Publications

Computer Security Top-Tier Venues
IEEE Symposium on Security & Privacy (S&P), USENIX Security Symposium (USENIX), ACM Conference on Computer and Communications Security (CCS), and the ISOC Network and Distributed Systems Security Symposium (NDSS)
Software Engineering Top-Tier Venues
International Conference on Software Engineering (ICSE), European Software Engineering Conference/ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE) and Automated Software Engineering Conference (ASE)
Premier Journals
ACM Transactions on Privacy & Security (TOPS)
ACM Transactions on Software Engineering and Methodology (TOSEM)

Conference Articles

1. P. Mandal, A. S. Ami, V. Olaiya, S. H. Razmjo, and A. Nadkarni, “‘Belt and suspenders’ or ‘just red tape’?: Investigating Early Artifacts and User Perceptions of IoT App Security Certification,” in Proceedings of the 2024 USENIX Security Symposium (USENIX), Aug. 2024.
[ PDF]
BibTeX
@inproceedings{maon24,
  author = {Mandal, Prianka and Ami, Amit Seal and Olaiya, Victor and Razmjo, Sayyed Hadi and Nadkarni, Adwait},
  title = {{"Belt and suspenders" or "just red tape"?: Investigating Early Artifacts and User Perceptions of IoT App Security Certification}},
  booktitle = {Proceedings of the 2024 USENIX Security Symposium (USENIX)},
  year = {2024},
  month = aug,
  month_numeric = {8}
}

2. A. S. Ami, K. Moran, D. Poshyvanyk, and A. Nadkarni, “‘False negative - that one is going to kill you’ - Understanding Industry Perspectives of Static Analysis based Security Testing,” in Proceedings of the 2024 IEEE Symposium on Security and Privacy (S&P), San Francisco, CA, USA, May 2024.
BibTeX
@inproceedings{ami-fn-oakland24,
  author = {Ami, Amit Seal and Moran, Kevin and Poshyvanyk, Denys and Nadkarni, Adwait},
  title = {{"False negative - that one is going to kill you" - Understanding Industry Perspectives of Static Analysis based Security Testing}},
  booktitle = {Proceedings of the 2024 IEEE Symposium on Security and Privacy (S\&P)},
  address = {San Francisco, CA, USA},
  year = {2024},
  publisher = {IEEE Computer Society},
  month = may,
  note = {to be published in},
  month_numeric = {5}
}

3. A. S. Ami, N. Cooper, K. Kafle, K. Moran, D. Poshyvanyk, and A. Nadkarni, “Why Crypto-detectors Fail: A Systematic Evaluation of Cryptographic Misuse Detection Techniques,” in 2022 IEEE Symposium on Security and Privacy (S&P), San Francisco, CA, USA, May 2022, pp. 397–414, doi: 10.1109/SP46214.2022.9833582 [Online]. Available at: https://ieeexplore.ieee.org/document/9833582
BibTeX
@inproceedings{ami-masc-oakland22,
  author = {Ami, {Amit Seal} and Cooper, Nathan and Kafle, Kaushal and Moran, Kevin and Poshyvanyk, Denys and Nadkarni, Adwait},
  booktitle = {2022 IEEE Symposium on Security and Privacy (S\&P)},
  title = {{Why Crypto-detectors Fail: A Systematic Evaluation of Cryptographic Misuse Detection Techniques}},
  year = {2022},
  address = {San Francisco, CA, USA},
  month = may,
  pages = {397--414},
  publisher = {IEEE Computer Society},
  issn = {2375-1207},
  url = {https://ieeexplore.ieee.org/document/9833582},
  doi = {10.1109/SP46214.2022.9833582},
  month_numeric = {5}
}

4. P. Mandal and A. S. Ami, “Selecting Best Attributes for Software Defect Prediction,” in 2015 IEEE International WIE Conference on Electrical and Computer Engineering (WIECON-ECE), Dec. 2015, pp. 110–113, doi: 10.1109/WIECON-ECE.2015.7444011.
BibTeX
@inproceedings{SelectingBestAttributesmandal2015,
  title = {Selecting Best Attributes for Software Defect Prediction},
  booktitle = {2015 {{IEEE International WIE Conference}} on {{Electrical}} and {{Computer Engineering}} ({{WIECON}}-{{ECE}})},
  author = {Mandal, Prianka and Ami, {Amit Seal}},
  year = {2015},
  month = dec,
  pages = {110--113},
  doi = {10.1109/WIECON-ECE.2015.7444011},
  month_numeric = {12}
}

5. A. S. Ami and M. S. Islam, “An Efficient Approach for Providing Rationale of Method Change for Object Oriented Programming,” in 2014 International Conference on Informatics, Electronics Vision (ICIEV), May 2014, pp. 1–6, doi: 10.1109/ICIEV.2014.6850772.
BibTeX
@inproceedings{EfficientApproachProvidingamitsealami2014,
  title = {An Efficient Approach for Providing Rationale of Method Change for Object Oriented Programming},
  booktitle = {2014 {{International Conference}} on {{Informatics}}, {{Electronics Vision}} ({{ICIEV}})},
  author = {Ami, Amit Seal and Islam, Md. Shariful},
  year = {2014},
  month = may,
  pages = {1--6},
  doi = {10.1109/ICIEV.2014.6850772},
  month_numeric = {5}
}

6. A. U. Gias et al., “A Formal Approach to Verify Software Scalability Requirements Using Set Theory and Hoare Triple,” in 16th Int’l Conf. Computer and Information Technology, Mar. 2014, pp. 7–12, doi: 10.1109/ICCITechn.2014.6997367.
BibTeX
@inproceedings{FormalApproachVerifygias2014,
  title = {A Formal Approach to Verify Software Scalability Requirements Using Set Theory and {{Hoare}} Triple},
  booktitle = {16th {{Int}}'l {{Conf}}. {{Computer}} and {{Information Technology}}},
  author = {Gias, Alim Ul and Tabassum, {Mirza Rehenuma} and Ami, {Amit Seal} and Imran, Asif and Ibrahim, Mohammad and Rahman, Rayhanur and Sakib, Kazi},
  year = {2014},
  month = mar,
  pages = {7--12},
  doi = {10.1109/ICCITechn.2014.6997367},
  month_numeric = {3}
}

7. A. Imran et al., “Cloud-Niagara: A High Availability and Low Overhead Fault Tolerance Middleware for the Cloud,” in 16th Int’l Conf. Computer and Information Technology, Mar. 2014, pp. 271–276, doi: 10.1109/ICCITechn.2014.6997344.
BibTeX
@inproceedings{CloudNiagaraHighAvailabilityimran2014,
  title = {Cloud-{{Niagara}}: {{A}} High Availability and Low Overhead Fault Tolerance Middleware for the Cloud},
  shorttitle = {Cloud-{{Niagara}}},
  booktitle = {16th {{Int}}'l {{Conf}}. {{Computer}} and {{Information Technology}}},
  author = {Imran, Asif and Gias, {Alim Ul} and Rahman, Rayhanur and Ami, {Amit Seal} and Rahman, Tajkia and Ishraque, Farhan and Sakib, Kazi},
  year = {2014},
  month = mar,
  pages = {271--276},
  doi = {10.1109/ICCITechn.2014.6997344},
  month_numeric = {3}
}

Journal Articles

1. A. S. Ami, K. Kafle, K. Moran, A. Nadkarni, and D. Poshyvanyk, “Systematic Mutation-based Evaluation of the Soundness of Security-focused Android Static Analysis Techniques,” ACM Transactions on Privacy and Security, vol. 24, no. 3, Feb. 2021 [Online]. Available at: https://doi.org/10.1145/3439802
BibTeX
@article{musetops,
  author = {Ami, {Amit Seal} and Kafle, Kaushal and Moran, Kevin and Nadkarni, Adwait and Poshyvanyk, Denys},
  title = {Systematic Mutation-based Evaluation of the Soundness of Security-focused Android Static Analysis Techniques},
  journal = {ACM Transactions on Privacy and Security},
  month = feb,
  articleno = {15},
  numpages = {37},
  year = {2021},
  issue_date = {February 2021},
  publisher = {Association for Computing Machinery},
  address = {New York, NY, USA},
  volume = {24},
  number = {3},
  issn = {2471-2566},
  url = {https://doi.org/10.1145/3439802},
  month_numeric = {2}
}

2. M. Shafiuzzaman, A. S. Ami, and R. Rahman, “A Proactive Self-Adaptive Framework for Context-Aware Mobile Applications,” International Journal of Computer Applications, vol. 180, no. 20, pp. 1–8, Feb. 2018, doi: 10.5120/ijca2018916477. [Online]. Available at: http://www.ijcaonline.org/archives/volume180/number20/29045-2018916477
BibTeX
@article{ProactiveApproachContextawareshafiuzzaman2018,
  author = {Shafiuzzaman, Md. and Ami, Amit Seal and Rahman, Rayhanur},
  title = {A Proactive Self-Adaptive Framework for Context-Aware Mobile Applications},
  journal = {International Journal of Computer Applications},
  issue_date = {February 2018},
  volume = {180},
  number = {20},
  month = feb,
  year = {2018},
  issn = {0975-8887},
  pages = {1-8},
  numpages = {8},
  url = {http://www.ijcaonline.org/archives/volume180/number20/29045-2018916477},
  doi = {10.5120/ijca2018916477},
  publisher = {Foundation of Computer Science (FCS), NY, USA},
  address = {New York, USA},
  month_numeric = {2}
}

3. K. N. Neela, S. A. Ali, A. S. Ami, and A. U. Gias, “Modeling Software Defects as Anomalies: A Case Study on Promise Repository.,” JSW, vol. 12, no. 10, pp. 759–772, 2017.
BibTeX
@article{ModelingSoftwareDefectsneela2017,
  title = {Modeling Software Defects as Anomalies: {{A}} Case Study on Promise Repository.},
  author = {Neela, {Kamrun Nahar} and Ali, {Syed Asif} and Ami, {Amit Seal} and Gias, {Alim Ul}},
  year = {2017},
  volume = {12},
  pages = {759--772},
  journal = {JSW},
  number = {10}
}

4. A. Satter, A. S. Ami, and K. Sakib, “A Static Code Search Technique to Identify Dead Fields by Analyzing Usage of Setup Fields and Field Dependency in Test Code.,” in CDUD@ CLA, 2016, pp. 60–71.
BibTeX
@inproceedings{StaticCodeSearchsatter2016,
  title = {A Static Code Search Technique to Identify Dead Fields by Analyzing Usage of Setup Fields and Field Dependency in Test Code.},
  booktitle = {{{CDUD}}@ {{CLA}}},
  author = {Satter, Abdus and Ami, {Amit Seal} and Sakib, Kazi},
  year = {2016},
  pages = {60--71}
}

5. A. S. Ami and S. Islam, “A Content Assist Based Approach for Providing Rationale of Method Change for Object Oriented Programming,” International Journal of Information Engineering and Electronic Business, vol. 7, no. 1, p. 49, 2015.
BibTeX
@article{ContentAssistBasedami2015,
  title = {A Content Assist Based Approach for Providing Rationale of Method Change for Object Oriented Programming},
  author = {Ami, {Amit Seal} and Islam, Shariful},
  year = {2015},
  volume = {7},
  pages = {49},
  publisher = {{Modern Education and Computer Science Press}},
  journal = {International Journal of Information Engineering and Electronic Business},
  number = {1}
}

Short/Demonstration Papers

1. A. S. Ami et al., “MASC: A Tool for Mutation-Based Evaluation of Static Crypto-API Misuse Detectors,” in Proceedings of the ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE’23), Demonstration Track, San Francisco, Dec. 2023, doi: 10.1145/3611643.3613099.
BibTeX
@inproceedings{asr-masc-demo,
  author = {Ami, Amit Seal and Ahmed, Syed Yusuf and Redoy, Radowan Mahmud and Cooper, Nathan and Kafle, Kaushal and Moran, Kevin and Poshyvanyk, Denys and Nadkarni, Adwait},
  title = {{MASC: A Tool for Mutation-Based Evaluation of Static Crypto-API Misuse Detectors}},
  booktitle = {Proceedings of the ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE'23), Demonstration Track},
  year = {2023},
  doi = {10.1145/3611643.3613099},
  address = {San Francisco},
  month = dec,
  month_numeric = {12}
}

2. A. S. Ami, K. Kafle, K. Moran, A. Nadkarni, and D. Poshyvanyk, “Demo: Mutation-based Evaluation of Security-focused Static Analysis Tools for Android,” in Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering (ICSE’21), Formal Tool Demonstration, Virtual (originally Madrid, Spain), May 25th - 28th, 2021, May 2021.
BibTeX
@inproceedings{demo-muse-2021,
  title = {{Demo: Mutation-based Evaluation of Security-focused Static Analysis Tools for Android}},
  author = {Ami, {Amit Seal} and Kafle, Kaushal and Moran, Kevin and Nadkarni, Adwait and Poshyvanyk, Denys},
  booktitle = {{Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering (ICSE’21), Formal Tool Demonstration, Virtual (originally Madrid, Spain), May 25th - 28th, 2021}},
  year = {2021},
  month = may,
  month_numeric = {5}
}

3. A. S. Ami, M. M. Hasan, M. R. Rahman, and K. Sakib, “MobiCoMonkey - Context Testing of Android Apps,” in IEEE/ACM 5th International Conference on Mobile Software Engineering and Systems (MOBILESoft), May 2018, pp. 76–79.
BibTeX
@inproceedings{MobiCoMonkeyContextTestingami2018,
  title = {{{MobiCoMonkey}} - {{Context Testing}} of {{Android Apps}}},
  booktitle = {{{IEEE}}/{{ACM}} 5th {{International Conference}} on {{Mobile Software Engineering}} and {{Systems}} ({{MOBILESoft}})},
  author = {Ami, Amit Seal and Hasan, Md. Mehedi and Rahman, Md. Rayhanur and Sakib, Kazi},
  year = {2018},
  month = may,
  pages = {76--79},
  month_numeric = {5}
}