{"id":28,"date":"2014-11-27T15:11:34","date_gmt":"2014-11-27T15:11:34","guid":{"rendered":"http:\/\/sdash.isg.rhul.ac.uk\/?page_id=28"},"modified":"2025-06-26T15:09:33","modified_gmt":"2025-06-26T15:09:33","slug":"publications","status":"publish","type":"page","link":"https:\/\/santanu.uk\/index.php\/publications\/","title":{"rendered":"Publications"},"content":{"rendered":"<div class=\"teachpress_pub_list\"><form name=\"tppublistform\" method=\"get\"><a name=\"tppubs\" id=\"tppubs\"><\/a><\/form><table class=\"teachpress_publication_list\"><tr>\r\n                    <td colspan=\"2\">\r\n                        <h3 class=\"tp_h3\" id=\"tp_h3_2025\">2025<\/h3>\r\n                    <\/td>\r\n                <\/tr><tr class=\"tp_publication_simple tp_publication_simple_conference\"><td class=\"tp_pub_number_simple\">31.<\/td><td class=\"tp_pub_info_simple\"><span class=\"tp_pub_author_simple\"> Raffa G;  Blasco J;  O'Keeffe D;  Dash S K<\/span>: <span class=\"tp_pub_title_simple\">CloudFlow: Identifying Security-sensitive Data Flows in Serverless Applications<\/span>. <span class=\"tp_pub_additional_simple\"><span class=\"tp_pub_additional_booktitle\">Usenix Security 2025, <\/span>Forthcoming.<\/span> <span class=\"tp_pub_menu_simple\">(Type: <span class=\"tp_pub_type conference\">Conference<\/span> | <span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_34\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('34','tp_bibtex')\" title=\"Show BibTeX entry\" style=\"cursor:pointer;\">BibTeX<\/a><\/span>)<\/span><div class=\"tp_bibtex\" id=\"tp_bibtex_34\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@conference{giuseppe_usenix,<br \/>\r\ntitle = {CloudFlow: Identifying Security-sensitive Data Flows in Serverless Applications},<br \/>\r\nauthor = {Giuseppe Raffa and Jorge Blasco and Dan O'Keeffe and Santanu Kumar Dash},<br \/>\r\nyear  = {2025},<br \/>\r\ndate = {2025-06-26},<br \/>\r\nurldate = {2025-06-26},<br \/>\r\nbooktitle = {Usenix Security 2025},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {forthcoming},<br \/>\r\ntppubtype = {conference}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('34','tp_bibtex')\">Close<\/a><\/p><\/div><\/td><\/tr><tr class=\"tp_publication_simple tp_publication_simple_inproceedings\"><td class=\"tp_pub_number_simple\">30.<\/td><td class=\"tp_pub_info_simple\"><span class=\"tp_pub_author_simple\"> Butler A;  O'Keeffe D;  Dash S K<\/span>: <span class=\"tp_pub_title_simple\"><a class=\"tp_title_link\" onclick=\"teachpress_pub_showhide('33','tp_links')\" style=\"cursor:pointer;\">Links Between Package Popularity, Criticality, and Security in Software Ecosystems<\/a><\/span>. <span class=\"tp_pub_additional_simple\"><span class=\"tp_pub_additional_in\">In: <\/span><span class=\"tp_pub_additional_booktitle\">IEEE International Conference on Software Analysis, Evolution and Reengineering - Companion (SANER-C), <\/span><span class=\"tp_pub_additional_pages\">pp. 89 - 97, <\/span><span class=\"tp_pub_additional_year\">2025<\/span>.<\/span> <span class=\"tp_pub_menu_simple\">(Type: <span class=\"tp_pub_type inproceedings\">Inproceedings<\/span> | <span class=\"tp_resource_link\"><a id=\"tp_links_sh_33\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('33','tp_links')\" title=\"Show links and resources\" style=\"cursor:pointer;\">Links<\/a><\/span> | <span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_33\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('33','tp_bibtex')\" title=\"Show BibTeX entry\" style=\"cursor:pointer;\">BibTeX<\/a><\/span>)<\/span><div class=\"tp_bibtex\" id=\"tp_bibtex_33\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@inproceedings{ButlerAlexis2024LBPP,<br \/>\r\ntitle = {Links Between Package Popularity, Criticality, and Security in Software Ecosystems},<br \/>\r\nauthor = {Alexis Butler and Dan O'Keeffe and Santanu Kumar Dash},<br \/>\r\ndoi = {10.1109\/SANER-C66551.2025.00020},<br \/>\r\nyear  = {2025},<br \/>\r\ndate = {2025-01-01},<br \/>\r\nurldate = {2025-01-01},<br \/>\r\nbooktitle = {IEEE International Conference on Software Analysis, Evolution and Reengineering - Companion (SANER-C)},<br \/>\r\njournal = {IEEE International Conference on Software Analysis, Evolution and Reengineering - Companion (SANER-C)},<br \/>\r\nvolume = {ahead of print},<br \/>\r\npages = {89 - 97},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {inproceedings}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('33','tp_bibtex')\">Close<\/a><\/p><\/div><div class=\"tp_links\" id=\"tp_links_33\" style=\"display:none;\"><div class=\"tp_links_entry\"><ul class=\"tp_pub_list\"><li><i class=\"ai ai-doi\"><\/i><a class=\"tp_pub_list\" href=\"https:\/\/dx.doi.org\/10.1109\/SANER-C66551.2025.00020\" title=\"Follow DOI:10.1109\/SANER-C66551.2025.00020\" target=\"_blank\">doi:10.1109\/SANER-C66551.2025.00020<\/a><\/li><\/ul><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('33','tp_links')\">Close<\/a><\/p><\/div><\/td><\/tr><tr>\r\n                    <td colspan=\"2\">\r\n                        <h3 class=\"tp_h3\" id=\"tp_h3_2024\">2024<\/h3>\r\n                    <\/td>\r\n                <\/tr><tr class=\"tp_publication_simple tp_publication_simple_inproceedings\"><td class=\"tp_pub_number_simple\">29.<\/td><td class=\"tp_pub_info_simple\"><span class=\"tp_pub_author_simple\"> Tileria M;  Blasco J;  Dash S K<\/span>: <span class=\"tp_pub_title_simple\"><a class=\"tp_title_link\" onclick=\"teachpress_pub_showhide('35','tp_links')\" style=\"cursor:pointer;\">DocFlow: Extracting Taint Specifications from Software Documentation<\/a><\/span>. <span class=\"tp_pub_additional_simple\"><span class=\"tp_pub_additional_in\">In: <\/span><span class=\"tp_pub_additional_booktitle\">Proceedings of the IEEE\/ACM 46th International Conference on Software Engineering, <\/span><span class=\"tp_pub_additional_publisher\">ACM, <\/span><span class=\"tp_pub_additional_address\">Lisbon, Portugal, <\/span><span class=\"tp_pub_additional_year\">2024<\/span>.<\/span> <span class=\"tp_pub_menu_simple\">(Type: <span class=\"tp_pub_type inproceedings\">Inproceedings<\/span> | <span class=\"tp_abstract_link\"><a id=\"tp_abstract_sh_35\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('35','tp_abstract')\" title=\"Show abstract\" style=\"cursor:pointer;\">Abstract<\/a><\/span> | <span class=\"tp_resource_link\"><a id=\"tp_links_sh_35\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('35','tp_links')\" title=\"Show links and resources\" style=\"cursor:pointer;\">Links<\/a><\/span> | <span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_35\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('35','tp_bibtex')\" title=\"Show BibTeX entry\" style=\"cursor:pointer;\">BibTeX<\/a><\/span>)<\/span><div class=\"tp_bibtex\" id=\"tp_bibtex_35\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@inproceedings{10.1145\/3597503.3623312,<br \/>\r\ntitle = {DocFlow: Extracting Taint Specifications from Software Documentation},<br \/>\r\nauthor = {Marcos Tileria and Jorge Blasco and Santanu Kumar Dash},<br \/>\r\nurl = {https:\/\/doi.org\/10.1145\/3597503.3623312},<br \/>\r\ndoi = {10.1145\/3597503.3623312},<br \/>\r\nyear  = {2024},<br \/>\r\ndate = {2024-01-01},<br \/>\r\nurldate = {2024-01-01},<br \/>\r\nbooktitle = {Proceedings of the IEEE\/ACM 46th International Conference on Software Engineering},<br \/>\r\npublisher = {ACM},<br \/>\r\naddress = {Lisbon, Portugal},<br \/>\r\nseries = {ICSE '24},<br \/>\r\nabstract = {Security practitioners routinely use static analysis to detect security problems and privacy violations in Android apps. The soundness of these analyses depends on how the platform is modelled and the list of sensitive methods. Collecting these methods often becomes impractical given the number of methods available, the pace at which the Android platform is updated, and the proprietary libraries Google releases on each new version. Despite the constant evolution of the Android platform, app developers cope with all these new features thanks to the documentation that comes with each new Android release. In this work, we take advantage of the rich documentation provided by platforms like Android and propose DocFlow, a framework to generate taint specifications for a platform, directly from its documentation. DocFlow models the semantics of API methods using their documentation to detect sensitive methods (sources and sinks) and assigns them semantic labels. Our approach does not require access to source code, enabling the analysis of proprietary libraries for which the code is unavailable. We evaluate DocFlow using Android platform packages and closed-source Google Play Services libraries. Our results show that our framework detects sensitive methods with high precision, adapts to new API versions, and can be easily extended to detect other method types. Our approach provides evidence that Android documentation encodes rich semantic information to categorise sensitive methods, removing the need to analyse source code or perform feature extraction.},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {inproceedings}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('35','tp_bibtex')\">Close<\/a><\/p><\/div><div class=\"tp_abstract\" id=\"tp_abstract_35\" style=\"display:none;\"><div class=\"tp_abstract_entry\">Security practitioners routinely use static analysis to detect security problems and privacy violations in Android apps. The soundness of these analyses depends on how the platform is modelled and the list of sensitive methods. Collecting these methods often becomes impractical given the number of methods available, the pace at which the Android platform is updated, and the proprietary libraries Google releases on each new version. Despite the constant evolution of the Android platform, app developers cope with all these new features thanks to the documentation that comes with each new Android release. In this work, we take advantage of the rich documentation provided by platforms like Android and propose DocFlow, a framework to generate taint specifications for a platform, directly from its documentation. DocFlow models the semantics of API methods using their documentation to detect sensitive methods (sources and sinks) and assigns them semantic labels. Our approach does not require access to source code, enabling the analysis of proprietary libraries for which the code is unavailable. We evaluate DocFlow using Android platform packages and closed-source Google Play Services libraries. Our results show that our framework detects sensitive methods with high precision, adapts to new API versions, and can be easily extended to detect other method types. Our approach provides evidence that Android documentation encodes rich semantic information to categorise sensitive methods, removing the need to analyse source code or perform feature extraction.<\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('35','tp_abstract')\">Close<\/a><\/p><\/div><div class=\"tp_links\" id=\"tp_links_35\" style=\"display:none;\"><div class=\"tp_links_entry\"><ul class=\"tp_pub_list\"><li><i class=\"fas fa-globe\"><\/i><a class=\"tp_pub_list\" href=\"https:\/\/doi.org\/10.1145\/3597503.3623312\" title=\"https:\/\/doi.org\/10.1145\/3597503.3623312\" target=\"_blank\">https:\/\/doi.org\/10.1145\/3597503.3623312<\/a><\/li><li><i class=\"ai ai-doi\"><\/i><a class=\"tp_pub_list\" href=\"https:\/\/dx.doi.org\/10.1145\/3597503.3623312\" title=\"Follow DOI:10.1145\/3597503.3623312\" target=\"_blank\">doi:10.1145\/3597503.3623312<\/a><\/li><\/ul><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('35','tp_links')\">Close<\/a><\/p><\/div><\/td><\/tr><tr class=\"tp_publication_simple tp_publication_simple_inproceedings\"><td class=\"tp_pub_number_simple\">28.<\/td><td class=\"tp_pub_info_simple\"><span class=\"tp_pub_author_simple\"> Tereszkowski-Kaminski M;  Dash S K;  Suarez-Tangil G<\/span>: <span class=\"tp_pub_title_simple\"><a class=\"tp_title_link\" onclick=\"teachpress_pub_showhide('31','tp_links')\" style=\"cursor:pointer;\">A Study of Malicious Source Code Reuse Among GitHub, StackOverflow \r\n and Underground Forums<\/a><\/span>. <span class=\"tp_pub_additional_simple\"><span class=\"tp_pub_additional_in\">In: <\/span> Garc\u00eda-Alfaro, Joaqu\u00edn;  Kozik, Rafal;  Choras, Michal;  Katsikas, Sokratis K. (Ed.): <span class=\"tp_pub_additional_booktitle\">Computer Security - ESORICS 2024 - 29th European Symposium on Research \r\n in Computer Security, Bydgoszcz, Poland, September 16-20, 2024, Proceedings, \r\n Part III, <\/span><span class=\"tp_pub_additional_pages\">pp. 45\u201366, <\/span><span class=\"tp_pub_additional_publisher\">Springer, <\/span><span class=\"tp_pub_additional_year\">2024<\/span>.<\/span> <span class=\"tp_pub_menu_simple\">(Type: <span class=\"tp_pub_type inproceedings\">Inproceedings<\/span> | <span class=\"tp_resource_link\"><a id=\"tp_links_sh_31\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('31','tp_links')\" title=\"Show links and resources\" style=\"cursor:pointer;\">Links<\/a><\/span> | <span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_31\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('31','tp_bibtex')\" title=\"Show BibTeX entry\" style=\"cursor:pointer;\">BibTeX<\/a><\/span>)<\/span><div class=\"tp_bibtex\" id=\"tp_bibtex_31\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@inproceedings{DBLP:conf\/esorics\/TereszkowskiKaminskiDS24,<br \/>\r\ntitle = {A Study of Malicious Source Code Reuse Among GitHub, StackOverflow <br \/>\r\n and Underground Forums},<br \/>\r\nauthor = {Michal Tereszkowski-Kaminski and Santanu Kumar Dash and Guillermo Suarez-Tangil},<br \/>\r\neditor = {Joaqu\u00edn Garc\u00eda-Alfaro and Rafal Kozik and Michal Choras and Sokratis K. Katsikas},<br \/>\r\nurl = {https:\/\/doi.org\/10.1007\/978-3-031-70896-1_3},<br \/>\r\ndoi = {10.1007\/978-3-031-70896-1_3},<br \/>\r\nyear  = {2024},<br \/>\r\ndate = {2024-01-01},<br \/>\r\nbooktitle = {Computer Security - ESORICS 2024 - 29th European Symposium on Research <br \/>\r\n in Computer Security, Bydgoszcz, Poland, September 16-20, 2024, Proceedings, <br \/>\r\n Part III},<br \/>\r\nvolume = {14984},<br \/>\r\npages = {45--66},<br \/>\r\npublisher = {Springer},<br \/>\r\nseries = {Lecture Notes in Computer Science},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {inproceedings}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('31','tp_bibtex')\">Close<\/a><\/p><\/div><div class=\"tp_links\" id=\"tp_links_31\" style=\"display:none;\"><div class=\"tp_links_entry\"><ul class=\"tp_pub_list\"><li><i class=\"fas fa-globe\"><\/i><a class=\"tp_pub_list\" href=\"https:\/\/doi.org\/10.1007\/978-3-031-70896-1_3\" title=\"https:\/\/doi.org\/10.1007\/978-3-031-70896-1_3\" target=\"_blank\">https:\/\/doi.org\/10.1007\/978-3-031-70896-1_3<\/a><\/li><li><i class=\"ai ai-doi\"><\/i><a class=\"tp_pub_list\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-031-70896-1_3\" title=\"Follow DOI:10.1007\/978-3-031-70896-1_3\" target=\"_blank\">doi:10.1007\/978-3-031-70896-1_3<\/a><\/li><\/ul><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('31','tp_links')\">Close<\/a><\/p><\/div><\/td><\/tr><tr class=\"tp_publication_simple tp_publication_simple_inproceedings\"><td class=\"tp_pub_number_simple\">27.<\/td><td class=\"tp_pub_info_simple\"><span class=\"tp_pub_author_simple\"> Petrescu C C;  Smith S;  Butler A;  Dash S K<\/span>: <span class=\"tp_pub_title_simple\"><a class=\"tp_title_link\" onclick=\"teachpress_pub_showhide('30','tp_links')\" style=\"cursor:pointer;\">Checking Test Suite Efficacy Through Dual-Channel Techniques<\/a><\/span>. <span class=\"tp_pub_additional_simple\"><span class=\"tp_pub_additional_in\">In: <\/span><span class=\"tp_pub_additional_booktitle\">Testing Software and Systems - 36th IFIP WG 6.1 International \r\n Conference, ICTSS 2024, London, UK, October 30 - November 1, 2024, \r\n Proceedings, <\/span><span class=\"tp_pub_additional_pages\">pp. 275\u2013291, <\/span><span class=\"tp_pub_additional_publisher\">Springer, <\/span><span class=\"tp_pub_additional_year\">2024<\/span>.<\/span> <span class=\"tp_pub_menu_simple\">(Type: <span class=\"tp_pub_type inproceedings\">Inproceedings<\/span> | <span class=\"tp_resource_link\"><a id=\"tp_links_sh_30\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('30','tp_links')\" title=\"Show links and resources\" style=\"cursor:pointer;\">Links<\/a><\/span> | <span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_30\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('30','tp_bibtex')\" title=\"Show BibTeX entry\" style=\"cursor:pointer;\">BibTeX<\/a><\/span>)<\/span><div class=\"tp_bibtex\" id=\"tp_bibtex_30\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@inproceedings{DBLP:conf\/pts\/PetrescuSBD24,<br \/>\r\ntitle = {Checking Test Suite Efficacy Through Dual-Channel Techniques},<br \/>\r\nauthor = {Constantin Cezar Petrescu and Sam Smith and Alexis Butler and Santanu Kumar Dash},<br \/>\r\nurl = {https:\/\/doi.org\/10.1007\/978-3-031-80889-0_19},<br \/>\r\ndoi = {10.1007\/978-3-031-80889-0_19},<br \/>\r\nyear  = {2024},<br \/>\r\ndate = {2024-01-01},<br \/>\r\nurldate = {2024-01-01},<br \/>\r\nbooktitle = {Testing Software and Systems - 36th IFIP WG 6.1 International <br \/>\r\n Conference, ICTSS 2024, London, UK, October 30 - November 1, 2024, <br \/>\r\n Proceedings},<br \/>\r\nvolume = {15383},<br \/>\r\npages = {275--291},<br \/>\r\npublisher = {Springer},<br \/>\r\nseries = {Lecture Notes in Computer Science},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {inproceedings}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('30','tp_bibtex')\">Close<\/a><\/p><\/div><div class=\"tp_links\" id=\"tp_links_30\" style=\"display:none;\"><div class=\"tp_links_entry\"><ul class=\"tp_pub_list\"><li><i class=\"fas fa-globe\"><\/i><a class=\"tp_pub_list\" href=\"https:\/\/doi.org\/10.1007\/978-3-031-80889-0_19\" title=\"https:\/\/doi.org\/10.1007\/978-3-031-80889-0_19\" target=\"_blank\">https:\/\/doi.org\/10.1007\/978-3-031-80889-0_19<\/a><\/li><li><i class=\"ai ai-doi\"><\/i><a class=\"tp_pub_list\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-031-80889-0_19\" title=\"Follow DOI:10.1007\/978-3-031-80889-0_19\" target=\"_blank\">doi:10.1007\/978-3-031-80889-0_19<\/a><\/li><\/ul><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('30','tp_links')\">Close<\/a><\/p><\/div><\/td><\/tr><tr class=\"tp_publication_simple tp_publication_simple_inproceedings\"><td class=\"tp_pub_number_simple\">26.<\/td><td class=\"tp_pub_info_simple\"><span class=\"tp_pub_author_simple\"> Raffa G;  Blasco J;  O'Keeffe D;  Dash S K<\/span>: <span class=\"tp_pub_title_simple\"><a class=\"tp_title_link\" onclick=\"teachpress_pub_showhide('29','tp_links')\" style=\"cursor:pointer;\">Towards Inter-Service Data Flow Analysis of Serverless Applications<\/a><\/span>. <span class=\"tp_pub_additional_simple\"><span class=\"tp_pub_additional_in\">In: <\/span><span class=\"tp_pub_additional_booktitle\">2024 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER), <\/span><span class=\"tp_pub_additional_pages\">pp. 654-658, <\/span><span class=\"tp_pub_additional_year\">2024<\/span>.<\/span> <span class=\"tp_pub_menu_simple\">(Type: <span class=\"tp_pub_type inproceedings\">Inproceedings<\/span> | <span class=\"tp_resource_link\"><a id=\"tp_links_sh_29\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('29','tp_links')\" title=\"Show links and resources\" style=\"cursor:pointer;\">Links<\/a><\/span> | <span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_29\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('29','tp_bibtex')\" title=\"Show BibTeX entry\" style=\"cursor:pointer;\">BibTeX<\/a><\/span>)<\/span><div class=\"tp_bibtex\" id=\"tp_bibtex_29\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@inproceedings{10589827,<br \/>\r\ntitle = {Towards Inter-Service Data Flow Analysis of Serverless Applications},<br \/>\r\nauthor = {Giuseppe Raffa and Jorge Blasco and Dan O'Keeffe and Santanu Kumar Dash},<br \/>\r\ndoi = {10.1109\/SANER60148.2024.00072},<br \/>\r\nyear  = {2024},<br \/>\r\ndate = {2024-01-01},<br \/>\r\nbooktitle = {2024 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER)},<br \/>\r\npages = {654-658},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {inproceedings}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('29','tp_bibtex')\">Close<\/a><\/p><\/div><div class=\"tp_links\" id=\"tp_links_29\" style=\"display:none;\"><div class=\"tp_links_entry\"><ul class=\"tp_pub_list\"><li><i class=\"ai ai-doi\"><\/i><a class=\"tp_pub_list\" href=\"https:\/\/dx.doi.org\/10.1109\/SANER60148.2024.00072\" title=\"Follow DOI:10.1109\/SANER60148.2024.00072\" target=\"_blank\">doi:10.1109\/SANER60148.2024.00072<\/a><\/li><\/ul><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('29','tp_links')\">Close<\/a><\/p><\/div><\/td><\/tr><tr>\r\n                    <td colspan=\"2\">\r\n                        <h3 class=\"tp_h3\" id=\"tp_h3_2023\">2023<\/h3>\r\n                    <\/td>\r\n                <\/tr><tr class=\"tp_publication_simple tp_publication_simple_article\"><td class=\"tp_pub_number_simple\">25.<\/td><td class=\"tp_pub_info_simple\"><span class=\"tp_pub_author_simple\"> Petrescu C C;  Smith S;  Giavrimis R;  Dash S K<\/span>: <span class=\"tp_pub_title_simple\">Do Names echo Semantics? A Large-Scale Study of Identifiers used in C++'s Named Casts<\/span>. <span class=\"tp_pub_additional_simple\"><span class=\"tp_pub_additional_in\">In: <\/span><span class=\"tp_pub_additional_journal\">Journal of Systems and Software, <\/span><span class=\"tp_pub_additional_volume\">vol. 202, <\/span><span class=\"tp_pub_additional_issue\">iss. C, <\/span><span class=\"tp_pub_additional_year\">2023<\/span><span class=\"tp_pub_additional_note\">, (Selected for presentation at 2023 ESEM Journal-First Papers)<\/span>.<\/span> <span class=\"tp_pub_menu_simple\">(Type: <span class=\"tp_pub_type article\">Journal Article<\/span> | <span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_2\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('2','tp_bibtex')\" title=\"Show BibTeX entry\" style=\"cursor:pointer;\">BibTeX<\/a><\/span>)<\/span><div class=\"tp_bibtex\" id=\"tp_bibtex_2\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@article{cast,<br \/>\r\ntitle = {Do Names echo Semantics? A Large-Scale Study of Identifiers used in C++'s Named Casts},<br \/>\r\nauthor = {Constantin Cezar Petrescu and Sam Smith and Rafail Giavrimis and Santanu Kumar Dash},<br \/>\r\nyear  = {2023},<br \/>\r\ndate = {2023-03-17},<br \/>\r\nurldate = {2023-03-17},<br \/>\r\nbooktitle = {Under Review},<br \/>\r\njournal = {Journal of Systems and Software},<br \/>\r\nvolume = {202},<br \/>\r\nissue = {C},<br \/>\r\nnote = {Selected for presentation at 2023 ESEM Journal-First Papers},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {article}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('2','tp_bibtex')\">Close<\/a><\/p><\/div><\/td><\/tr><tr class=\"tp_publication_simple tp_publication_simple_inproceedings\"><td class=\"tp_pub_number_simple\">24.<\/td><td class=\"tp_pub_info_simple\"><span class=\"tp_pub_author_simple\"> Raffa G;  Al\u00eds J B;  O'Keeffe D;  Dash S K<\/span>: <span class=\"tp_pub_title_simple\"><a class=\"tp_title_link\" onclick=\"teachpress_pub_showhide('27','tp_links')\" style=\"cursor:pointer;\">AWSomePy: A Dataset and Characterization of Serverless Applications<\/a><\/span>. <span class=\"tp_pub_additional_simple\"><span class=\"tp_pub_additional_in\">In: <\/span><span class=\"tp_pub_additional_booktitle\">Proceedings of the 1st Workshop on SErverless Systems, Applications and MEthodologies, SESAME 2023, Rome, Italy, 8 May 2023, <\/span><span class=\"tp_pub_additional_pages\">pp. 50\u201356, <\/span><span class=\"tp_pub_additional_publisher\">ACM, <\/span><span class=\"tp_pub_additional_year\">2023<\/span>.<\/span> <span class=\"tp_pub_menu_simple\">(Type: <span class=\"tp_pub_type inproceedings\">Inproceedings<\/span> | <span class=\"tp_resource_link\"><a id=\"tp_links_sh_27\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('27','tp_links')\" title=\"Show links and resources\" style=\"cursor:pointer;\">Links<\/a><\/span> | <span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_27\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('27','tp_bibtex')\" title=\"Show BibTeX entry\" style=\"cursor:pointer;\">BibTeX<\/a><\/span>)<\/span><div class=\"tp_bibtex\" id=\"tp_bibtex_27\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@inproceedings{DBLP:conf\/sesame\/RaffaAO023,<br \/>\r\ntitle = {AWSomePy: A Dataset and Characterization of Serverless Applications},<br \/>\r\nauthor = {Giuseppe Raffa and Jorge Blasco Al\u00eds and Daniel O'Keeffe and Santanu Kumar Dash},<br \/>\r\nurl = {https:\/\/doi.org\/10.1145\/3592533.3592811},<br \/>\r\ndoi = {10.1145\/3592533.3592811},<br \/>\r\nyear  = {2023},<br \/>\r\ndate = {2023-01-01},<br \/>\r\nurldate = {2023-01-01},<br \/>\r\nbooktitle = {Proceedings of the 1st Workshop on SErverless Systems, Applications and MEthodologies, SESAME 2023, Rome, Italy, 8 May 2023},<br \/>\r\npages = {50--56},<br \/>\r\npublisher = {ACM},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {inproceedings}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('27','tp_bibtex')\">Close<\/a><\/p><\/div><div class=\"tp_links\" id=\"tp_links_27\" style=\"display:none;\"><div class=\"tp_links_entry\"><ul class=\"tp_pub_list\"><li><i class=\"fas fa-globe\"><\/i><a class=\"tp_pub_list\" href=\"https:\/\/doi.org\/10.1145\/3592533.3592811\" title=\"https:\/\/doi.org\/10.1145\/3592533.3592811\" target=\"_blank\">https:\/\/doi.org\/10.1145\/3592533.3592811<\/a><\/li><li><i class=\"ai ai-doi\"><\/i><a class=\"tp_pub_list\" href=\"https:\/\/dx.doi.org\/10.1145\/3592533.3592811\" title=\"Follow DOI:10.1145\/3592533.3592811\" target=\"_blank\">doi:10.1145\/3592533.3592811<\/a><\/li><\/ul><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('27','tp_links')\">Close<\/a><\/p><\/div><\/td><\/tr><tr>\r\n                    <td colspan=\"2\">\r\n                        <h3 class=\"tp_h3\" id=\"tp_h3_2021\">2021<\/h3>\r\n                    <\/td>\r\n                <\/tr><tr class=\"tp_publication_simple tp_publication_simple_conference\"><td class=\"tp_pub_number_simple\">23.<\/td><td class=\"tp_pub_info_simple\"><span class=\"tp_pub_author_simple\"> Giavrimis R;  Butler A;  Petrescu C C;  Basios M;  Dash S K<\/span>: <span class=\"tp_pub_title_simple\">Genetic Optimisation of C++ Applications<\/span>. <span class=\"tp_pub_additional_simple\"><span class=\"tp_pub_additional_booktitle\">Automated Software Engineering (ASE), Late Breaking Results Track, <\/span><span class=\"tp_pub_additional_year\">2021<\/span>.<\/span> <span class=\"tp_pub_menu_simple\">(Type: <span class=\"tp_pub_type conference\">Conference<\/span> | <span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_3\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('3','tp_bibtex')\" title=\"Show BibTeX entry\" style=\"cursor:pointer;\">BibTeX<\/a><\/span>)<\/span><div class=\"tp_bibtex\" id=\"tp_bibtex_3\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@conference{optimisation,<br \/>\r\ntitle = {Genetic Optimisation of C++ Applications},<br \/>\r\nauthor = {Rafail Giavrimis and Alexis Butler and Constantin Cezar Petrescu and Michail Basios and Santanu Kumar Dash},<br \/>\r\nyear  = {2021},<br \/>\r\ndate = {2021-01-01},<br \/>\r\nurldate = {2021-01-01},<br \/>\r\nbooktitle = {Automated Software Engineering (ASE), Late Breaking Results Track},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {conference}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('3','tp_bibtex')\">Close<\/a><\/p><\/div><\/td><\/tr><tr>\r\n                    <td colspan=\"2\">\r\n                        <h3 class=\"tp_h3\" id=\"tp_h3_2020\">2020<\/h3>\r\n                    <\/td>\r\n                <\/tr><tr class=\"tp_publication_simple tp_publication_simple_conference\"><td class=\"tp_pub_number_simple\">22.<\/td><td class=\"tp_pub_info_simple\"><span class=\"tp_pub_author_simple\"> P\u00e2rtachi P;  Dash S K;  Allamanis M;  Barr E T<\/span>: <span class=\"tp_pub_title_simple\"><a class=\"tp_title_link\" onclick=\"teachpress_pub_showhide('4','tp_links')\" style=\"cursor:pointer;\">Flexeme: Untangling Commits Using Lexical Flows<\/a><\/span>. <span class=\"tp_pub_additional_simple\"><span class=\"tp_pub_additional_booktitle\">28th ACM Joint European Software Engineering Conference \r\n and Symposium on the Foundations of Software Engineering, <\/span><span class=\"tp_pub_additional_series\">ESEC\/FSE '20 <\/span><span class=\"tp_pub_additional_publisher\">ACM, <\/span><span class=\"tp_pub_additional_year\">2020<\/span>.<\/span> <span class=\"tp_pub_menu_simple\">(Type: <span class=\"tp_pub_type conference\">Conference<\/span> | <span class=\"tp_resource_link\"><a id=\"tp_links_sh_4\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('4','tp_links')\" title=\"Show links and resources\" style=\"cursor:pointer;\">Links<\/a><\/span> | <span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_4\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('4','tp_bibtex')\" title=\"Show BibTeX entry\" style=\"cursor:pointer;\">BibTeX<\/a><\/span>)<\/span><div class=\"tp_bibtex\" id=\"tp_bibtex_4\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@conference{DBLP:conf\/sigsoft\/PartachiDAB20,<br \/>\r\ntitle = {Flexeme: Untangling Commits Using Lexical Flows},<br \/>\r\nauthor = {Profir-Petru P\u00e2rtachi and Santanu Kumar Dash and Miltiadis Allamanis and Earl T. Barr},<br \/>\r\neditor = {Prem Devanbu and Myra B. Cohen and Thomas Zimmermann},<br \/>\r\nurl = {https:\/\/doi.org\/10.1145\/3368089.3409693},<br \/>\r\ndoi = {10.1145\/3368089.3409693},<br \/>\r\nyear  = {2020},<br \/>\r\ndate = {2020-01-01},<br \/>\r\nurldate = {2020-01-01},<br \/>\r\nbooktitle = {28th ACM Joint European Software Engineering Conference <br \/>\r\n and Symposium on the Foundations of Software Engineering},<br \/>\r\npages = {63--74},<br \/>\r\npublisher = {ACM},<br \/>\r\nseries = {ESEC\/FSE '20},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {conference}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('4','tp_bibtex')\">Close<\/a><\/p><\/div><div class=\"tp_links\" id=\"tp_links_4\" style=\"display:none;\"><div class=\"tp_links_entry\"><ul class=\"tp_pub_list\"><li><i class=\"fas fa-globe\"><\/i><a class=\"tp_pub_list\" href=\"https:\/\/doi.org\/10.1145\/3368089.3409693\" title=\"https:\/\/doi.org\/10.1145\/3368089.3409693\" target=\"_blank\">https:\/\/doi.org\/10.1145\/3368089.3409693<\/a><\/li><li><i class=\"ai ai-doi\"><\/i><a class=\"tp_pub_list\" href=\"https:\/\/dx.doi.org\/10.1145\/3368089.3409693\" title=\"Follow DOI:10.1145\/3368089.3409693\" target=\"_blank\">doi:10.1145\/3368089.3409693<\/a><\/li><\/ul><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('4','tp_links')\">Close<\/a><\/p><\/div><\/td><\/tr><tr class=\"tp_publication_simple tp_publication_simple_conference\"><td class=\"tp_pub_number_simple\">21.<\/td><td class=\"tp_pub_info_simple\"><span class=\"tp_pub_author_simple\"> P\u00e2rtachi P;  Dash S K;  Treude C;  Barr E T<\/span>: <span class=\"tp_pub_title_simple\"><a class=\"tp_title_link\" onclick=\"teachpress_pub_showhide('5','tp_links')\" style=\"cursor:pointer;\">POSIT: Simultaneously Tagging Natural and Programming Languages<\/a><\/span>. <span class=\"tp_pub_additional_simple\"><span class=\"tp_pub_additional_booktitle\">ICSE '20: 42nd International Conference on Software Engineering, \r\n Seoul, South Korea, 27 June - 19 July, 2020, <\/span><span class=\"tp_pub_additional_publisher\">ACM, <\/span><span class=\"tp_pub_additional_year\">2020<\/span>.<\/span> <span class=\"tp_pub_menu_simple\">(Type: <span class=\"tp_pub_type conference\">Conference<\/span> | <span class=\"tp_resource_link\"><a id=\"tp_links_sh_5\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('5','tp_links')\" title=\"Show links and resources\" style=\"cursor:pointer;\">Links<\/a><\/span> | <span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_5\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('5','tp_bibtex')\" title=\"Show BibTeX entry\" style=\"cursor:pointer;\">BibTeX<\/a><\/span>)<\/span><div class=\"tp_bibtex\" id=\"tp_bibtex_5\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@conference{DBLP:conf\/icse\/PartachiDTB20,<br \/>\r\ntitle = {POSIT: Simultaneously Tagging Natural and Programming Languages},<br \/>\r\nauthor = {Profir-Petru P\u00e2rtachi and Santanu Kumar Dash and Christoph Treude and Earl T. Barr},<br \/>\r\neditor = {Gregg Rothermel and Doo-Hwan Bae},<br \/>\r\nurl = {https:\/\/doi.org\/10.1145\/3377811.3380440},<br \/>\r\ndoi = {10.1145\/3377811.3380440},<br \/>\r\nyear  = {2020},<br \/>\r\ndate = {2020-01-01},<br \/>\r\nurldate = {2020-01-01},<br \/>\r\nbooktitle = {ICSE '20: 42nd International Conference on Software Engineering, <br \/>\r\n Seoul, South Korea, 27 June - 19 July, 2020},<br \/>\r\npages = {1348--1358},<br \/>\r\npublisher = {ACM},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {conference}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('5','tp_bibtex')\">Close<\/a><\/p><\/div><div class=\"tp_links\" id=\"tp_links_5\" style=\"display:none;\"><div class=\"tp_links_entry\"><ul class=\"tp_pub_list\"><li><i class=\"fas fa-globe\"><\/i><a class=\"tp_pub_list\" href=\"https:\/\/doi.org\/10.1145\/3377811.3380440\" title=\"https:\/\/doi.org\/10.1145\/3377811.3380440\" target=\"_blank\">https:\/\/doi.org\/10.1145\/3377811.3380440<\/a><\/li><li><i class=\"ai ai-doi\"><\/i><a class=\"tp_pub_list\" href=\"https:\/\/dx.doi.org\/10.1145\/3377811.3380440\" title=\"Follow DOI:10.1145\/3377811.3380440\" target=\"_blank\">doi:10.1145\/3377811.3380440<\/a><\/li><\/ul><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('5','tp_links')\">Close<\/a><\/p><\/div><\/td><\/tr><tr class=\"tp_publication_simple tp_publication_simple_conference\"><td class=\"tp_pub_number_simple\">20.<\/td><td class=\"tp_pub_info_simple\"><span class=\"tp_pub_author_simple\"> Louis A;  Dash S K;  Barr E T;  Ernst M D;  Sutton C<\/span>: <span class=\"tp_pub_title_simple\"><a class=\"tp_title_link\" onclick=\"teachpress_pub_showhide('6','tp_links')\" style=\"cursor:pointer;\">Where Should I Comment My Code?: A Dataset and Model for Predicting Locations that need Comments<\/a><\/span>. <span class=\"tp_pub_additional_simple\"><span class=\"tp_pub_additional_booktitle\">ICSE-NIER 2020: 42nd International Conference on Software Engineering, \r\n New Ideas and Emerging Results, Seoul, South Korea, 27 June - 19 July, \r\n 2020, <\/span><span class=\"tp_pub_additional_publisher\">ACM, <\/span><span class=\"tp_pub_additional_year\">2020<\/span>.<\/span> <span class=\"tp_pub_menu_simple\">(Type: <span class=\"tp_pub_type conference\">Conference<\/span> | <span class=\"tp_resource_link\"><a id=\"tp_links_sh_6\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('6','tp_links')\" title=\"Show links and resources\" style=\"cursor:pointer;\">Links<\/a><\/span> | <span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_6\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('6','tp_bibtex')\" title=\"Show BibTeX entry\" style=\"cursor:pointer;\">BibTeX<\/a><\/span>)<\/span><div class=\"tp_bibtex\" id=\"tp_bibtex_6\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@conference{DBLP:conf\/icse\/LouisDBES20,<br \/>\r\ntitle = {Where Should I Comment My Code?: A Dataset and Model for Predicting Locations that need Comments},<br \/>\r\nauthor = {Annie Louis and Santanu Kumar Dash and Earl T. Barr and Michael D. Ernst and Charles Sutton},<br \/>\r\neditor = {Gregg Rothermel and Doo-Hwan Bae},<br \/>\r\nurl = {https:\/\/doi.org\/10.1145\/3377816.3381736},<br \/>\r\ndoi = {10.1145\/3377816.3381736},<br \/>\r\nyear  = {2020},<br \/>\r\ndate = {2020-01-01},<br \/>\r\nurldate = {2020-01-01},<br \/>\r\nbooktitle = {ICSE-NIER 2020: 42nd International Conference on Software Engineering, <br \/>\r\n New Ideas and Emerging Results, Seoul, South Korea, 27 June - 19 July, <br \/>\r\n 2020},<br \/>\r\npages = {21--24},<br \/>\r\npublisher = {ACM},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {conference}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('6','tp_bibtex')\">Close<\/a><\/p><\/div><div class=\"tp_links\" id=\"tp_links_6\" style=\"display:none;\"><div class=\"tp_links_entry\"><ul class=\"tp_pub_list\"><li><i class=\"fas fa-globe\"><\/i><a class=\"tp_pub_list\" href=\"https:\/\/doi.org\/10.1145\/3377816.3381736\" title=\"https:\/\/doi.org\/10.1145\/3377816.3381736\" target=\"_blank\">https:\/\/doi.org\/10.1145\/3377816.3381736<\/a><\/li><li><i class=\"ai ai-doi\"><\/i><a class=\"tp_pub_list\" href=\"https:\/\/dx.doi.org\/10.1145\/3377816.3381736\" title=\"Follow DOI:10.1145\/3377816.3381736\" target=\"_blank\">doi:10.1145\/3377816.3381736<\/a><\/li><\/ul><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('6','tp_links')\">Close<\/a><\/p><\/div><\/td><\/tr><tr class=\"tp_publication_simple tp_publication_simple_conference\"><td class=\"tp_pub_number_simple\">19.<\/td><td class=\"tp_pub_info_simple\"><span class=\"tp_pub_author_simple\"> Casalnuovo C;  Barr E T;  Dash S K;  Devanbu P;  Morgan E<\/span>: <span class=\"tp_pub_title_simple\"><a class=\"tp_title_link\" onclick=\"teachpress_pub_showhide('7','tp_links')\" style=\"cursor:pointer;\">A Theory of Dual Channel Constraints<\/a><\/span>. <span class=\"tp_pub_additional_simple\"><span class=\"tp_pub_additional_series\">42nd International Conference on Software Engineering, New Ideas and Emerging Results (ICSE-NIER 2020) <\/span><span class=\"tp_pub_additional_publisher\">ACM, <\/span><span class=\"tp_pub_additional_year\">2020<\/span>.<\/span> <span class=\"tp_pub_menu_simple\">(Type: <span class=\"tp_pub_type conference\">Conference<\/span> | <span class=\"tp_resource_link\"><a id=\"tp_links_sh_7\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('7','tp_links')\" title=\"Show links and resources\" style=\"cursor:pointer;\">Links<\/a><\/span> | <span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_7\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('7','tp_bibtex')\" title=\"Show BibTeX entry\" style=\"cursor:pointer;\">BibTeX<\/a><\/span>)<\/span><div class=\"tp_bibtex\" id=\"tp_bibtex_7\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@conference{DBLP:conf\/icse\/CasalnuovoBDDM20,<br \/>\r\ntitle = {A Theory of Dual Channel Constraints},<br \/>\r\nauthor = {Casey Casalnuovo and Earl T. Barr and Santanu Kumar Dash and Prem Devanbu and Emily Morgan},<br \/>\r\neditor = {Gregg Rothermel and Doo-Hwan Bae},<br \/>\r\nurl = {https:\/\/doi.org\/10.1145\/3377816.3381720},<br \/>\r\ndoi = {10.1145\/3377816.3381720},<br \/>\r\nyear  = {2020},<br \/>\r\ndate = {2020-01-01},<br \/>\r\nurldate = {2020-01-01},<br \/>\r\npages = {25--28},<br \/>\r\npublisher = {ACM},<br \/>\r\nseries = {42nd International Conference on Software Engineering, New Ideas and Emerging Results (ICSE-NIER 2020)},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {conference}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('7','tp_bibtex')\">Close<\/a><\/p><\/div><div class=\"tp_links\" id=\"tp_links_7\" style=\"display:none;\"><div class=\"tp_links_entry\"><ul class=\"tp_pub_list\"><li><i class=\"fas fa-globe\"><\/i><a class=\"tp_pub_list\" href=\"https:\/\/doi.org\/10.1145\/3377816.3381720\" title=\"https:\/\/doi.org\/10.1145\/3377816.3381720\" target=\"_blank\">https:\/\/doi.org\/10.1145\/3377816.3381720<\/a><\/li><li><i class=\"ai ai-doi\"><\/i><a class=\"tp_pub_list\" href=\"https:\/\/dx.doi.org\/10.1145\/3377816.3381720\" title=\"Follow DOI:10.1145\/3377816.3381720\" target=\"_blank\">doi:10.1145\/3377816.3381720<\/a><\/li><\/ul><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('7','tp_links')\">Close<\/a><\/p><\/div><\/td><\/tr><tr class=\"tp_publication_simple tp_publication_simple_workshop\"><td class=\"tp_pub_number_simple\">18.<\/td><td class=\"tp_pub_info_simple\"><span class=\"tp_pub_author_simple\"> Dash S K;  Wu F;  Basios M;  Li L;  Kanthan L<\/span>: <span class=\"tp_pub_title_simple\"><a class=\"tp_title_link\" onclick=\"teachpress_pub_showhide('8','tp_links')\" style=\"cursor:pointer;\">Checkers: Multi-modal Darwinian API Optimisation<\/a><\/span>. <span class=\"tp_pub_additional_simple\"><span class=\"tp_pub_additional_booktitle\">ICSE '20: 42nd International Conference on Software Engineering, \r\n Workshops, Seoul, Republic of Korea, 27 June - 19 July, 2020, <\/span><span class=\"tp_pub_additional_publisher\">ACM, <\/span><span class=\"tp_pub_additional_year\">2020<\/span>.<\/span> <span class=\"tp_pub_menu_simple\">(Type: <span class=\"tp_pub_type workshop\">Workshop<\/span> | <span class=\"tp_resource_link\"><a id=\"tp_links_sh_8\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('8','tp_links')\" title=\"Show links and resources\" style=\"cursor:pointer;\">Links<\/a><\/span> | <span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_8\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('8','tp_bibtex')\" title=\"Show BibTeX entry\" style=\"cursor:pointer;\">BibTeX<\/a><\/span>)<\/span><div class=\"tp_bibtex\" id=\"tp_bibtex_8\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@workshop{DBLP:conf\/icse\/DashWBLK20,<br \/>\r\ntitle = {Checkers: Multi-modal Darwinian API Optimisation},<br \/>\r\nauthor = {Santanu Kumar Dash and Fan Wu and Michail Basios and Lingbo Li and Leslie Kanthan},<br \/>\r\nurl = {https:\/\/doi.org\/10.1145\/3387940.3392173},<br \/>\r\ndoi = {10.1145\/3387940.3392173},<br \/>\r\nyear  = {2020},<br \/>\r\ndate = {2020-01-01},<br \/>\r\nurldate = {2020-01-01},<br \/>\r\nbooktitle = {ICSE '20: 42nd International Conference on Software Engineering, <br \/>\r\n Workshops, Seoul, Republic of Korea, 27 June - 19 July, 2020},<br \/>\r\npages = {291--292},<br \/>\r\npublisher = {ACM},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {workshop}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('8','tp_bibtex')\">Close<\/a><\/p><\/div><div class=\"tp_links\" id=\"tp_links_8\" style=\"display:none;\"><div class=\"tp_links_entry\"><ul class=\"tp_pub_list\"><li><i class=\"fas fa-globe\"><\/i><a class=\"tp_pub_list\" href=\"https:\/\/doi.org\/10.1145\/3387940.3392173\" title=\"https:\/\/doi.org\/10.1145\/3387940.3392173\" target=\"_blank\">https:\/\/doi.org\/10.1145\/3387940.3392173<\/a><\/li><li><i class=\"ai ai-doi\"><\/i><a class=\"tp_pub_list\" href=\"https:\/\/dx.doi.org\/10.1145\/3387940.3392173\" title=\"Follow DOI:10.1145\/3387940.3392173\" target=\"_blank\">doi:10.1145\/3387940.3392173<\/a><\/li><\/ul><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('8','tp_links')\">Close<\/a><\/p><\/div><\/td><\/tr><tr>\r\n                    <td colspan=\"2\">\r\n                        <h3 class=\"tp_h3\" id=\"tp_h3_2019\">2019<\/h3>\r\n                    <\/td>\r\n                <\/tr><tr class=\"tp_publication_simple tp_publication_simple_techreport\"><td class=\"tp_pub_number_simple\">17.<\/td><td class=\"tp_pub_info_simple\"><span class=\"tp_pub_author_simple\"> Louis A;  Dash S K;  Barr E T;  Sutton C<\/span>: <span class=\"tp_pub_title_simple\">Deep Learning to Detect Redundant Method Comments<\/span>. <span class=\"tp_pub_additional_simple\"><span class=\"tp_pub_additional_year\">2019<\/span>.<\/span> <span class=\"tp_pub_menu_simple\">(Type: <span class=\"tp_pub_type techreport\">Technical Report<\/span> | <span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_9\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('9','tp_bibtex')\" title=\"Show BibTeX entry\" style=\"cursor:pointer;\">BibTeX<\/a><\/span>)<\/span><div class=\"tp_bibtex\" id=\"tp_bibtex_9\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@techreport{redundant,<br \/>\r\ntitle = {Deep Learning to Detect Redundant Method Comments},<br \/>\r\nauthor = {Annie Louis and Santanu Kumar Dash and Earl T. Barr and Charles Sutton},<br \/>\r\nyear  = {2019},<br \/>\r\ndate = {2019-01-01},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {techreport}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('9','tp_bibtex')\">Close<\/a><\/p><\/div><\/td><\/tr><tr>\r\n                    <td colspan=\"2\">\r\n                        <h3 class=\"tp_h3\" id=\"tp_h3_2018\">2018<\/h3>\r\n                    <\/td>\r\n                <\/tr><tr class=\"tp_publication_simple tp_publication_simple_article\"><td class=\"tp_pub_number_simple\">16.<\/td><td class=\"tp_pub_info_simple\"><span class=\"tp_pub_author_simple\"> Guillermo Suarez-Tangil P G<\/span>: <span class=\"tp_pub_title_simple\">Anomaly-based exploratory analysis and detection of exploits in android mediaserver<\/span>. <span class=\"tp_pub_additional_simple\"><span class=\"tp_pub_additional_in\">In: <\/span><span class=\"tp_pub_additional_journal\">IET Information Security, <\/span><span class=\"tp_pub_additional_volume\">vol. 12, <\/span><span class=\"tp_pub_additional_issue\">iss. 5, <\/span><span class=\"tp_pub_additional_pages\">pp. 404-413(9), <\/span><span class=\"tp_pub_additional_year\">2018<\/span>.<\/span> <span class=\"tp_pub_menu_simple\">(Type: <span class=\"tp_pub_type article\">Journal Article<\/span> | <span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_11\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('11','tp_bibtex')\" title=\"Show BibTeX entry\" style=\"cursor:pointer;\">BibTeX<\/a><\/span>)<\/span><div class=\"tp_bibtex\" id=\"tp_bibtex_11\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@article{&lt;LineBreak&gt;come,<br \/>\r\ntitle = {Anomaly-based exploratory analysis and detection of exploits in android mediaserver},<br \/>\r\nauthor = {Guillermo Suarez-Tangil, Santanu Kumar Dash, Pedro Garci\u00ada-Teodoro, Jose Camacho, Lorenzo Cavallaro},<br \/>\r\nyear  = {2018},<br \/>\r\ndate = {2018-09-01},<br \/>\r\nurldate = {2018-09-01},<br \/>\r\njournal = {IET Information Security},<br \/>\r\nvolume = {12},<br \/>\r\nissue = {5},<br \/>\r\npages = {404-413(9)},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {article}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('11','tp_bibtex')\">Close<\/a><\/p><\/div><\/td><\/tr><tr class=\"tp_publication_simple tp_publication_simple_article\"><td class=\"tp_pub_number_simple\">15.<\/td><td class=\"tp_pub_info_simple\"><span class=\"tp_pub_author_simple\"> Suarez-Tangil P G S K D G<\/span>: <span class=\"tp_pub_title_simple\">Anomaly-based exploratory analysis and detection of exploits in android mediaserver<\/span>. <span class=\"tp_pub_additional_simple\"><span class=\"tp_pub_additional_in\">In: <\/span><span class=\"tp_pub_additional_journal\">IET Information Security, <\/span><span class=\"tp_pub_additional_volume\">vol. 12, <\/span><span class=\"tp_pub_additional_issue\">iss. 5, <\/span><span class=\"tp_pub_additional_pages\">pp. 404-413(9), <\/span><span class=\"tp_pub_additional_year\">2018<\/span>.<\/span> <span class=\"tp_pub_menu_simple\">(Type: <span class=\"tp_pub_type article\">Journal Article<\/span> | <span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_26\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('26','tp_bibtex')\" title=\"Show BibTeX entry\" style=\"cursor:pointer;\">BibTeX<\/a><\/span>)<\/span><div class=\"tp_bibtex\" id=\"tp_bibtex_26\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@article{&amp;lt;LineBreak&amp;gt;come,<br \/>\r\ntitle = {Anomaly-based exploratory analysis and detection of exploits in android mediaserver},<br \/>\r\nauthor = {Pedro Garci\u00ada-Teodoro Santanu Kumar Dash Guillermo Suarez-Tangil},<br \/>\r\nyear  = {2018},<br \/>\r\ndate = {2018-09-01},<br \/>\r\nurldate = {2018-09-01},<br \/>\r\njournal = {IET Information Security},<br \/>\r\nvolume = {12},<br \/>\r\nissue = {5},<br \/>\r\npages = {404-413(9)},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {article}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('26','tp_bibtex')\">Close<\/a><\/p><\/div><\/td><\/tr><tr class=\"tp_publication_simple tp_publication_simple_conference\"><td class=\"tp_pub_number_simple\">14.<\/td><td class=\"tp_pub_info_simple\"><span class=\"tp_pub_author_simple\"> Dash S K;  Allamanis M;  Barr E T<\/span>: <span class=\"tp_pub_title_simple\">RefiNym: Using Names to Refine Types<\/span>. <span class=\"tp_pub_additional_simple\"><span class=\"tp_pub_additional_booktitle\">26th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, <\/span><span class=\"tp_pub_additional_series\">ESEC\/FSE'18 <\/span><span class=\"tp_pub_additional_year\">2018<\/span>.<\/span> <span class=\"tp_pub_menu_simple\">(Type: <span class=\"tp_pub_type conference\">Conference<\/span> | <span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_10\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('10','tp_bibtex')\" title=\"Show BibTeX entry\" style=\"cursor:pointer;\">BibTeX<\/a><\/span>)<\/span><div class=\"tp_bibtex\" id=\"tp_bibtex_10\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@conference{refinym,<br \/>\r\ntitle = {RefiNym: Using Names to Refine Types},<br \/>\r\nauthor = {Santanu Kumar Dash and Miltiadis Allamanis and Earl T. Barr},<br \/>\r\nyear  = {2018},<br \/>\r\ndate = {2018-01-01},<br \/>\r\nurldate = {2018-01-01},<br \/>\r\nbooktitle = {26th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering},<br \/>\r\nseries = {ESEC\/FSE'18},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {conference}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('10','tp_bibtex')\">Close<\/a><\/p><\/div><\/td><\/tr><tr>\r\n                    <td colspan=\"2\">\r\n                        <h3 class=\"tp_h3\" id=\"tp_h3_2017\">2017<\/h3>\r\n                    <\/td>\r\n                <\/tr><tr class=\"tp_publication_simple tp_publication_simple_conference\"><td class=\"tp_pub_number_simple\">13.<\/td><td class=\"tp_pub_info_simple\"><span class=\"tp_pub_author_simple\"> Jordaney R;  Sharad K;  Dash S K;  Wang Z;  Papini D;  Nouretdinov I;  Cavallaro L<\/span>: <span class=\"tp_pub_title_simple\">Transcend: Detecting Concept Drift in Malware Classification Models<\/span>. <span class=\"tp_pub_additional_simple\"><span class=\"tp_pub_additional_booktitle\">26th USENIX Security Symposium (USENIX Security 17), <\/span><span class=\"tp_pub_additional_publisher\">USENIX Association, <\/span><span class=\"tp_pub_additional_year\">2017<\/span>.<\/span> <span class=\"tp_pub_menu_simple\">(Type: <span class=\"tp_pub_type conference\">Conference<\/span> | <span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_12\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('12','tp_bibtex')\" title=\"Show BibTeX entry\" style=\"cursor:pointer;\">BibTeX<\/a><\/span>)<\/span><div class=\"tp_bibtex\" id=\"tp_bibtex_12\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@conference{transcend,<br \/>\r\ntitle = {Transcend: Detecting Concept Drift in Malware Classification Models},<br \/>\r\nauthor = {Roberto Jordaney and Kumar Sharad and Santanu K. Dash and Zhi Wang and Davide Papini and Ilia Nouretdinov and Lorenzo Cavallaro},<br \/>\r\nyear  = {2017},<br \/>\r\ndate = {2017-01-01},<br \/>\r\nurldate = {2017-01-01},<br \/>\r\nbooktitle = {26th USENIX Security Symposium (USENIX Security 17)},<br \/>\r\npages = {625--642},<br \/>\r\npublisher = {USENIX Association},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {conference}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('12','tp_bibtex')\">Close<\/a><\/p><\/div><\/td><\/tr><tr class=\"tp_publication_simple tp_publication_simple_conference\"><td class=\"tp_pub_number_simple\">12.<\/td><td class=\"tp_pub_info_simple\"><span class=\"tp_pub_author_simple\"> Suarez-Tangil G;  Dash S K;  Ahmadi M;  Kinder J;  Giacinto G;  Cavallaro L<\/span>: <span class=\"tp_pub_title_simple\">DroidSieve: Fast and Accurate Classification of Obfuscated Android Malware<\/span>. <span class=\"tp_pub_additional_simple\"><span class=\"tp_pub_additional_booktitle\">Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy, <\/span><span class=\"tp_pub_additional_series\">CODASPY '17 <\/span><span class=\"tp_pub_additional_year\">2017<\/span>.<\/span> <span class=\"tp_pub_menu_simple\">(Type: <span class=\"tp_pub_type conference\">Conference<\/span> | <span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_14\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('14','tp_bibtex')\" title=\"Show BibTeX entry\" style=\"cursor:pointer;\">BibTeX<\/a><\/span>)<\/span><div class=\"tp_bibtex\" id=\"tp_bibtex_14\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@conference{droidsieve,<br \/>\r\ntitle = {DroidSieve: Fast and Accurate Classification of Obfuscated Android Malware},<br \/>\r\nauthor = {Guillermo Suarez-Tangil and Santanu Kumar Dash and Mansour Ahmadi and Johannes Kinder and Giorgio Giacinto and Lorenzo Cavallaro},<br \/>\r\nyear  = {2017},<br \/>\r\ndate = {2017-01-01},<br \/>\r\nurldate = {2017-01-01},<br \/>\r\nbooktitle = {Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy},<br \/>\r\npages = {309--320},<br \/>\r\nseries = {CODASPY '17},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {conference}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('14','tp_bibtex')\">Close<\/a><\/p><\/div><\/td><\/tr><tr class=\"tp_publication_simple tp_publication_simple_conference\"><td class=\"tp_pub_number_simple\">11.<\/td><td class=\"tp_pub_info_simple\"><span class=\"tp_pub_author_simple\"> Hurier M;  Suarez-Tangil G;  Dash S K;  Bissyand\u00e9 T F;  Traon Y L;  Klein J;  Cavallaro L<\/span>: <span class=\"tp_pub_title_simple\">Euphony: Harmonious Unification of Cacophonous Anti-virus Vendor Labels for Android Malware<\/span>. <span class=\"tp_pub_additional_simple\"><span class=\"tp_pub_additional_booktitle\">Proceedings of the 14th International Conference on Mining Software Repositories, <\/span><span class=\"tp_pub_additional_series\">MSR '17 <\/span><span class=\"tp_pub_additional_year\">2017<\/span><span class=\"tp_pub_additional_note\">, (textbf[CORE A])<\/span>.<\/span> <span class=\"tp_pub_menu_simple\">(Type: <span class=\"tp_pub_type conference\">Conference<\/span> | <span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_13\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('13','tp_bibtex')\" title=\"Show BibTeX entry\" style=\"cursor:pointer;\">BibTeX<\/a><\/span>)<\/span><div class=\"tp_bibtex\" id=\"tp_bibtex_13\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@conference{euphony,<br \/>\r\ntitle = {Euphony: Harmonious Unification of Cacophonous Anti-virus Vendor Labels for Android Malware},<br \/>\r\nauthor = {M\u00e9d\u00e9ric Hurier and Guillermo Suarez-Tangil and Santanu Kumar Dash and Tegawend\u00e9 F. Bissyand\u00e9 and Yves Le Traon and Jacques Klein and Lorenzo Cavallaro},<br \/>\r\nyear  = {2017},<br \/>\r\ndate = {2017-01-01},<br \/>\r\nurldate = {2017-01-01},<br \/>\r\nbooktitle = {Proceedings of the 14th International Conference on Mining Software Repositories},<br \/>\r\npages = {425--435},<br \/>\r\nseries = {MSR '17},<br \/>\r\nnote = {textbf[CORE A]},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {conference}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('13','tp_bibtex')\">Close<\/a><\/p><\/div><\/td><\/tr><tr>\r\n                    <td colspan=\"2\">\r\n                        <h3 class=\"tp_h3\" id=\"tp_h3_2016\">2016<\/h3>\r\n                    <\/td>\r\n                <\/tr><tr class=\"tp_publication_simple tp_publication_simple_article\"><td class=\"tp_pub_number_simple\">10.<\/td><td class=\"tp_pub_info_simple\"><span class=\"tp_pub_author_simple\"> Dash S K;  Suarez-Tangil G;  Khan S;  Tam K;  Ahmadi M;  Kinder J;  Cavallaro L<\/span>: <span class=\"tp_pub_title_simple\">DroidScribe: Classifying Android Malware Based on Runtime Behavior<\/span>. <span class=\"tp_pub_additional_simple\"><span class=\"tp_pub_additional_in\">In: <\/span><span class=\"tp_pub_additional_journal\">Mobile Security Technologies (MoST 2016), <\/span><span class=\"tp_pub_additional_volume\">vol. 7148, <\/span><span class=\"tp_pub_additional_pages\">pp. 1\u201312, <\/span><span class=\"tp_pub_additional_year\">2016<\/span>.<\/span> <span class=\"tp_pub_menu_simple\">(Type: <span class=\"tp_pub_type article\">Journal Article<\/span> | <span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_16\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('16','tp_bibtex')\" title=\"Show BibTeX entry\" style=\"cursor:pointer;\">BibTeX<\/a><\/span>)<\/span><div class=\"tp_bibtex\" id=\"tp_bibtex_16\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@article{dash2016droidscribe,<br \/>\r\ntitle = {DroidScribe: Classifying Android Malware Based on Runtime Behavior},<br \/>\r\nauthor = {Santanu Kumar Dash and Guillermo Suarez-Tangil and Salahuddin Khan and Kimberly Tam and Mansour Ahmadi and Johannes Kinder and Lorenzo Cavallaro},<br \/>\r\nyear  = {2016},<br \/>\r\ndate = {2016-01-01},<br \/>\r\njournal = {Mobile Security Technologies (MoST 2016)},<br \/>\r\nvolume = {7148},<br \/>\r\npages = {1--12},<br \/>\r\npublisher = {IEEE},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {article}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('16','tp_bibtex')\">Close<\/a><\/p><\/div><\/td><\/tr><tr class=\"tp_publication_simple tp_publication_simple_article\"><td class=\"tp_pub_number_simple\">9.<\/td><td class=\"tp_pub_info_simple\"><span class=\"tp_pub_author_simple\"> Deo A;  Dash S K;  Suarez-Tangil G;  Vovk V;  Cavallaro L<\/span>: <span class=\"tp_pub_title_simple\">Prescience: Probabilistic Guidance on the Retraining Conundrum for Malware Detection<\/span>. <span class=\"tp_pub_additional_simple\"><span class=\"tp_pub_additional_in\">In: <\/span><span class=\"tp_pub_additional_journal\">Artificial Intelligence and Security (AISec 2016), <\/span><span class=\"tp_pub_additional_year\">2016<\/span>.<\/span> <span class=\"tp_pub_menu_simple\">(Type: <span class=\"tp_pub_type article\">Journal Article<\/span> | <span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_15\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('15','tp_bibtex')\" title=\"Show BibTeX entry\" style=\"cursor:pointer;\">BibTeX<\/a><\/span>)<\/span><div class=\"tp_bibtex\" id=\"tp_bibtex_15\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@article{deo2016prescience,<br \/>\r\ntitle = {Prescience: Probabilistic Guidance on the Retraining Conundrum for Malware Detection},<br \/>\r\nauthor = {Amit Deo and Santanu Kumar Dash and Guillermo Suarez-Tangil and Volodya Vovk and Lorenzo Cavallaro},<br \/>\r\nyear  = {2016},<br \/>\r\ndate = {2016-01-01},<br \/>\r\njournal = {Artificial Intelligence and Security (AISec 2016)},<br \/>\r\npublisher = {ACM},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {article}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('15','tp_bibtex')\">Close<\/a><\/p><\/div><\/td><\/tr><tr>\r\n                    <td colspan=\"2\">\r\n                        <h3 class=\"tp_h3\" id=\"tp_h3_2015\">2015<\/h3>\r\n                    <\/td>\r\n                <\/tr><tr class=\"tp_publication_simple tp_publication_simple_phdthesis\"><td class=\"tp_pub_number_simple\">8.<\/td><td class=\"tp_pub_info_simple\"><span class=\"tp_pub_author_simple\"> Dash S K<\/span>: <span class=\"tp_pub_title_simple\">Adaptive Constraint Solving for Information Flow Analysis<\/span>. <span class=\"tp_pub_additional_simple\"><span class=\"tp_pub_additional_school\">University of Hertfordshire, <\/span><span class=\"tp_pub_additional_year\">2015<\/span>.<\/span> <span class=\"tp_pub_menu_simple\">(Type: <span class=\"tp_pub_type phdthesis\">PhD Thesis<\/span> | <span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_17\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('17','tp_bibtex')\" title=\"Show BibTeX entry\" style=\"cursor:pointer;\">BibTeX<\/a><\/span>)<\/span><div class=\"tp_bibtex\" id=\"tp_bibtex_17\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@phdthesis{dash2015adaptive,<br \/>\r\ntitle = {Adaptive Constraint Solving for Information Flow Analysis},<br \/>\r\nauthor = {Santanu Kumar Dash},<br \/>\r\nyear  = {2015},<br \/>\r\ndate = {2015-01-01},<br \/>\r\nschool = {University of Hertfordshire},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {phdthesis}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('17','tp_bibtex')\">Close<\/a><\/p><\/div><\/td><\/tr><tr>\r\n                    <td colspan=\"2\">\r\n                        <h3 class=\"tp_h3\" id=\"tp_h3_2013\">2013<\/h3>\r\n                    <\/td>\r\n                <\/tr><tr class=\"tp_publication_simple tp_publication_simple_conference\"><td class=\"tp_pub_number_simple\">7.<\/td><td class=\"tp_pub_info_simple\"><span class=\"tp_pub_author_simple\"> Dash S K;  Scholz S;  Christianson B<\/span>: <span class=\"tp_pub_title_simple\">Modular design of data-parallel graph algorithms<\/span>. <span class=\"tp_pub_additional_simple\"><span class=\"tp_pub_additional_booktitle\">High Performance Computing and Simulation (HPCS), 2013 International Conference on, <\/span><span class=\"tp_pub_additional_organization\">IEEE <\/span><span class=\"tp_pub_additional_year\">2013<\/span>.<\/span> <span class=\"tp_pub_menu_simple\">(Type: <span class=\"tp_pub_type conference\">Conference<\/span> | <span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_19\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('19','tp_bibtex')\" title=\"Show BibTeX entry\" style=\"cursor:pointer;\">BibTeX<\/a><\/span>)<\/span><div class=\"tp_bibtex\" id=\"tp_bibtex_19\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@conference{dash2013modular,<br \/>\r\ntitle = {Modular design of data-parallel graph algorithms},<br \/>\r\nauthor = {Santanu Kumar Dash and Sven-Bodo Scholz and Bruce Christianson},<br \/>\r\nyear  = {2013},<br \/>\r\ndate = {2013-01-01},<br \/>\r\nurldate = {2013-01-01},<br \/>\r\nbooktitle = {High Performance Computing and Simulation (HPCS), 2013 International Conference on},<br \/>\r\npages = {398--404},<br \/>\r\norganization = {IEEE},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {conference}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('19','tp_bibtex')\">Close<\/a><\/p><\/div><\/td><\/tr><tr class=\"tp_publication_simple tp_publication_simple_article\"><td class=\"tp_pub_number_simple\">6.<\/td><td class=\"tp_pub_info_simple\"><span class=\"tp_pub_author_simple\"> Dash S K;  Scholz S;  Herhut S;  Christianson B<\/span>: <span class=\"tp_pub_title_simple\">A scalable approach to computing representative lowest common ancestor in directed acyclic graphs<\/span>. <span class=\"tp_pub_additional_simple\"><span class=\"tp_pub_additional_in\">In: <\/span><span class=\"tp_pub_additional_journal\">Theoretical Computer Science, <\/span><span class=\"tp_pub_additional_volume\">vol. 513, <\/span><span class=\"tp_pub_additional_pages\">pp. 25\u201337, <\/span><span class=\"tp_pub_additional_year\">2013<\/span><span class=\"tp_pub_additional_note\">, (textbf[CORE A])<\/span>.<\/span> <span class=\"tp_pub_menu_simple\">(Type: <span class=\"tp_pub_type article\">Journal Article<\/span> | <span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_18\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('18','tp_bibtex')\" title=\"Show BibTeX entry\" style=\"cursor:pointer;\">BibTeX<\/a><\/span>)<\/span><div class=\"tp_bibtex\" id=\"tp_bibtex_18\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@article{dash2013scalable,<br \/>\r\ntitle = {A scalable approach to computing representative lowest common ancestor in directed acyclic graphs},<br \/>\r\nauthor = {Santanu Kumar Dash and Sven-Bodo Scholz and Stephan Herhut and Bruce Christianson},<br \/>\r\nyear  = {2013},<br \/>\r\ndate = {2013-01-01},<br \/>\r\njournal = {Theoretical Computer Science},<br \/>\r\nvolume = {513},<br \/>\r\npages = {25--37},<br \/>\r\npublisher = {Elsevier},<br \/>\r\nnote = {textbf[CORE A]},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {article}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('18','tp_bibtex')\">Close<\/a><\/p><\/div><\/td><\/tr><tr>\r\n                    <td colspan=\"2\">\r\n                        <h3 class=\"tp_h3\" id=\"tp_h3_2010\">2010<\/h3>\r\n                    <\/td>\r\n                <\/tr><tr class=\"tp_publication_simple tp_publication_simple_article\"><td class=\"tp_pub_number_simple\">5.<\/td><td class=\"tp_pub_info_simple\"><span class=\"tp_pub_author_simple\"> Dash S K;  Srikanthan T<\/span>: <span class=\"tp_pub_title_simple\">Instruction cache tuning for embedded multitasking applications<\/span>. <span class=\"tp_pub_additional_simple\"><span class=\"tp_pub_additional_in\">In: <\/span><span class=\"tp_pub_additional_journal\">IET computers &amp; digital techniques, <\/span><span class=\"tp_pub_additional_volume\">vol. 4, <\/span><span class=\"tp_pub_additional_number\">no. 6, <\/span><span class=\"tp_pub_additional_pages\">pp. 439\u2013457, <\/span><span class=\"tp_pub_additional_year\">2010<\/span>.<\/span> <span class=\"tp_pub_menu_simple\">(Type: <span class=\"tp_pub_type article\">Journal Article<\/span> | <span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_20\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('20','tp_bibtex')\" title=\"Show BibTeX entry\" style=\"cursor:pointer;\">BibTeX<\/a><\/span>)<\/span><div class=\"tp_bibtex\" id=\"tp_bibtex_20\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@article{dash2010instruction,<br \/>\r\ntitle = {Instruction cache tuning for embedded multitasking applications},<br \/>\r\nauthor = {Santanu Kumar Dash and Thambipillai Srikanthan},<br \/>\r\nyear  = {2010},<br \/>\r\ndate = {2010-01-01},<br \/>\r\njournal = {IET computers & digital techniques},<br \/>\r\nvolume = {4},<br \/>\r\nnumber = {6},<br \/>\r\npages = {439--457},<br \/>\r\npublisher = {IET},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {article}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('20','tp_bibtex')\">Close<\/a><\/p><\/div><\/td><\/tr><tr>\r\n                    <td colspan=\"2\">\r\n                        <h3 class=\"tp_h3\" id=\"tp_h3_2009\">2009<\/h3>\r\n                    <\/td>\r\n                <\/tr><tr class=\"tp_publication_simple tp_publication_simple_mastersthesis\"><td class=\"tp_pub_number_simple\">4.<\/td><td class=\"tp_pub_info_simple\"><span class=\"tp_pub_author_simple\"> Dash S K<\/span>: <span class=\"tp_pub_title_simple\">Profile driven schemes for energy-sensitive cache hierarchy<\/span>. <span class=\"tp_pub_additional_simple\"><span class=\"tp_pub_additional_school\">Nanyang Technological University, <\/span><span class=\"tp_pub_additional_year\">2009<\/span>.<\/span> <span class=\"tp_pub_menu_simple\">(Type: <span class=\"tp_pub_type mastersthesis\">Masters Thesis<\/span> | <span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_21\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('21','tp_bibtex')\" title=\"Show BibTeX entry\" style=\"cursor:pointer;\">BibTeX<\/a><\/span>)<\/span><div class=\"tp_bibtex\" id=\"tp_bibtex_21\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@mastersthesis{dash2009profile,<br \/>\r\ntitle = {Profile driven schemes for energy-sensitive cache hierarchy},<br \/>\r\nauthor = {Santanu Kumar Dash},<br \/>\r\nyear  = {2009},<br \/>\r\ndate = {2009-01-01},<br \/>\r\nschool = {Nanyang Technological University},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {mastersthesis}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('21','tp_bibtex')\">Close<\/a><\/p><\/div><\/td><\/tr><tr class=\"tp_publication_simple tp_publication_simple_conference\"><td class=\"tp_pub_number_simple\">3.<\/td><td class=\"tp_pub_info_simple\"><span class=\"tp_pub_author_simple\"> Dash S K;  Srikanthan T<\/span>: <span class=\"tp_pub_title_simple\">Instruction Cache Tuning for Embedded Multitasking Applications<\/span>. <span class=\"tp_pub_additional_simple\"><span class=\"tp_pub_additional_booktitle\">IEEE\/IFIP International Symposium on Rapid System Prototyping, <\/span><span class=\"tp_pub_additional_organization\">IEEE <\/span><span class=\"tp_pub_additional_year\">2009<\/span>.<\/span> <span class=\"tp_pub_menu_simple\">(Type: <span class=\"tp_pub_type conference\">Conference<\/span> | <span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_22\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('22','tp_bibtex')\" title=\"Show BibTeX entry\" style=\"cursor:pointer;\">BibTeX<\/a><\/span>)<\/span><div class=\"tp_bibtex\" id=\"tp_bibtex_22\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@conference{dash2009instruction,<br \/>\r\ntitle = {Instruction Cache Tuning for Embedded Multitasking Applications},<br \/>\r\nauthor = {Santanu Kumar Dash and Thambipillai Srikanthan},<br \/>\r\nyear  = {2009},<br \/>\r\ndate = {2009-01-01},<br \/>\r\nurldate = {2009-01-01},<br \/>\r\nbooktitle = {IEEE\/IFIP International Symposium on Rapid System Prototyping},<br \/>\r\npages = {152--158},<br \/>\r\norganization = {IEEE},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {conference}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('22','tp_bibtex')\">Close<\/a><\/p><\/div><\/td><\/tr><tr class=\"tp_publication_simple tp_publication_simple_conference\"><td class=\"tp_pub_number_simple\">2.<\/td><td class=\"tp_pub_info_simple\"><span class=\"tp_pub_author_simple\"> Dash S K;  Srikanthan T<\/span>: <span class=\"tp_pub_title_simple\">Modeling RTOS Components for Instruction Cache Hit Rate Estimation<\/span>. <span class=\"tp_pub_additional_simple\"><span class=\"tp_pub_additional_booktitle\">2009 IEEE International Symposium on Circuits and Systems, <\/span><span class=\"tp_pub_additional_organization\">IEEE <\/span><span class=\"tp_pub_additional_year\">2009<\/span>.<\/span> <span class=\"tp_pub_menu_simple\">(Type: <span class=\"tp_pub_type conference\">Conference<\/span> | <span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_23\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('23','tp_bibtex')\" title=\"Show BibTeX entry\" style=\"cursor:pointer;\">BibTeX<\/a><\/span>)<\/span><div class=\"tp_bibtex\" id=\"tp_bibtex_23\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@conference{dash2009modeling,<br \/>\r\ntitle = {Modeling RTOS Components for Instruction Cache Hit Rate Estimation},<br \/>\r\nauthor = {Santanu Kumar Dash and Thambipillai Srikanthan},<br \/>\r\nyear  = {2009},<br \/>\r\ndate = {2009-01-01},<br \/>\r\nurldate = {2009-01-01},<br \/>\r\nbooktitle = {2009 IEEE International Symposium on Circuits and Systems},<br \/>\r\npages = {2978--2981},<br \/>\r\norganization = {IEEE},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {conference}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('23','tp_bibtex')\">Close<\/a><\/p><\/div><\/td><\/tr><tr>\r\n                    <td colspan=\"2\">\r\n                        <h3 class=\"tp_h3\" id=\"tp_h3_2008\">2008<\/h3>\r\n                    <\/td>\r\n                <\/tr><tr class=\"tp_publication_simple tp_publication_simple_conference\"><td class=\"tp_pub_number_simple\">1.<\/td><td class=\"tp_pub_info_simple\"><span class=\"tp_pub_author_simple\"> Dash S K;  Srikanthan T<\/span>: <span class=\"tp_pub_title_simple\">Rapid estimation of instruction cache hit rates using loop profiling<\/span>. <span class=\"tp_pub_additional_simple\"><span class=\"tp_pub_additional_booktitle\">2008 International Conference on Application-Specific Systems, Architectures and Processors, <\/span><span class=\"tp_pub_additional_organization\">IEEE <\/span><span class=\"tp_pub_additional_year\">2008<\/span>.<\/span> <span class=\"tp_pub_menu_simple\">(Type: <span class=\"tp_pub_type conference\">Conference<\/span> | <span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_24\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('24','tp_bibtex')\" title=\"Show BibTeX entry\" style=\"cursor:pointer;\">BibTeX<\/a><\/span>)<\/span><div class=\"tp_bibtex\" id=\"tp_bibtex_24\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@conference{dash2008rapid,<br \/>\r\ntitle = {Rapid estimation of instruction cache hit rates using loop profiling},<br \/>\r\nauthor = {Santanu Kumar Dash and Thambipillai Srikanthan},<br \/>\r\nyear  = {2008},<br \/>\r\ndate = {2008-01-01},<br \/>\r\nurldate = {2008-01-01},<br \/>\r\nbooktitle = {2008 International Conference on Application-Specific Systems, Architectures and Processors},<br \/>\r\npages = {263--268},<br \/>\r\norganization = {IEEE},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {conference}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('24','tp_bibtex')\">Close<\/a><\/p><\/div><\/td><\/tr><\/table><\/div>\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-28","page","type-page","status-publish","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/santanu.uk\/index.php\/wp-json\/wp\/v2\/pages\/28","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/santanu.uk\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/santanu.uk\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/santanu.uk\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/santanu.uk\/index.php\/wp-json\/wp\/v2\/comments?post=28"}],"version-history":[{"count":26,"href":"https:\/\/santanu.uk\/index.php\/wp-json\/wp\/v2\/pages\/28\/revisions"}],"predecessor-version":[{"id":377,"href":"https:\/\/santanu.uk\/index.php\/wp-json\/wp\/v2\/pages\/28\/revisions\/377"}],"wp:attachment":[{"href":"https:\/\/santanu.uk\/index.php\/wp-json\/wp\/v2\/media?parent=28"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}