Christopher M. Poskitt, Lwin Khin Shar

    Abstract: Cyber-physical systems (CPS) are at the intersection of digital technology and engineering domains, rendering them high-value targets of sophisticated and well-funded cybersecurity threat actors. Prominent cybersecurity attacks on CPS have brought attention to the vulnerability of these systems, and the soft underbelly of critical infrastructure reliant on CPS. Security modelling for CPS is an imp… ▽ More

    Submitted 11 April, 2024; originally announced April 2024.

    Comments: Preprint under submission

  4. Decentralized Multimedia Data Sharing in IoV: A Learning-based Equilibrium of Supply and Demand

    Authors: Jiani Fan, Minrui Xu, Jiale Guo, Lwin Khin Shar, Jiawen Kang, Dusit Niyato, Kwok-Yan Lam

    Abstract: The Internet of Vehicles (IoV) has great potential to transform transportation systems by enhancing road safety, reducing traffic congestion, and improving user experience through onboard infotainment applications. Decentralized data sharing can improve security, privacy, reliability, and facilitate infotainment data sharing in IoVs. However, decentralized data sharing may not achieve the expected… ▽ More

    Submitted 29 March, 2024; originally announced March 2024.

    Journal ref: IEEE Transactions on Vehicular Technology (Volume: 73, Issue: 3, March 2024)

  5. Differentiated Security Architecture for Secure and Efficient Infotainment Data Communication in IoV Networks

    Authors: Jiani Fan, Lwin Khin Shar, Jiale Guo, Wenzhuo Yang, Dusit Niyato, Kwok-Yan Lam

    Abstract: This paper aims to provide differentiated security protection for infotainment data communication in Internet-of-Vehicle (IoV) networks. The IoV is a network of vehicles that uses various sensors, software, built-in hardware, and communication technologies to enable information exchange between pedestrians, cars, and urban infrastructure. Negligence on the security of infotainment data communicati… ▽ More

    Submitted 29 March, 2024; originally announced March 2024.

    Comments: 16th International Conference on Network and System Security

  6. arXiv:2204.12416  [pdf, other

    cs.CR cs.CY cs.SE

    XSS for the Masses: Integrating Security in a Web Programming Course using a Security Scanner

    Authors: Lwin Khin Shar, Christopher M. Poskitt, Kyong Jin Shim, Li Ying Leonard Wong

    Abstract: Cybersecurity education is considered an important part of undergraduate computing curricula, but many institutions teach it only in dedicated courses or tracks. This optionality risks students graduating with limited exposure to secure coding practices that are expected in industry. An alternative approach is to integrate cybersecurity concepts across non-security courses, so as to expose student… ▽ More

    Submitted 26 April, 2022; originally announced April 2022.

    Comments: Accepted by the 27th annual conference on Innovation and Technology in Computer Science Education (ITiCSE 2022)

    Journal ref: Proc. ITiCSE'22, pages 463-469. ACM, 2022

  7. AnFlo: Detecting Anomalous Sensitive Information Flows in Android Apps

    Authors: Biniam Fisseha Demissie, Mariano Ceccato, Lwin Khin Shar

    Abstract: Smartphone apps usually have access to sensitive user data such as contacts, geo-location, and account credentials and they might share such data to external entities through the Internet or with other apps. Confidentiality of user data could be breached if there are anomalies in the way sensitive data is handled by an app which is vulnerable or malicious. Existing approaches that detect anomalous… ▽ More

    Submitted 19 December, 2018; originally announced December 2018.

    Journal ref: Proceedings of the 5th International Conference on Mobile Software Engineering and Systems. ACM, 2018