Publications
- Computer Security Top-Tier Venues
- IEEE Symposium on Security & Privacy (S&P), USENIX Security Symposium (USENIX), ACM Conference on Computer and Communications Security (CCS), and the ISOC Network and Distributed Systems Security Symposium (NDSS)
- Software Engineering Top-Tier Venues
- International Conference on Software Engineering (ICSE), European Software Engineering Conference/ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE) and Automated Software Engineering Conference (ASE)
- Premier Journals
- ACM Transactions on Privacy & Security (TOPS)
- ACM Transactions on Software Engineering and Methodology (TOSEM)
Conference Articles
1. P. Mandal, A. S. Ami, V. Olaiya, S. H. Razmjo, and A. Nadkarni, “‘Belt and suspenders’ or ‘just red tape’?: Investigating Early Artifacts and User Perceptions of IoT App Security Certification,” in Proceedings of the 2024 USENIX Security Symposium (USENIX), Aug. 2024.
[ PDF]
BibTeX
2. A. S. Ami, K. Moran, D. Poshyvanyk, and A. Nadkarni, “‘False negative - that one is going to kill you’ - Understanding Industry Perspectives of Static Analysis based Security Testing,” in Proceedings of the 2024 IEEE Symposium on Security and Privacy (S&P), San Francisco, CA, USA, May 2024.
BibTeX
3. A. S. Ami, N. Cooper, K. Kafle, K. Moran, D. Poshyvanyk, and A. Nadkarni, “Why Crypto-detectors Fail: A Systematic Evaluation of Cryptographic Misuse Detection Techniques,” in 2022 IEEE Symposium on Security and Privacy (S&P), San Francisco, CA, USA, May 2022, pp. 397–414, doi: 10.1109/SP46214.2022.9833582 [Online]. Available at: https://ieeexplore.ieee.org/document/9833582
BibTeX
4. P. Mandal and A. S. Ami, “Selecting Best Attributes for Software Defect Prediction,” in 2015 IEEE International WIE Conference on Electrical and Computer Engineering (WIECON-ECE), Dec. 2015, pp. 110–113, doi: 10.1109/WIECON-ECE.2015.7444011.
BibTeX
5. A. S. Ami and M. S. Islam, “An Efficient Approach for Providing Rationale of Method Change for Object Oriented Programming,” in 2014 International Conference on Informatics, Electronics Vision (ICIEV), May 2014, pp. 1–6, doi: 10.1109/ICIEV.2014.6850772.
BibTeX
6. A. U. Gias et al., “A Formal Approach to Verify Software Scalability Requirements Using Set Theory and Hoare Triple,” in 16th Int’l Conf. Computer and Information Technology, Mar. 2014, pp. 7–12, doi: 10.1109/ICCITechn.2014.6997367.
BibTeX
7. A. Imran et al., “Cloud-Niagara: A High Availability and Low Overhead Fault Tolerance Middleware for the Cloud,” in 16th Int’l Conf. Computer and Information Technology, Mar. 2014, pp. 271–276, doi: 10.1109/ICCITechn.2014.6997344.
BibTeX
Journal Articles
1. A. S. Ami, K. Kafle, K. Moran, A. Nadkarni, and D. Poshyvanyk, “Systematic Mutation-based Evaluation of the Soundness of Security-focused Android Static Analysis Techniques,” ACM Transactions on Privacy and Security, vol. 24, no. 3, Feb. 2021 [Online]. Available at: https://doi.org/10.1145/3439802
BibTeX
2. M. Shafiuzzaman, A. S. Ami, and R. Rahman, “A Proactive Self-Adaptive Framework for Context-Aware Mobile Applications,” International Journal of Computer Applications, vol. 180, no. 20, pp. 1–8, Feb. 2018, doi: 10.5120/ijca2018916477. [Online]. Available at: http://www.ijcaonline.org/archives/volume180/number20/29045-2018916477
BibTeX
3. K. N. Neela, S. A. Ali, A. S. Ami, and A. U. Gias, “Modeling Software Defects as Anomalies: A Case Study on Promise Repository.,” JSW, vol. 12, no. 10, pp. 759–772, 2017.
BibTeX
4. A. Satter, A. S. Ami, and K. Sakib, “A Static Code Search Technique to Identify Dead Fields by Analyzing Usage of Setup Fields and Field Dependency in Test Code.,” in CDUD@ CLA, 2016, pp. 60–71.
BibTeX
5. A. S. Ami and S. Islam, “A Content Assist Based Approach for Providing Rationale of Method Change for Object Oriented Programming,” International Journal of Information Engineering and Electronic Business, vol. 7, no. 1, p. 49, 2015.
BibTeX
Short/Demonstration Papers
1. A. S. Ami et al., “MASC: A Tool for Mutation-Based Evaluation of Static Crypto-API Misuse Detectors,” in Proceedings of the ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE’23), Demonstration Track, San Francisco, Dec. 2023, doi: 10.1145/3611643.3613099.
BibTeX
2. A. S. Ami, K. Kafle, K. Moran, A. Nadkarni, and D. Poshyvanyk, “Demo: Mutation-based Evaluation of Security-focused Static Analysis Tools for Android,” in Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering (ICSE’21), Formal Tool Demonstration, Virtual (originally Madrid, Spain), May 25th - 28th, 2021, May 2021.