Publications

[1]A. S. Ami, K. Kafle, K. Moran, A. Nadkarni, and D. Poshyvanyk, “Demo: Mutation-based Evaluation of Security-focused Static Analysis Tools for Android,” in Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering (ICSE’21), Formal Tool Demonstration, Virtual (originally Madrid, Spain), May 25th - 28th, 2021, 2021. [articlePDF] [languageWebsite] [videocamVideo] [sourceCode]
Bibtex
@inproceedings{demo-muse-2021,
  title = {{Demo: Mutation-based Evaluation of Security-focused Static Analysis Tools for Android}},
  author = {Ami, {Amit Seal} and Kafle, Kaushal and Moran, Kevin and Nadkarni, Adwait and Poshyvanyk, Denys},
  booktitle = {{Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering (ICSE’21), Formal Tool Demonstration, Virtual (originally Madrid, Spain), May 25th - 28th, 2021}},
  year = {2021},
  month = may,
  sourcecode = {https://github.com/LordAmit/muse},
  website = {https://muse-security-evaluation.github.io},
  video = {https://youtu.be/Kfkzi57gYys},
  pdf = {https://arxiv.org/abs/2102.06823}
}

[2]A. S. Ami, K. Kafle, K. Moran, A. Nadkarni, and D. Poshyvanyk, “Systematic Mutation-based Evaluation of the Soundness of Security-focused Android Static Analysis Techniques,” ACM Transactions on Privacy and Security, vol. 24, no. 3, Feb. 2021 [Online]. Available at: https://doi.org/10.1145/3439802 [articlePDF] [languageWebsite] [sourceCode]
Bibtex
@article{musetops,
  author = {Ami, Amit Seal and Kafle, Kaushal and Moran, Kevin and Nadkarni, Adwait and Poshyvanyk, Denys},
  title = {Systematic Mutation-based Evaluation of the Soundness of Security-focused Android Static Analysis Techniques},
  journal = {ACM Transactions on Privacy and Security},
  month = feb,
  articleno = {15},
  numpages = {37},
  year = {2021},
  issue_date = {February 2021},
  publisher = {Association for Computing Machinery},
  address = {New York, NY, USA},
  volume = {24},
  number = {3},
  issn = {2471-2566},
  url = {https://doi.org/10.1145/3439802},
  sourcecode = {https://github.com/LordAmit/muse},
  website = {https://muse-security-evaluation.github.io},
  pdf = {https://arxiv.org/abs/2102.06829}
}

[3]A. S. Ami, M. M. Hasan, M. R. Rahman, and K. Sakib, “MobiCoMonkey - Context Testing of Android Apps,” in IEEE/ACM 5th International Conference on Mobile Software Engineering and Systems (MOBILESoft), 2018, pp. 76–79. [articlePDF] [sourceCode]
Bibtex
@inproceedings{MobiCoMonkeyContextTestingami2018,
  title = {{{MobiCoMonkey}} - {{Context Testing}} of {{Android Apps}}},
  booktitle = {{{IEEE}}/{{ACM}} 5th {{International Conference}} on {{Mobile Software Engineering}} and {{Systems}} ({{MOBILESoft}})},
  author = {Ami, Amit Seal and Hasan, Md. Mehedi and Rahman, Md. Rayhanur and Sakib, Kazi},
  year = {2018},
  month = may,
  pages = {76--79},
  pdf = {https://arxiv.org/abs/1804.02533},
  sourcecode = {https://github.com/LordAmit/mobile-monkey}
}

[4]K. N. Neela, S. A. Ali, A. S. Ami, and A. U. Gias, “Modeling Software Defects as Anomalies: A Case Study on Promise Repository.,” JSW, vol. 12, no. 10, pp. 759–772, 2017.
Bibtex
@article{ModelingSoftwareDefectsneela2017,
  title = {Modeling Software Defects as Anomalies: {{A}} Case Study on Promise Repository.},
  author = {Neela, Kamrun Nahar and Ali, Syed Asif and Ami, Amit Seal and Gias, Alim Ul},
  year = {2017},
  volume = {12},
  pages = {759--772},
  journal = {JSW},
  number = {10}
}

[5]A. Satter, A. S. Ami, and K. Sakib, “A Static Code Search Technique to Identify Dead Fields by Analyzing Usage of Setup Fields and Field Dependency in Test Code.,” in CDUD@ CLA, 2016, pp. 60–71.
Bibtex
@inproceedings{StaticCodeSearchsatter2016,
  title = {A Static Code Search Technique to Identify Dead Fields by Analyzing Usage of Setup Fields and Field Dependency in Test Code.},
  booktitle = {{{CDUD}}@ {{CLA}}},
  author = {Satter, Abdus and Ami, Amit Seal and Sakib, Kazi},
  year = {2016},
  pages = {60--71}
}

[6]M. Shafiuzzaman, N. Nahar, and M. R. Rahman, “A Proactive Approach for Context-Aware Self-Adaptive Mobile Applications to Ensure Quality of Service,” in 2015 18th International Conference on Computer and Information Technology (ICCIT), 2015, pp. 544–549, doi: 10.1109/ICCITechn.2015.7488131.
Bibtex
@inproceedings{ProactiveApproachContextawareshafiuzzaman2015,
  title = {A Proactive Approach for Context-Aware Self-Adaptive Mobile Applications to Ensure {{Quality}} of {{Service}}},
  booktitle = {2015 18th {{International Conference}} on {{Computer}} and {{Information Technology}} ({{ICCIT}})},
  author = {Shafiuzzaman, Md. and Nahar, Nadia and Rahman, Md. Rayhanur},
  year = {2015},
  month = dec,
  pages = {544--549},
  doi = {10.1109/ICCITechn.2015.7488131}
}

[7]P. Mandal and A. S. Ami, “Selecting Best Attributes for Software Defect Prediction,” in 2015 IEEE International WIE Conference on Electrical and Computer Engineering (WIECON-ECE), 2015, pp. 110–113, doi: 10.1109/WIECON-ECE.2015.7444011.
Bibtex
@inproceedings{SelectingBestAttributesmandal2015,
  title = {Selecting Best Attributes for Software Defect Prediction},
  booktitle = {2015 {{IEEE International WIE Conference}} on {{Electrical}} and {{Computer Engineering}} ({{WIECON}}-{{ECE}})},
  author = {Mandal, Prianka and Ami, Amit Seal},
  year = {2015},
  month = dec,
  pages = {110--113},
  doi = {10.1109/WIECON-ECE.2015.7444011}
}

[8]A. S. Ami and S. Islam, “A Content Assist Based Approach for Providing Rationale of Method Change for Object Oriented Programming,” International Journal of Information Engineering and Electronic Business, vol. 7, no. 1, p. 49, 2015.
Bibtex
@article{ContentAssistBasedami2015,
  title = {A Content Assist Based Approach for Providing Rationale of Method Change for Object Oriented Programming},
  author = {Ami, Amit S and Islam, Shariful},
  year = {2015},
  volume = {7},
  pages = {49},
  publisher = {{Modern Education and Computer Science Press}},
  journal = {International Journal of Information Engineering and Electronic Business},
  number = {1}
}

[9]A. S. Ami and M. S. Islam, “An Efficient Approach for Providing Rationale of Method Change for Object Oriented Programming,” in 2014 International Conference on Informatics, Electronics Vision (ICIEV), 2014, pp. 1–6, doi: 10.1109/ICIEV.2014.6850772.
Bibtex
@inproceedings{EfficientApproachProvidingamitsealami2014,
  title = {An Efficient Approach for Providing Rationale of Method Change for Object Oriented Programming},
  booktitle = {2014 {{International Conference}} on {{Informatics}}, {{Electronics Vision}} ({{ICIEV}})},
  author = {Ami, Amit Seal and Islam, Md. Shariful},
  year = {2014},
  month = may,
  pages = {1--6},
  doi = {10.1109/ICIEV.2014.6850772}
}

[10]A. U. Gias et al., “A Formal Approach to Verify Software Scalability Requirements Using Set Theory and Hoare Triple,” in 16th Int’l Conf. Computer and Information Technology, 2014, pp. 7–12, doi: 10.1109/ICCITechn.2014.6997367.
Bibtex
@inproceedings{FormalApproachVerifygias2014,
  title = {A Formal Approach to Verify Software Scalability Requirements Using Set Theory and {{Hoare}} Triple},
  booktitle = {16th {{Int}}'l {{Conf}}. {{Computer}} and {{Information Technology}}},
  author = {Gias, Alim Ul and Tabassum, Mirza Rehenuma and Ami, Amit Seal and Imran, Asif and Ibrahim, Mohammad and Rahman, Rayhanur and Sakib, Kazi},
  year = {2014},
  month = mar,
  pages = {7--12},
  doi = {10.1109/ICCITechn.2014.6997367}
}

[11]A. Imran et al., “Cloud-Niagara: A High Availability and Low Overhead Fault Tolerance Middleware for the Cloud,” in 16th Int’l Conf. Computer and Information Technology, 2014, pp. 271–276, doi: 10.1109/ICCITechn.2014.6997344.
Bibtex
@inproceedings{CloudNiagaraHighAvailabilityimran2014,
  title = {Cloud-{{Niagara}}: {{A}} High Availability and Low Overhead Fault Tolerance Middleware for the Cloud},
  shorttitle = {Cloud-{{Niagara}}},
  booktitle = {16th {{Int}}'l {{Conf}}. {{Computer}} and {{Information Technology}}},
  author = {Imran, Asif and Gias, Alim Ul and Rahman, Rayhanur and Seal, Amit and Rahman, Tajkia and Ishraque, Farhan and Sakib, Kazi},
  year = {2014},
  month = mar,
  pages = {271--276},
  doi = {10.1109/ICCITechn.2014.6997344}
}