Publications

2025

31. Raffa G; Blasco J; O'Keeffe D; Dash S K: CloudFlow: Identifying Security-sensitive Data Flows in Serverless Applications. Usenix Security 2025, Forthcoming. (Type: Conference | BibTeX)
30. Butler A; O'Keeffe D; Dash S K: Links Between Package Popularity, Criticality, and Security in Software Ecosystems. In: IEEE International Conference on Software Analysis, Evolution and Reengineering - Companion (SANER-C), pp. 89 - 97, 2025. (Type: Inproceedings | Links | BibTeX)

2024

29. Tileria M; Blasco J; Dash S K: DocFlow: Extracting Taint Specifications from Software Documentation. In: Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, ICSE 2024, Lisbon, Portugal, April 14-20, 2024, pp. 61:1–61:12, ACM, 2024. (Type: Inproceedings | Links | BibTeX)
28. Tereszkowski-Kaminski M; Dash S K; Suarez-Tangil G: A Study of Malicious Source Code Reuse Among GitHub, StackOverflow and Underground Forums. In: García-Alfaro, Joaquín; Kozik, Rafal; Choras, Michal; Katsikas, Sokratis K. (Ed.): Computer Security - ESORICS 2024 - 29th European Symposium on Research in Computer Security, Bydgoszcz, Poland, September 16-20, 2024, Proceedings, Part III, pp. 45–66, Springer, 2024. (Type: Inproceedings | Links | BibTeX)
27. Petrescu C C; Smith S; Butler A; Dash S K: Checking Test Suite Efficacy Through Dual-Channel Techniques. In: Testing Software and Systems - 36th IFIP WG 6.1 International Conference, ICTSS 2024, London, UK, October 30 - November 1, 2024, Proceedings, pp. 275–291, Springer, 2024. (Type: Inproceedings | Links | BibTeX)
26. Raffa G; Blasco J; O'Keeffe D; Dash S K: Towards Inter-Service Data Flow Analysis of Serverless Applications. In: 2024 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER), pp. 654-658, 2024. (Type: Inproceedings | Links | BibTeX)

2023

25. Petrescu C C; Smith S; Giavrimis R; Dash S K: Do Names echo Semantics? A Large-Scale Study of Identifiers used in C++'s Named Casts. In: Journal of Systems and Software, vol. 202, iss. C, 2023, (Selected for presentation at 2023 ESEM Journal-First Papers). (Type: Journal Article | BibTeX)
24. Raffa G; Alís J B; O'Keeffe D; Dash S K: AWSomePy: A Dataset and Characterization of Serverless Applications. In: Proceedings of the 1st Workshop on SErverless Systems, Applications and MEthodologies, SESAME 2023, Rome, Italy, 8 May 2023, pp. 50–56, ACM, 2023. (Type: Inproceedings | Links | BibTeX)

2021

23. Giavrimis R; Butler A; Petrescu C C; Basios M; Dash S K: Genetic Optimisation of C++ Applications. Automated Software Engineering (ASE), Late Breaking Results Track, 2021. (Type: Conference | BibTeX)

2020

22. Pârtachi P; Dash S K; Allamanis M; Barr E T: Flexeme: Untangling Commits Using Lexical Flows. 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, ESEC/FSE '20 ACM, 2020. (Type: Conference | Links | BibTeX)
21. Pârtachi P; Dash S K; Treude C; Barr E T: POSIT: Simultaneously Tagging Natural and Programming Languages. ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June - 19 July, 2020, ACM, 2020. (Type: Conference | Links | BibTeX)
20. Louis A; Dash S K; Barr E T; Ernst M D; Sutton C: Where Should I Comment My Code?: A Dataset and Model for Predicting Locations that need Comments. ICSE-NIER 2020: 42nd International Conference on Software Engineering, New Ideas and Emerging Results, Seoul, South Korea, 27 June - 19 July, 2020, ACM, 2020. (Type: Conference | Links | BibTeX)
19. Casalnuovo C; Barr E T; Dash S K; Devanbu P; Morgan E: A Theory of Dual Channel Constraints. 42nd International Conference on Software Engineering, New Ideas and Emerging Results (ICSE-NIER 2020) ACM, 2020. (Type: Conference | Links | BibTeX)
18. Dash S K; Wu F; Basios M; Li L; Kanthan L: Checkers: Multi-modal Darwinian API Optimisation. ICSE '20: 42nd International Conference on Software Engineering, Workshops, Seoul, Republic of Korea, 27 June - 19 July, 2020, ACM, 2020. (Type: Workshop | Links | BibTeX)

2019

17. Louis A; Dash S K; Barr E T; Sutton C: Deep Learning to Detect Redundant Method Comments. 2019. (Type: Technical Report | BibTeX)

2018

16. Guillermo Suarez-Tangil P G: Anomaly-based exploratory analysis and detection of exploits in android mediaserver. In: IET Information Security, vol. 12, iss. 5, pp. 404-413(9), 2018. (Type: Journal Article | BibTeX)
15. Suarez-Tangil P G S K D G: Anomaly-based exploratory analysis and detection of exploits in android mediaserver. In: IET Information Security, vol. 12, iss. 5, pp. 404-413(9), 2018. (Type: Journal Article | BibTeX)
14. Dash S K; Allamanis M; Barr E T: RefiNym: Using Names to Refine Types. 26th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, ESEC/FSE'18 2018. (Type: Conference | BibTeX)

2017

13. Jordaney R; Sharad K; Dash S K; Wang Z; Papini D; Nouretdinov I; Cavallaro L: Transcend: Detecting Concept Drift in Malware Classification Models. 26th USENIX Security Symposium (USENIX Security 17), USENIX Association, 2017. (Type: Conference | BibTeX)
12. Suarez-Tangil G; Dash S K; Ahmadi M; Kinder J; Giacinto G; Cavallaro L: DroidSieve: Fast and Accurate Classification of Obfuscated Android Malware. Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy, CODASPY '17 2017. (Type: Conference | BibTeX)
11. Hurier M; Suarez-Tangil G; Dash S K; Bissyandé T F; Traon Y L; Klein J; Cavallaro L: Euphony: Harmonious Unification of Cacophonous Anti-virus Vendor Labels for Android Malware. Proceedings of the 14th International Conference on Mining Software Repositories, MSR '17 2017, (textbf[CORE A]). (Type: Conference | BibTeX)

2016

10. Dash S K; Suarez-Tangil G; Khan S; Tam K; Ahmadi M; Kinder J; Cavallaro L: DroidScribe: Classifying Android Malware Based on Runtime Behavior. In: Mobile Security Technologies (MoST 2016), vol. 7148, pp. 1–12, 2016. (Type: Journal Article | BibTeX)
9. Deo A; Dash S K; Suarez-Tangil G; Vovk V; Cavallaro L: Prescience: Probabilistic Guidance on the Retraining Conundrum for Malware Detection. In: Artificial Intelligence and Security (AISec 2016), 2016. (Type: Journal Article | BibTeX)

2015

8. Dash S K: Adaptive Constraint Solving for Information Flow Analysis. University of Hertfordshire, 2015. (Type: PhD Thesis | BibTeX)

2013

7. Dash S K; Scholz S; Christianson B: Modular design of data-parallel graph algorithms. High Performance Computing and Simulation (HPCS), 2013 International Conference on, IEEE 2013. (Type: Conference | BibTeX)
6. Dash S K; Scholz S; Herhut S; Christianson B: A scalable approach to computing representative lowest common ancestor in directed acyclic graphs. In: Theoretical Computer Science, vol. 513, pp. 25–37, 2013, (textbf[CORE A]). (Type: Journal Article | BibTeX)

2010

5. Dash S K; Srikanthan T: Instruction cache tuning for embedded multitasking applications. In: IET computers & digital techniques, vol. 4, no. 6, pp. 439–457, 2010. (Type: Journal Article | BibTeX)

2009

4. Dash S K: Profile driven schemes for energy-sensitive cache hierarchy. Nanyang Technological University, 2009. (Type: Masters Thesis | BibTeX)
3. Dash S K; Srikanthan T: Instruction Cache Tuning for Embedded Multitasking Applications. IEEE/IFIP International Symposium on Rapid System Prototyping, IEEE 2009. (Type: Conference | BibTeX)
2. Dash S K; Srikanthan T: Modeling RTOS Components for Instruction Cache Hit Rate Estimation. 2009 IEEE International Symposium on Circuits and Systems, IEEE 2009. (Type: Conference | BibTeX)

2008

1. Dash S K; Srikanthan T: Rapid estimation of instruction cache hit rates using loop profiling. 2008 International Conference on Application-Specific Systems, Architectures and Processors, IEEE 2008. (Type: Conference | BibTeX)