Mehdi Mirakhorli

Orcid: 0009-0000-7963-3756

According to our database1, Mehdi Mirakhorli authored at least 95 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Seneca: Taint-Based Call Graph Construction for Java Object Deserialization.
Proc. ACM Program. Lang., 2024

A Large-Scale Exploit Instrumentation Study of AI/ML Supply Chain Attacks in Hugging Face Models.
CoRR, 2024

IPSynth: Interprocedural Program Synthesis for Software Security Implementation.
CoRR, 2024

A Landscape Study of Open Source and Proprietary Tools for Software Bill of Materials (SBOM).
CoRR, 2024

Lessons from the Use of Natural Language Inference (NLI) in Requirements Engineering Tasks.
Proceedings of the 32nd IEEE International Requirements Engineering Conference, 2024

Formally Modeled Common Weakness Enumerations (CWEs).
Proceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering Workshops, 2024

Neuro-Symbolic Approach to Certified Scientific Software Synthesis.
Proceedings of the 1st ACM International Conference on AI-Powered Software, 2024

2023
Empirical Validation of Automated Vulnerability Curation and Characterization.
IEEE Trans. Software Eng., 2023

Supporting Artificial Intelligence/Machine Learning Security Workers Through an Adversarial Techniques, Tools, and Common Knowledge Framework.
IEEE Secur. Priv., 2023

Sound Call Graph Construction for Java Object Deserialization.
CoRR, 2023

A Novel Approach to Identify Security Controls in Source Code.
CoRR, 2023

On-Demand Security Requirements Synthesis with Relational Generative Adversarial Networks.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023

SAIN: A Community-Wide Software Architecture INfrastructure.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering: ICSE 2023 Companion Proceedings, 2023

2022
Supporting AI/ML Security Workers through an Adversarial Techniques, Tools, and Common Knowledge (AI/ML ATT&CK) Framework.
CoRR, 2022

Attacks, Defenses, And Tools: A Framework To Facilitate Robust AI/ML Systems.
CoRR, 2022

A Grounded Theory Based Approach to Characterize Software Attack Surfaces.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

Predicting the severity and exploitability of vulnerability reports using convolutional neural nets.
Proceedings of the 3rd International Workshop on Engineering and Cybersecurity of Critical Systems, 2022

A Methodological Approach to Verify Architecture Resiliency.
Proceedings of the Software Architecture. ECSA 2022 Tracks and Workshops, 2022

2021
DepRes: A Tool for Resolving Fully Qualified Names and Their Dependencies.
CoRR, 2021

ArCode: A Tool for Supporting Comprehension andImplementation of Architectural Concerns.
CoRR, 2021

A Natural Language Processing Technique for Formalization of Systems Requirement Specifications.
Proceedings of the 29th IEEE International Requirements Engineering Conference Workshops, 2021

Serialization-aware call graph construction.
Proceedings of the SOAP@PLDI 2021: Proceedings of the 10th ACM SIGPLAN International Workshop on the State Of the Art in Program Analysis, 2021

ArCode: A Tool for Supporting Comprehension and Implementation of Architectural Concerns.
Proceedings of the 29th IEEE/ACM International Conference on Program Comprehension, 2021

Constructing a Shared Infrastructure for Software Architecture Analysis and Maintenance.
Proceedings of the 18th IEEE International Conference on Software Architecture, 2021

ArCode: Facilitating the Use of Application Frameworks to Implement Tactics and Patterns.
Proceedings of the 18th IEEE International Conference on Software Architecture, 2021

Barriers to Shift-Left Security: The Unique Pain Points of Writing Automated Tests Involving Security Controls.
Proceedings of the ESEM '21: ACM / IEEE International Symposium on Empirical Software Engineering and Measurement, 2021

2020
Understanding Software Security from Design to Deployment.
ACM SIGSOFT Softw. Eng. Notes, 2020

Looking for Software Defects? First Find the Nonconformists.
Proceedings of the 20th IEEE International Working Conference on Source Code Analysis and Manipulation, 2020

Did You Remember To Test Your Tokens?
Proceedings of the MSR '20: 17th International Conference on Mining Software Repositories, 2020

DeepTC-Enhancer: Improving the Readability of Automatically Generated Tests.
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, 2020

Towards Automated Evidence Generation for Rapid and Continuous Software Certification.
Proceedings of the 2020 IEEE International Symposium on Software Reliability Engineering Workshops, 2020

Towards an Automated Approach for Detecting Architectural Weaknesses in Critical Systems.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Workshops, Seoul, Republic of Korea, 27 June, 2020

An Automated Approach to Recover the Use-case View of an Architecture.
Proceedings of the 2020 IEEE International Conference on Software Architecture Companion, 2020

Does BERT Understand Code? - An Exploratory Study on the Detection of Architectural Tactics in Code.
Proceedings of the Software Architecture - 14th European Conference, 2020

Salsa: static analysis of serialization features.
Proceedings of the FTfJP 2020: Proceedings of the 22nd ACM SIGPLAN International Workshop on Formal Techniques for Java-Like Programs, 2020

2019
An empirical study of tactical vulnerabilities.
J. Syst. Softw., 2019

Achilles' heel of plug-and-Play software architectures: a grounded theory based approach.
Proceedings of the ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2019

Automated Characterization of Software Vulnerabilities.
Proceedings of the 2019 IEEE International Conference on Software Maintenance and Evolution, 2019

Architectural Security Weaknesses in Industrial Control Systems (ICS) an Empirical Study Based on Disclosed Software Vulnerabilities.
Proceedings of the IEEE International Conference on Software Architecture, 2019

2018
A fine-grained approach for automated conversion of JUnit assertions to English.
Proceedings of the 4th ACM SIGSOFT International Workshop on NLP for Software Engineering, 2018

Automatic classification of software artifacts in open-source applications.
Proceedings of the 15th International Conference on Mining Software Repositories, 2018

Roles and impacts of hands-on software architects in five industrial case studies.
Proceedings of the 40th International Conference on Software Engineering, 2018

From craft to science: the road ahead for empirical software engineering research.
Proceedings of the 40th International Conference on Software Engineering: New Ideas and Emerging Results, 2018

2017
A search engine for finding and reusing architecturally significant code.
J. Syst. Softw., 2017

Automated training-set creation for software architecture traceability problem.
Empir. Softw. Eng., 2017

Datasets from Fifteen Years of Automated Requirements Traceability Research: Current State, Characteristics, and Quality.
Proceedings of the 25th IEEE International Requirements Engineering Conference, 2017

A large-scale study on the usage of testing patterns that address maintainability attributes: patterns for ease of modification, diagnoses, and comprehension.
Proceedings of the 14th International Conference on Mining Software Repositories, 2017

An empirical study on code comprehension: data context interaction compared to classical object oriented.
Proceedings of the 25th International Conference on Program Comprehension, 2017

1st International Workshop on Establishing the Community-Wide Infrecaseructure for Architecture-Based Software Engineering (ECASE 2017).
Proceedings of the 1st IEEE/ACM International Workshop on Establishing the Community-Wide Infrecaseructure for Architecture-Based Software Engineering, 2017

Can latent topics in source code predict missing architectural tactics?
Proceedings of the 39th International Conference on Software Engineering, 2017

A Catalog of Security Architecture Weaknesses.
Proceedings of the 2017 IEEE International Conference on Software Architecture Workshops, 2017

Understanding Software Vulnerabilities Related to Architectural Security Tactics: An Empirical Investigation of Chromium, PHP and Thunderbird.
Proceedings of the 2017 IEEE International Conference on Software Architecture, 2017

2016
Detecting, Tracing, and Monitoring Architectural Tactics in Code.
IEEE Trans. Software Eng., 2016

Bringing Architecture Thinking into Developers' Daily Activities.
ACM SIGSOFT Softw. Eng. Notes, 2016

BUDGET: A Tool for Supporting Software Architecture Traceability Research.
Proceedings of the 13th Working IEEE/IFIP Conference on Software Architecture, 2016

Architectural clones: toward tactical code reuse.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

TestEX: A Search Tool for Finding and Retrieving Example Unit Tests from Open Source Projects.
Proceedings of the 2016 IEEE International Symposium on Software Reliability Engineering Workshops, 2016

2015
Twin Peaks goes Agile.
ACM SIGSOFT Softw. Eng. Notes, 2015

Studying the impact of evolution in R libraries on software engineering research.
Proceedings of the 1st IEEE International Workshop on Software Analytics, 2015

Software architecture reconstruction: Why? What? How?
Proceedings of the 22nd IEEE International Conference on Software Analysis, 2015

Ready-Set-Transfer! Technology transfer in the requirements engineering domain.
Proceedings of the 23rd IEEE International Requirements Engineering Conference, 2015

Modifications, Tweaks, and Bug Fixes in Architectural Tactics.
Proceedings of the 12th IEEE/ACM Working Conference on Mining Software Repositories, 2015

A Dataset of Open-Source Android Applications.
Proceedings of the 12th IEEE/ACM Working Conference on Mining Software Repositories, 2015

A Study on the Role of Software Architecture in the Evolution and Quality of Software.
Proceedings of the 12th IEEE/ACM Working Conference on Mining Software Repositories, 2015

Toward Actionable Software Architecture Traceability.
Proceedings of the 8th IEEE/ACM International Symposium on Software and Systems Traceability, 2015

Big(ger) Data in Software Engineering.
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015

Mining Big Data for Detecting, Extracting and Recommending Architectural Design Concepts.
Proceedings of the 1st IEEE/ACM International Workshop on Big Data Software Engineering, 2015

5th International Workshop on the Twin Peaks of Requirements and Architecture (TwinPeaks 2015).
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015

2014
Towards bridging the twin peaks of requirements and architecture.
ACM SIGSOFT Softw. Eng. Notes, 2014

Archie: a tool for detecting, monitoring, and preserving architecturally significant code.
Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, (FSE-22), Hong Kong, China, November 16, 2014

Automated extraction and visualization of quality concerns from requirements specifications.
Proceedings of the IEEE 22nd International Requirements Engineering Conference, 2014

An inverted classroom experience: engaging students in architectural thinking for agile projects.
Proceedings of the 36th International Conference on Software Engineering, 2014

2013
Supporting Domain Analysis through Mining and Recommending Features from Online Product Listings.
IEEE Trans. Software Eng., 2013

Traversing the Twin Peaks.
IEEE Softw., 2013

Views on software engineering from the twin peaks of requirements and architecture.
ACM SIGSOFT Softw. Eng. Notes, 2013

A domain-centric approach for recommending architectural tactics to satisfy quality concerns.
Proceedings of the 3rd International Workshop on the Twin Peaks of Requirements and Architecture, 2013

Preventing erosion of architectural tactics through their strategic implementation, preservation, and visualization.
Proceedings of the 2013 28th IEEE/ACM International Conference on Automated Software Engineering, 2013

Decision-Centric Traceability of architectural concerns.
Proceedings of the 7th International Workshop on Traceability in Emerging Forms of Software Engineering, 2013

2nd international workshop on the twin peaks of requirements and architecture (TwinPeaks 2013).
Proceedings of the 35th International Conference on Software Engineering, 2013

2012
Variability points and design pattern usage in architectural tactics.
Proceedings of the 20th ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE-20), 2012

Breaking the big-bang practice of traceability: Pushing timely trace recommendations to project stakeholders.
Proceedings of the 2012 20th IEEE International Requirements Engineering Conference (RE), 2012

A tactic-centric approach for automating traceability of quality concerns.
Proceedings of the 34th International Conference on Software Engineering, 2012

Tracing Non-Functional Requirements.
Proceedings of the Software and Systems Traceability., 2012

2011
A pattern system for tracing architectural concerns.
Proceedings of the 18th Conference on Pattern Languages of Programs, 2011

Using tactic traceability information models to reduce the risk of architectural degradation during system maintenance.
Proceedings of the IEEE 27th International Conference on Software Maintenance, 2011

Transforming trace information in architectural documents into re-usable and effective traceability links.
Proceedings of the 6th International Workshop on SHAring and Reusing Architectural Knowledge, 2011

Tracing architectural concerns in high assurance systems.
Proceedings of the 33rd International Conference on Software Engineering, 2011

Tracing architecturally significant requirements: a decision-centric approach.
Proceedings of the 33rd International Conference on Software Engineering, 2011

On-demand feature recommendations derived from mining public product descriptions.
Proceedings of the 33rd International Conference on Software Engineering, 2011

2008
How could ULS systems achieve architecture benefits?
Proceedings of the 2nd international workshop on Ultra-large-scale software-intensive systems, 2008

A service driven development process (sddp) model for ultra large scale systems.
Proceedings of the 2nd international workshop on Ultra-large-scale software-intensive systems, 2008

Architectural challenges of ultra large scale systems.
Proceedings of the 2nd international workshop on Ultra-large-scale software-intensive systems, 2008

RDP technique: a practice to customize xp.
Proceedings of the 2008 International Workshop on Scrutinizing Agile Practices or Shoot-Out at the Agile Corral, 2008

RDP Technique: Take a Different Look at XP for Adoption.
Proceedings of the 19th Australian Software Engineering Conference (ASWEC 2008), 2008

2007
A Novel Method for Leader Election Algorithm.
Proceedings of the Seventh International Conference on Computer and Information Technology (CIT 2007), 2007


  Loading...