首页 > 最新文献

Information and Software Technology最新文献

英文 中文
Mapping DevOps capabilities to the software life cycle: A systematic literature review 将 DevOps 能力映射到软件生命周期:系统性文献综述
IF 3.8 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-19 DOI: 10.1016/j.infsof.2024.107583
Ricardo Amaro , Rúben Pereira , Miguel Mira da Silva

Context:

Many IT organizations are looking towards DevOps to make their software development and delivery processes faster and more reliable, while DevOps revolutionized the industry by emphasizing collaboration between development and operations teams. Nonetheless, there still exist challenges in harmonizing cultural, technical, measurement and process capabilities for its successful adoption.

Objective:

To research improving DevOps adoption, this study explores DevOps Capabilities relevant to the Life Cycle Processes (LCPs) of the IEEE 2675-2021 DevOps standard. Aiming to provide valuable information on increasing efficiency and outcomes by mapping DevOps Capabilities in each phase of the LCPs. Whereas previous research identified and classified 37 DevOps Capabilities, this study aims to determine which capabilities can enhance each of the 30 phases of the LCPs.

Methods:

Out of 102 documents identified in the Systematic Literature Review (SLR), relations among DevOps Capabilities and LCPs have been synthesized and organized. An in-depth analysis of data was conducted over the connections across various categories. The mapping revealed how they relate in terms of their application and impact.

Results:

The SLR shows technical DevOps Capabilities and technical LCPs strongly correlated. DevOps measurement capabilities have a significant impact on agreement processes. Using an impact scale classification, the study identifies eight capabilities that have exceptional impact on LCPs and eleven capabilities that have a very high impact on the supply process, requirements definition, integration process, and validation process.

Conclusion:

The study demonstrates how DevOps Capabilities together with LCPs can improve software delivery, quality, and reliability. It presents a structured approach for improving processes, as well as evidence of DevOps integration in software development and maintenance. The findings help to assess DevOps Capabilities and LCP relations, which is expected to improve successful adoption. Future research should focus on researching practical cases of DevOps integration into LCPs, while overcoming adoption challenges.

背景:许多 IT 组织都在寻求 DevOps,以使其软件开发和交付流程更快、更可靠。然而,要成功采用 DevOps,在协调文化、技术、测量和流程能力方面仍存在挑战。目的:为了研究如何改进 DevOps 的采用,本研究探讨了与 IEEE 2675-2021 DevOps 标准的生命周期流程(LCP)相关的 DevOps 能力。旨在通过映射 LCPs 各阶段的 DevOps 能力,为提高效率和成果提供有价值的信息。方法:在系统性文献综述(SLR)中确定的 102 篇文献中,DevOps 能力和 LCPs 之间的关系得到了综合和整理。对不同类别之间的联系进行了深入的数据分析。结果:SLR 显示,技术 DevOps 能力和技术 LCP 具有很强的相关性。DevOps 衡量能力对协议流程具有重大影响。结论:本研究展示了 DevOps 能力与 LCP 如何共同改善软件交付、质量和可靠性。研究提出了改进流程的结构化方法,以及 DevOps 融入软件开发和维护的证据。研究结果有助于评估 DevOps 能力与 LCP 的关系,从而提高成功采用的可能性。未来的研究应侧重于研究 DevOps 融入 LCP 的实际案例,同时克服采用方面的挑战。
{"title":"Mapping DevOps capabilities to the software life cycle: A systematic literature review","authors":"Ricardo Amaro ,&nbsp;Rúben Pereira ,&nbsp;Miguel Mira da Silva","doi":"10.1016/j.infsof.2024.107583","DOIUrl":"10.1016/j.infsof.2024.107583","url":null,"abstract":"<div><h3>Context:</h3><p>Many IT organizations are looking towards DevOps to make their software development and delivery processes faster and more reliable, while DevOps revolutionized the industry by emphasizing collaboration between development and operations teams. Nonetheless, there still exist challenges in harmonizing cultural, technical, measurement and process capabilities for its successful adoption.</p></div><div><h3>Objective:</h3><p>To research improving DevOps adoption, this study explores DevOps Capabilities relevant to the Life Cycle Processes (LCPs) of the IEEE 2675-2021 DevOps standard. Aiming to provide valuable information on increasing efficiency and outcomes by mapping DevOps Capabilities in each phase of the LCPs. Whereas previous research identified and classified 37 DevOps Capabilities, this study aims to determine which capabilities can enhance each of the 30 phases of the LCPs.</p></div><div><h3>Methods:</h3><p>Out of 102 documents identified in the Systematic Literature Review (SLR), relations among DevOps Capabilities and LCPs have been synthesized and organized. An in-depth analysis of data was conducted over the connections across various categories. The mapping revealed how they relate in terms of their application and impact.</p></div><div><h3>Results:</h3><p>The SLR shows technical DevOps Capabilities and technical LCPs strongly correlated. DevOps measurement capabilities have a significant impact on agreement processes. Using an impact scale classification, the study identifies eight capabilities that have exceptional impact on LCPs and eleven capabilities that have a very high impact on the supply process, requirements definition, integration process, and validation process.</p></div><div><h3>Conclusion:</h3><p>The study demonstrates how DevOps Capabilities together with LCPs can improve software delivery, quality, and reliability. It presents a structured approach for improving processes, as well as evidence of DevOps integration in software development and maintenance. The findings help to assess DevOps Capabilities and LCP relations, which is expected to improve successful adoption. Future research should focus on researching practical cases of DevOps integration into LCPs, while overcoming adoption challenges.</p></div>","PeriodicalId":54983,"journal":{"name":"Information and Software Technology","volume":"177 ","pages":"Article 107583"},"PeriodicalIF":3.8,"publicationDate":"2024-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0950584924001885/pdfft?md5=0f638b8210f13166620dcfc6d3e2af01&pid=1-s2.0-S0950584924001885-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142270420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving DevOps team performance through context-capability coalignment: Towards a profile for public sector organizations 通过情境-能力联合提高 DevOps 团队绩效:为公共部门组织制定简介
IF 3.8 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-18 DOI: 10.1016/j.infsof.2024.107585
Olivia H. Plant , Adina Aldea , Jos van Hillegersberg

Context

Many IT organizations turn to agile software delivery approaches such as DevOps in order to reduce the number of IT projects that are running behind schedule and above budget. However, the DevOps paradigm calls for an increased set of capabilities that need to be built and aligned with their context in order to ensure superior team performance.

Objective

This research aims to develop a context-capability coalignment profile for DevOps teams in public organizations. This profile and the corresponding design approach may serve as a model for other software production teams seeking to enhance their performance through improved coalignment. The resulting set of design principles places the traditional information systems theories of dynamic capabilities and contingency theory in a modern context.

Method

We adopt a longitudinal action design research approach centered around a DevOps team working in the IT department of a Dutch public organization. A mixed method design including scientific questionnaires, workshops, expert opinions and semi-structured interviews is employed to build and evaluate the profile.

Results

The resulting profile is characterized by technological complexity, a highly regulated environment, departmental interdependencies and high system relevance. The evaluation phase supports the validity of the artifact and suggests moderately improved coalignment of context and team capabilities after the research period, as well as a positive influence of coalignment on team performance.

Conclusion

It is contended that software teams in public organizations can benefit from improved coalignment between context and DevOps capabilities by following the presented approach. We argue that it is important to create a profile which is internally consistent and views coalignment as a continuous process in order to maximize the positive effect on team performance.
背景许多 IT 组织都转而采用 DevOps 等敏捷软件交付方法,以减少落后于计划和超出预算的 IT 项目数量。然而,DevOps 模式需要更多的能力,这些能力需要建立并与上下文保持一致,以确保团队的卓越绩效。该简介和相应的设计方法可作为其他软件生产团队的范例,帮助他们通过改善联合来提高绩效。我们采用了一种纵向行动设计研究方法,该方法以荷兰一家公共机构 IT 部门的 DevOps 团队为中心。我们采用了混合方法设计,包括科学调查问卷、研讨会、专家意见和半结构式访谈,以建立和评估该概况。结果该概况具有技术复杂性、高度管制环境、部门相互依存性和高度系统相关性等特点。评估阶段证明了该工具的有效性,并表明在研究期结束后,环境与团队能力之间的协调得到了适度改善,而且协调对团队绩效产生了积极影响。结论我们认为,公共组织中的软件团队可以通过采用所介绍的方法,从环境与 DevOps 能力之间的协调改善中获益。我们认为,为了最大限度地提高团队绩效的积极影响,必须创建一个内部一致的配置文件,并将联合视为一个持续的过程。
{"title":"Improving DevOps team performance through context-capability coalignment: Towards a profile for public sector organizations","authors":"Olivia H. Plant ,&nbsp;Adina Aldea ,&nbsp;Jos van Hillegersberg","doi":"10.1016/j.infsof.2024.107585","DOIUrl":"10.1016/j.infsof.2024.107585","url":null,"abstract":"<div><h3>Context</h3><div>Many IT organizations turn to agile software delivery approaches such as DevOps in order to reduce the number of IT projects that are running behind schedule and above budget. However, the DevOps paradigm calls for an increased set of capabilities that need to be built and aligned with their context in order to ensure superior team performance.</div></div><div><h3>Objective</h3><div>This research aims to develop a context-capability coalignment profile for DevOps teams in public organizations. This profile and the corresponding design approach may serve as a model for other software production teams seeking to enhance their performance through improved coalignment. The resulting set of design principles places the traditional information systems theories of dynamic capabilities and contingency theory in a modern context.</div></div><div><h3>Method</h3><div>We adopt a longitudinal action design research approach centered around a DevOps team working in the IT department of a Dutch public organization. A mixed method design including scientific questionnaires, workshops, expert opinions and semi-structured interviews is employed to build and evaluate the profile.</div></div><div><h3>Results</h3><div>The resulting profile is characterized by technological complexity, a highly regulated environment, departmental interdependencies and high system relevance. The evaluation phase supports the validity of the artifact and suggests moderately improved coalignment of context and team capabilities after the research period, as well as a positive influence of coalignment on team performance.</div></div><div><h3>Conclusion</h3><div>It is contended that software teams in public organizations can benefit from improved coalignment between context and DevOps capabilities by following the presented approach. We argue that it is important to create a profile which is internally consistent and views coalignment as a continuous process in order to maximize the positive effect on team performance.</div></div>","PeriodicalId":54983,"journal":{"name":"Information and Software Technology","volume":"178 ","pages":"Article 107585"},"PeriodicalIF":3.8,"publicationDate":"2024-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142553388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DeVAIC: A tool for security assessment of AI-generated code DeVAIC:人工智能生成代码的安全评估工具
IF 3.8 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-16 DOI: 10.1016/j.infsof.2024.107572
Domenico Cotroneo, Roberta De Luca, Pietro Liguori

Context:

AI code generators are revolutionizing code writing and software development, but their training on large datasets, including potentially untrusted source code, raises security concerns. Furthermore, these generators can produce incomplete code snippets that are challenging to evaluate using current solutions.

Objective:

This research work introduces DeVAIC (Detection of Vulnerabilities in AI-generated Code), a tool to evaluate the security of AI-generated Python code, which overcomes the challenge of examining incomplete code.

Methods:

We followed a methodological approach that involved gathering vulnerable samples, extracting implementation patterns, and creating regular expressions to develop the proposed tool. The implementation of DeVAIC includes a set of detection rules based on regular expressions that cover 35 Common Weakness Enumerations (CWEs) falling under the OWASP Top 10 vulnerability categories.

Results:

We utilized four popular AI models to generate Python code, which we then used as a foundation to evaluate the effectiveness of our tool. DeVAIC demonstrated a statistically significant difference in its ability to detect security vulnerabilities compared to the state-of-the-art solutions, showing an F1 Score and Accuracy of 94% while maintaining a low computational cost of 0.14 s per code snippet, on average.

Conclusions:

The proposed tool provides a lightweight and efficient solution for vulnerability detection even on incomplete code.

背景:人工智能代码生成器正在为代码编写和软件开发带来革命性的变化,但它们在大型数据集(包括潜在的不信任源代码)上的训练引发了安全问题。此外,这些生成器可能会生成不完整的代码片段,使用当前的解决方案对其进行评估具有挑战性。方法:我们采用了一种方法论方法,包括收集易受攻击的样本、提取实现模式和创建正则表达式来开发拟议的工具。DeVAIC的实现包括一套基于正则表达式的检测规则,这些规则涵盖了OWASP十大漏洞类别下的35个常见弱点枚举(CWE)。与最先进的解决方案相比,DeVAIC 在检测安全漏洞的能力方面具有显著的统计学差异,其 F1 分数和准确率均达到 94%,同时保持了较低的计算成本(平均每个代码片段 0.14 秒)。
{"title":"DeVAIC: A tool for security assessment of AI-generated code","authors":"Domenico Cotroneo,&nbsp;Roberta De Luca,&nbsp;Pietro Liguori","doi":"10.1016/j.infsof.2024.107572","DOIUrl":"10.1016/j.infsof.2024.107572","url":null,"abstract":"<div><h3>Context:</h3><p>AI code generators are revolutionizing code writing and software development, but their training on large datasets, including potentially untrusted source code, raises security concerns. Furthermore, these generators can produce incomplete code snippets that are challenging to evaluate using current solutions.</p></div><div><h3>Objective:</h3><p>This research work introduces <em>DeVAIC</em> (Detection of Vulnerabilities in AI-generated Code), a tool to evaluate the security of AI-generated Python code, which overcomes the challenge of examining incomplete code.</p></div><div><h3>Methods:</h3><p>We followed a methodological approach that involved gathering vulnerable samples, extracting implementation patterns, and creating regular expressions to develop the proposed tool. The implementation of <em>DeVAIC</em> includes a set of detection rules based on regular expressions that cover 35 Common Weakness Enumerations (CWEs) falling under the OWASP Top 10 vulnerability categories.</p></div><div><h3>Results:</h3><p>We utilized four popular AI models to generate Python code, which we then used as a foundation to evaluate the effectiveness of our tool. <em>DeVAIC</em> demonstrated a statistically significant difference in its ability to detect security vulnerabilities compared to the state-of-the-art solutions, showing an <span><math><msub><mrow><mi>F</mi></mrow><mrow><mn>1</mn></mrow></msub></math></span> Score and Accuracy of 94% while maintaining a low computational cost of 0.14 s per code snippet, on average.</p></div><div><h3>Conclusions:</h3><p>The proposed tool provides a lightweight and efficient solution for vulnerability detection even on incomplete code.</p></div>","PeriodicalId":54983,"journal":{"name":"Information and Software Technology","volume":"177 ","pages":"Article 107572"},"PeriodicalIF":3.8,"publicationDate":"2024-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0950584924001770/pdfft?md5=4b13436df2c73b1417f75ea09a77256f&pid=1-s2.0-S0950584924001770-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142270421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A dual graph neural networks model using sequence embedding as graph nodes for vulnerability detection 利用序列嵌入作为图节点进行漏洞检测的双图神经网络模型
IF 3.8 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-07 DOI: 10.1016/j.infsof.2024.107581
Miaogui Ling, Mingwei Tang, Deng Bian, Shixuan Lv, Qi Tang

Context:

Detecting critical to ensure software system security. The traditional static vulnerability detection methods are limited by staff expertise and perform poorly with today’s increasingly complex software systems. Researchers have successfully applied the techniques used in NLP to vulnerability detection as deep learning has developed. The existing deep learning-based vulnerability detection models can be divided into sequence-based and graph-based categories. Sequence-based embedding models cannot use structured information embedded in the code, and graph-based embedding models lack effective node representations.

Objective:

To solve these problems, we propose a deep learning-based method, DGVD (Double Graph Neural Network for Vulnerability Detection).

Methods:

We use the sequential neural network approach to extract local semantic features of the code as nodes embedded in the control flow graph. First, we propose a dual graph neural network module (DualGNN) that consists of GCN and GAT. The altered module utilizes two different graph neural networks to obtain the global structural information of the control flow and the relationship between the nodes and fuses the two. Second, we propose a convolution-based feature enhancement module (TC-FE) that uses different convolution kernels of different sizes to capture information at different scales so that subsequent readout layers can better aggregate node information.

Results:

Experiments demonstrate that DGVD outperforms existing models, obtaining 64.23% vulnerability detection accuracy on CodeXGLUE’s real benchmark dataset.

Conclusion:

The proposed DGVD achieves better performance than the state-of-the-art DGVD has a more effective source code feature extraction capability on real-world datasets.

背景:检测对确保软件系统安全至关重要。传统的静态漏洞检测方法受到工作人员专业知识的限制,在当今日益复杂的软件系统中表现不佳。随着深度学习的发展,研究人员已成功地将 NLP 技术应用于漏洞检测。现有的基于深度学习的漏洞检测模型可分为基于序列和基于图的两类。基于序列的嵌入模型无法使用代码中嵌入的结构化信息,而基于图的嵌入模型则缺乏有效的节点表示。方法:我们使用序列神经网络方法提取代码的局部语义特征,将其作为节点嵌入控制流图中。首先,我们提出了由 GCN 和 GAT 组成的双图神经网络模块(DualGNN)。改变后的模块利用两种不同的图神经网络获取控制流的全局结构信息和节点之间的关系,并将二者融合。其次,我们提出了基于卷积的特征增强模块(TC-FE),利用不同大小的卷积核捕捉不同尺度的信息,从而使后续读出层能够更好地聚合节点信息。结果:实验证明,DGVD的性能优于现有模型,在CodeXGLUE的真实基准数据集上获得了64.23%的漏洞检测准确率。
{"title":"A dual graph neural networks model using sequence embedding as graph nodes for vulnerability detection","authors":"Miaogui Ling,&nbsp;Mingwei Tang,&nbsp;Deng Bian,&nbsp;Shixuan Lv,&nbsp;Qi Tang","doi":"10.1016/j.infsof.2024.107581","DOIUrl":"10.1016/j.infsof.2024.107581","url":null,"abstract":"<div><h3>Context:</h3><p>Detecting critical to ensure software system security. The traditional static vulnerability detection methods are limited by staff expertise and perform poorly with today’s increasingly complex software systems. Researchers have successfully applied the techniques used in NLP to vulnerability detection as deep learning has developed. The existing deep learning-based vulnerability detection models can be divided into sequence-based and graph-based categories. Sequence-based embedding models cannot use structured information embedded in the code, and graph-based embedding models lack effective node representations.</p></div><div><h3>Objective:</h3><p>To solve these problems, we propose a deep learning-based method, DGVD (Double Graph Neural Network for Vulnerability Detection).</p></div><div><h3>Methods:</h3><p>We use the sequential neural network approach to extract local semantic features of the code as nodes embedded in the control flow graph. First, we propose a dual graph neural network module (DualGNN) that consists of GCN and GAT. The altered module utilizes two different graph neural networks to obtain the global structural information of the control flow and the relationship between the nodes and fuses the two. Second, we propose a convolution-based feature enhancement module (TC-FE) that uses different convolution kernels of different sizes to capture information at different scales so that subsequent readout layers can better aggregate node information.</p></div><div><h3>Results:</h3><p>Experiments demonstrate that DGVD outperforms existing models, obtaining 64.23% vulnerability detection accuracy on CodeXGLUE’s real benchmark dataset.</p></div><div><h3>Conclusion:</h3><p>The proposed DGVD achieves better performance than the state-of-the-art DGVD has a more effective source code feature extraction capability on real-world datasets.</p></div>","PeriodicalId":54983,"journal":{"name":"Information and Software Technology","volume":"177 ","pages":"Article 107581"},"PeriodicalIF":3.8,"publicationDate":"2024-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0950584924001861/pdfft?md5=450f5d915db5cb174d591dea662c75cd&pid=1-s2.0-S0950584924001861-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142161586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Testing infrastructures to support mobile application testing: A systematic mapping study 支持移动应用程序测试的测试基础设施:系统制图研究
IF 3.8 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-07 DOI: 10.1016/j.infsof.2024.107573
Pedro Henrique Kuroishi , Ana Cristina Ramada Paiva , José Carlos Maldonado , Auri Marcelo Rizzo Vincenzi

Context:

Testing activities are essential for the quality assurance of mobile applications under development. Despite its importance, some studies show that testing is not widely applied in mobile applications. Some characteristics of mobile devices and a varied market of mobile devices with different operating system versions lead to a highly fragmented mobile ecosystem. Thus, researchers put some effort into proposing different solutions to optimize mobile application testing.

Objective:

The main goal of this paper is to provide a categorization and classification of existing testing infrastructures to support mobile application testing.

Methods:

To this aim, the study provides a Systematic Mapping Study of 27 existing primary studies.

Results:

We present a new classification and categorization of existing types of testing infrastructure, the types of supported devices and operating systems, whether the testing infrastructure is available for usage or experimentation, and supported testing types and applications.

Conclusion:

Our findings show a need for mobile testing infrastructures that support multiple phases of the testing process. Moreover, we showed a need for testing infrastructure for context-aware applications and support for both emulators and real devices. Finally, we pinpoint the need to make the research available to the community whenever possible.

背景:测试活动对于保证开发中移动应用程序的质量至关重要。尽管测试非常重要,但一些研究表明,测试并未广泛应用于移动应用程序。移动设备的一些特点和操作系统版本各异的移动设备市场导致移动生态系统高度分散。因此,研究人员努力提出不同的解决方案,以优化移动应用测试。目标:本文的主要目标是对现有的测试基础设施进行归类和分类,以支持移动应用测试。方法:为此,本研究对现有的 27 项主要研究进行了系统映射研究。结果:我们对现有的测试基础设施类型、支持的设备和操作系统类型、测试基础设施是否可用于使用或实验,以及支持的测试类型和应用程序进行了新的分类和归类。此外,我们还发现需要针对情境感知应用程序的测试基础设施,并同时支持模拟器和真实设备。最后,我们指出需要尽可能将研究成果提供给社区。
{"title":"Testing infrastructures to support mobile application testing: A systematic mapping study","authors":"Pedro Henrique Kuroishi ,&nbsp;Ana Cristina Ramada Paiva ,&nbsp;José Carlos Maldonado ,&nbsp;Auri Marcelo Rizzo Vincenzi","doi":"10.1016/j.infsof.2024.107573","DOIUrl":"10.1016/j.infsof.2024.107573","url":null,"abstract":"<div><h3>Context:</h3><p>Testing activities are essential for the quality assurance of mobile applications under development. Despite its importance, some studies show that testing is not widely applied in mobile applications. Some characteristics of mobile devices and a varied market of mobile devices with different operating system versions lead to a highly fragmented mobile ecosystem. Thus, researchers put some effort into proposing different solutions to optimize mobile application testing.</p></div><div><h3>Objective:</h3><p>The main goal of this paper is to provide a categorization and classification of existing testing infrastructures to support mobile application testing.</p></div><div><h3>Methods:</h3><p>To this aim, the study provides a Systematic Mapping Study of 27 existing primary studies.</p></div><div><h3>Results:</h3><p>We present a new classification and categorization of existing types of testing infrastructure, the types of supported devices and operating systems, whether the testing infrastructure is available for usage or experimentation, and supported testing types and applications.</p></div><div><h3>Conclusion:</h3><p>Our findings show a need for mobile testing infrastructures that support multiple phases of the testing process. Moreover, we showed a need for testing infrastructure for context-aware applications and support for both emulators and real devices. Finally, we pinpoint the need to make the research available to the community whenever possible.</p></div>","PeriodicalId":54983,"journal":{"name":"Information and Software Technology","volume":"177 ","pages":"Article 107573"},"PeriodicalIF":3.8,"publicationDate":"2024-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0950584924001782/pdfft?md5=f51e15c1c22c885eaa3b1068c8ec1e68&pid=1-s2.0-S0950584924001782-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142229559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Specialized model initialization and architecture optimization for few-shot code search 针对少量代码搜索的专用模型初始化和架构优化
IF 3.8 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-04 DOI: 10.1016/j.infsof.2024.107571
Fan Zhang , Qiang Wu , Manman Peng , Yuanyuan Shen

Context:

Code search aims to find relevant code snippets from a codebase given a natural language query. It not only boosts developer efficiency but also improves the performance of tasks such as code generation and program repair, thus becoming one of the crucial tasks in software engineering.

Objective:

However, recent works are mainly designed for mainstream programming languages with abundant training data. We aim to address the challenges of code search for domain-specific programming languages with limited training data by proposing a novel two-stage, few-shot code search framework named SMIAO.

Method:

SMIAO includes a specialized model initialization and an architecture optimization stage. In the first stage, we first quantitatively identify a mainstream programming language’s dataset that is semantically closest to a target few-shot programming language. Then, we enrich the dataset with hard samples and train an Adapter-GraphCodeBERT model to obtain well-initialized parameters. In the second stage, we first design a search space for the initialized Adapter-GraphCodeBERT model. Then, we employ neural architecture search to optimize the Adapter modules’ positions and quantities in the GraphCodeBERT layers, tailoring for real-world few-shot code search tasks.

Results:

We conduct experiments on a publicly available dataset to demonstrate the effectiveness and rationality of SMIAO. The experimental results show that SMIAO outperforms other state-of-the-art baselines.

Conclusion:

Using mainstream languages’ datasets to initialize Adapter-GraphCodeBERT models, followed by adjusting the quantities and positions of Adapter modules within the GraphCodeBERT layers by neural architecture search, can effectively improve the performance of few-shot code search tasks.

背景:代码搜索旨在根据自然语言查询从代码库中找到相关的代码片段。它不仅能提高开发人员的效率,还能改善代码生成和程序修复等任务的性能,因此成为软件工程中的重要任务之一。目标:然而,最近的研究主要是针对训练数据丰富的主流编程语言而设计的。方法:SMIAO 包括专门的模型初始化和架构优化阶段。在第一阶段,我们首先定量地确定一个主流编程语言的数据集,该数据集在语义上最接近目标 few-shot 编程语言。然后,我们用硬样本丰富数据集,并训练 Adapter-GraphCodeBERT 模型,以获得良好的初始化参数。在第二阶段,我们首先为初始化的 Adapter-GraphCodeBERT 模型设计一个搜索空间。然后,我们采用神经架构搜索来优化适配器模块在GraphCodeBERT层中的位置和数量,为现实世界的少量代码搜索任务量身定制。结果:我们在一个公开可用的数据集上进行了实验,以证明SMIAO的有效性和合理性。实验结果表明,SMIAO优于其他最先进的基线。结论:利用主流语言的数据集初始化Adapter-GraphCodeBERT模型,然后通过神经架构搜索调整Adapter模块在GraphCodeBERT层中的数量和位置,可以有效提高少量代码搜索任务的性能。
{"title":"Specialized model initialization and architecture optimization for few-shot code search","authors":"Fan Zhang ,&nbsp;Qiang Wu ,&nbsp;Manman Peng ,&nbsp;Yuanyuan Shen","doi":"10.1016/j.infsof.2024.107571","DOIUrl":"10.1016/j.infsof.2024.107571","url":null,"abstract":"<div><h3>Context:</h3><p>Code search aims to find relevant code snippets from a codebase given a natural language query. It not only boosts developer efficiency but also improves the performance of tasks such as code generation and program repair, thus becoming one of the crucial tasks in software engineering.</p></div><div><h3>Objective:</h3><p>However, recent works are mainly designed for mainstream programming languages with abundant training data. We aim to address the challenges of code search for domain-specific programming languages with limited training data by proposing a novel two-stage, few-shot code search framework named SMIAO.</p></div><div><h3>Method:</h3><p>SMIAO includes a specialized model initialization and an architecture optimization stage. In the first stage, we first quantitatively identify a mainstream programming language’s dataset that is semantically closest to a target few-shot programming language. Then, we enrich the dataset with hard samples and train an Adapter-GraphCodeBERT model to obtain well-initialized parameters. In the second stage, we first design a search space for the initialized Adapter-GraphCodeBERT model. Then, we employ neural architecture search to optimize the Adapter modules’ positions and quantities in the GraphCodeBERT layers, tailoring for real-world few-shot code search tasks.</p></div><div><h3>Results:</h3><p>We conduct experiments on a publicly available dataset to demonstrate the effectiveness and rationality of SMIAO. The experimental results show that SMIAO outperforms other state-of-the-art baselines.</p></div><div><h3>Conclusion:</h3><p>Using mainstream languages’ datasets to initialize Adapter-GraphCodeBERT models, followed by adjusting the quantities and positions of Adapter modules within the GraphCodeBERT layers by neural architecture search, can effectively improve the performance of few-shot code search tasks.</p></div>","PeriodicalId":54983,"journal":{"name":"Information and Software Technology","volume":"177 ","pages":"Article 107571"},"PeriodicalIF":3.8,"publicationDate":"2024-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0950584924001769/pdfft?md5=42c9abafebc31bfce0fe9d0923669722&pid=1-s2.0-S0950584924001769-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142161587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Accessibility of low-code approaches: A systematic literature review 低代码方法的可访问性:系统文献综述
IF 3.8 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-02 DOI: 10.1016/j.infsof.2024.107570
Hourieh Khalajzadeh , John Grundy

Context:

Model-driven approaches are increasingly used in different domains, such as education, finance and app development, in order to involve non-developers in the software development process. Such tools are hugely dependent on visual elements and thus might not be accessible for users with specific challenges, e.g., visual impairments.

Objectives:

To locate and analyse existing literature on the accessibility of low-code approaches, their strengths and weaknesses and key directions for future research.

Methods:

We carried out a systematic literature review and searched through five leading databases for primary studies. We used both quantitative and qualitative methods for data synthesis.

Results:

After reviewing and filtering 918 located studies, and conducting both backward and forward snowballing, we identified 38 primary studies that were included in our analysis. We found most papers focusing on accessibility of visual languages and block-based programming.

Conclusion:

Limited work has been done on improving low code programming environment accessibility. The findings of this systematic literature review will assist researchers and developers in understanding the accessibility issues in low-code approaches and what has been done so far to develop accessible approaches.

背景:为了让非开发人员参与软件开发过程,模型驱动方法越来越多地应用于教育、金融和应用程序开发等不同领域。目标:查找并分析有关低代码方法可访问性、其优缺点以及未来研究主要方向的现有文献。方法:我们进行了系统的文献综述,并在五个主要数据库中搜索了主要研究。结果:在查阅和筛选了 918 篇已定位的研究报告,并进行了前后滚雪球式的搜索后,我们确定了 38 篇主要研究报告,并将其纳入了我们的分析中。结论:在改善低代码编程环境的可访问性方面,我们所做的工作十分有限。本系统性文献综述的结果将有助于研究人员和开发人员了解低代码编程方法中的无障碍问题,以及迄今为止为开发无障碍编程方法所做的工作。
{"title":"Accessibility of low-code approaches: A systematic literature review","authors":"Hourieh Khalajzadeh ,&nbsp;John Grundy","doi":"10.1016/j.infsof.2024.107570","DOIUrl":"10.1016/j.infsof.2024.107570","url":null,"abstract":"<div><h3>Context:</h3><p>Model-driven approaches are increasingly used in different domains, such as education, finance and app development, in order to involve non-developers in the software development process. Such tools are hugely dependent on visual elements and thus might not be accessible for users with specific challenges, <em>e.g.</em>, visual impairments.</p></div><div><h3>Objectives:</h3><p>To locate and analyse existing literature on the accessibility of low-code approaches, their strengths and weaknesses and key directions for future research.</p></div><div><h3>Methods:</h3><p>We carried out a systematic literature review and searched through five leading databases for primary studies. We used both quantitative and qualitative methods for data synthesis.</p></div><div><h3>Results:</h3><p>After reviewing and filtering 918 located studies, and conducting both backward and forward snowballing, we identified 38 primary studies that were included in our analysis. We found most papers focusing on accessibility of visual languages and block-based programming.</p></div><div><h3>Conclusion:</h3><p>Limited work has been done on improving low code programming environment accessibility. The findings of this systematic literature review will assist researchers and developers in understanding the accessibility issues in low-code approaches and what has been done so far to develop accessible approaches.</p></div>","PeriodicalId":54983,"journal":{"name":"Information and Software Technology","volume":"177 ","pages":"Article 107570"},"PeriodicalIF":3.8,"publicationDate":"2024-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0950584924001757/pdfft?md5=0f1075cef5d4359991b8dedfbe12585f&pid=1-s2.0-S0950584924001757-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142168286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Software solutions for newcomers’ onboarding in software projects: A systematic literature review 软件项目新人入职培训的软件解决方案:系统文献综述
IF 3.8 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-02 DOI: 10.1016/j.infsof.2024.107568
Italo Santos , Katia Romero Felizardo , Igor Steinmacher , Marco A. Gerosa

Context:

Newcomers joining an unfamiliar software project face numerous barriers; therefore, effective onboarding is essential to help them engage with the team and develop the behaviors, attitudes, and skills needed to excel in their roles. However, onboarding can be a lengthy, costly, and error-prone process. Software solutions can help mitigate these barriers and streamline the process without overloading senior members.

Objective:

This study aims to identify the state-of-the-art software solutions for onboarding newcomers.

Methods:

We conducted a systematic literature review (SLR) to answer six research questions.

Results:

We analyzed 32 studies about software solutions for onboarding newcomers and yielded several key findings: (1) a range of strategies exists, with recommendation systems being the most prevalent; (2) most solutions are web-based; (3) solutions target a variety of onboarding aspects, with a focus on process; (4) many onboarding barriers remain unaddressed by existing solutions; (5) laboratory experiments are the most commonly used method for evaluating these solutions; and (6) diversity and inclusion aspects primarily address experience level.

Conclusion:

We shed light on current technological support and identify research opportunities to develop more inclusive software solutions for onboarding. These insights may also guide practitioners in refining existing platforms and onboarding programs to promote smoother integration of newcomers into software projects.

背景:新人在加入一个陌生的软件项目时会面临重重障碍;因此,有效的入职培训对于帮助他们融入团队并培养出色完成任务所需的行为、态度和技能至关重要。然而,入职培训可能是一个漫长、昂贵且容易出错的过程。方法:我们进行了系统的文献综述(SLR),以回答六个研究问题。结果:我们分析了 32 项有关新人入职软件解决方案的研究,并得出了几项重要发现:(1)存在一系列策略,其中推荐系统最为普遍;(2)大多数解决方案都是基于网络的;(3)解决方案针对入职的各个方面,重点是流程;(4)现有解决方案仍未解决许多入职障碍;(5)实验室实验是评估这些解决方案最常用的方法;(6)多样性和包容性方面主要针对经验水平。结论:我们阐明了当前的技术支持,并确定了开发更具包容性的入职软件解决方案的研究机会。这些见解还可以指导从业人员改进现有平台和入职培训计划,以促进新人更顺利地融入软件项目。
{"title":"Software solutions for newcomers’ onboarding in software projects: A systematic literature review","authors":"Italo Santos ,&nbsp;Katia Romero Felizardo ,&nbsp;Igor Steinmacher ,&nbsp;Marco A. Gerosa","doi":"10.1016/j.infsof.2024.107568","DOIUrl":"10.1016/j.infsof.2024.107568","url":null,"abstract":"<div><h3>Context:</h3><p>Newcomers joining an unfamiliar software project face numerous barriers; therefore, effective onboarding is essential to help them engage with the team and develop the behaviors, attitudes, and skills needed to excel in their roles. However, onboarding can be a lengthy, costly, and error-prone process. Software solutions can help mitigate these barriers and streamline the process without overloading senior members.</p></div><div><h3>Objective:</h3><p>This study aims to identify the state-of-the-art software solutions for onboarding newcomers.</p></div><div><h3>Methods:</h3><p>We conducted a systematic literature review (SLR) to answer six research questions.</p></div><div><h3>Results:</h3><p>We analyzed 32 studies about software solutions for onboarding newcomers and yielded several key findings: (1) a range of strategies exists, with recommendation systems being the most prevalent; (2) most solutions are web-based; (3) solutions target a variety of onboarding aspects, with a focus on process; (4) many onboarding barriers remain unaddressed by existing solutions; (5) laboratory experiments are the most commonly used method for evaluating these solutions; and (6) diversity and inclusion aspects primarily address experience level.</p></div><div><h3>Conclusion:</h3><p>We shed light on current technological support and identify research opportunities to develop more inclusive software solutions for onboarding. These insights may also guide practitioners in refining existing platforms and onboarding programs to promote smoother integration of newcomers into software projects.</p></div>","PeriodicalId":54983,"journal":{"name":"Information and Software Technology","volume":"177 ","pages":"Article 107568"},"PeriodicalIF":3.8,"publicationDate":"2024-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0950584924001733/pdfft?md5=5b1e509c801bc25d768d323c42cb734d&pid=1-s2.0-S0950584924001733-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142232414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A systematic literature review on Agile, Cloud, and DevOps integration: Challenges, benefits 关于敏捷、云和 DevOps 整合的系统文献综述:挑战、益处
IF 3.8 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-02 DOI: 10.1016/j.infsof.2024.107569
Fatiha El Aouni , Karima Moumane , Ali Idri , Mehdi Najib , Saeed Ullah Jan

Context:

In today’s fast-paced digital landscape, integrating DevOps, cloud, and agile methodologies is crucial for meeting software demands. However, this integration remains under-researched.

Objective:

This study explores the integration of Agile, Cloud, and DevOps in today’s software development landscape. It aims to analyze the challenges and benefits associated with merging these three approaches, focusing on their impact on software testing and the role of mindset in successful implementation and identifying the most suitable Agile methodologies.

Methods:

This investigation utilizes a Systematic Literature Review(SLR) to enrich comprehension of this integration in current software development practices.

Results:

The analysis of 31 articles highlights benefits such as improved collaboration and accelerated development, despite challenges with tool proliferation. Platforms like Jenkins, GitLab, Kubernetes, and Docker show promise in addressing these complexities. Our study examines the advantages and challenges of this integration, focusing on its impact on software testing and the role of mindset in successful implementation and identifying the most suitable Agile methodologies.

Conclusion:

The integration of Agile, DevOps, and Cloud signifies a vital move towards collaborative, scalable, and automated methods, crucial for swift delivery, enhanced quality, and ongoing competitiveness. This unified approach is fundamental for organizational advancement and innovation in the ever-evolving software development realm. Further research should tackle challenges in merging these methods and delve into their interactions with emerging technologies to refine practices for increased efficiency.

背景:在当今快节奏的数字化环境中,整合 DevOps、云计算和敏捷方法对于满足软件需求至关重要。目标:本研究探讨了敏捷、云和 DevOps 在当今软件开发领域的整合。方法:本研究利用系统文献综述(SLR)来丰富对当前软件开发实践中这一整合的理解。结果:对 31 篇文章的分析强调了改进协作和加速开发等优势,尽管存在工具激增的挑战。Jenkins、GitLab、Kubernetes 和 Docker 等平台显示了解决这些复杂问题的前景。我们的研究探讨了这种整合的优势和挑战,重点关注其对软件测试的影响以及思维方式在成功实施和确定最合适的敏捷方法中的作用。结论:敏捷、DevOps 和云的整合标志着向协作、可扩展和自动化方法的重要转变,对于快速交付、提高质量和持续竞争力至关重要。在不断发展的软件开发领域,这种统一的方法是组织进步和创新的基础。进一步的研究应解决合并这些方法所面临的挑战,并深入探讨它们与新兴技术的相互作用,以完善实践,提高效率。
{"title":"A systematic literature review on Agile, Cloud, and DevOps integration: Challenges, benefits","authors":"Fatiha El Aouni ,&nbsp;Karima Moumane ,&nbsp;Ali Idri ,&nbsp;Mehdi Najib ,&nbsp;Saeed Ullah Jan","doi":"10.1016/j.infsof.2024.107569","DOIUrl":"10.1016/j.infsof.2024.107569","url":null,"abstract":"<div><h3>Context:</h3><p>In today’s fast-paced digital landscape, integrating DevOps, cloud, and agile methodologies is crucial for meeting software demands. However, this integration remains under-researched.</p></div><div><h3>Objective:</h3><p>This study explores the integration of Agile, Cloud, and DevOps in today’s software development landscape. It aims to analyze the challenges and benefits associated with merging these three approaches, focusing on their impact on software testing and the role of mindset in successful implementation and identifying the most suitable Agile methodologies.</p></div><div><h3>Methods:</h3><p>This investigation utilizes a Systematic Literature Review(SLR) to enrich comprehension of this integration in current software development practices.</p></div><div><h3>Results:</h3><p>The analysis of 31 articles highlights benefits such as improved collaboration and accelerated development, despite challenges with tool proliferation. Platforms like Jenkins, GitLab, Kubernetes, and Docker show promise in addressing these complexities. Our study examines the advantages and challenges of this integration, focusing on its impact on software testing and the role of mindset in successful implementation and identifying the most suitable Agile methodologies.</p></div><div><h3>Conclusion:</h3><p>The integration of Agile, DevOps, and Cloud signifies a vital move towards collaborative, scalable, and automated methods, crucial for swift delivery, enhanced quality, and ongoing competitiveness. This unified approach is fundamental for organizational advancement and innovation in the ever-evolving software development realm. Further research should tackle challenges in merging these methods and delve into their interactions with emerging technologies to refine practices for increased efficiency.</p></div>","PeriodicalId":54983,"journal":{"name":"Information and Software Technology","volume":"177 ","pages":"Article 107569"},"PeriodicalIF":3.8,"publicationDate":"2024-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0950584924001745/pdfft?md5=e228bb6a5ecf5b26efe28bc3feb2aedb&pid=1-s2.0-S0950584924001745-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142128306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Graph-based explainable vulnerability prediction 基于图形的可解释漏洞预测
IF 3.8 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-31 DOI: 10.1016/j.infsof.2024.107566
Hong Quy Nguyen , Thong Hoang , Hoa Khanh Dam , Aditya Ghose

Significant increases in cyberattacks worldwide have threatened the security of organizations, businesses, and individuals. Cyberattacks exploit vulnerabilities in software systems. Recent work has leveraged powerful and complex models, such as deep neural networks, to improve the predictive performance of vulnerability detection models. However, these models are often regarded as “black box” models, making it challenging for software practitioners to understand and interpret their predictions. This lack of explainability has resulted in a reluctance to adopt or deploy these vulnerability prediction models in industry applications. This paper proposes a novel approach, Genetic Algorithm-based Vulnerability Prediction Explainer, (herein GAVulExplainer), which generates explanations for vulnerability prediction models based on graph neural networks. GAVulExplainer leverages genetic algorithms to construct a subgraph explanation that represents the crucial factor contributing to the vulnerability. Experimental results show that our proposed approach outperforms baselines in providing concrete reasons for a vulnerability prediction.

全球范围内网络攻击的显著增加威胁着组织、企业和个人的安全。网络攻击利用的是软件系统中的漏洞。最近的研究利用深度神经网络等强大而复杂的模型来提高漏洞检测模型的预测性能。然而,这些模型通常被视为 "黑箱 "模型,使软件从业人员难以理解和解释其预测结果。这种缺乏可解释性的情况导致人们不愿意在行业应用中采用或部署这些漏洞预测模型。本文提出了一种新方法--基于遗传算法的漏洞预测解释器(以下简称 GAVulExplainer),它基于图神经网络生成漏洞预测模型的解释。GAVulExplainer 利用遗传算法来构建子图解释,该子图解释代表了造成漏洞的关键因素。实验结果表明,我们提出的方法在为漏洞预测提供具体原因方面优于基线方法。
{"title":"Graph-based explainable vulnerability prediction","authors":"Hong Quy Nguyen ,&nbsp;Thong Hoang ,&nbsp;Hoa Khanh Dam ,&nbsp;Aditya Ghose","doi":"10.1016/j.infsof.2024.107566","DOIUrl":"10.1016/j.infsof.2024.107566","url":null,"abstract":"<div><p>Significant increases in cyberattacks worldwide have threatened the security of organizations, businesses, and individuals. Cyberattacks exploit vulnerabilities in software systems. Recent work has leveraged powerful and complex models, such as deep neural networks, to improve the predictive performance of vulnerability detection models. However, these models are often regarded as “black box” models, making it challenging for software practitioners to understand and interpret their predictions. This lack of explainability has resulted in a reluctance to adopt or deploy these vulnerability prediction models in industry applications. This paper proposes a novel approach, <strong>G</strong>enetic <strong>A</strong>lgorithm-based <strong>Vul</strong>nerability Prediction <strong>Explainer</strong>, (herein GAVulExplainer), which generates explanations for vulnerability prediction models based on graph neural networks. GAVulExplainer leverages genetic algorithms to construct a subgraph explanation that represents the crucial factor contributing to the vulnerability. Experimental results show that our proposed approach outperforms baselines in providing concrete reasons for a vulnerability prediction.</p></div>","PeriodicalId":54983,"journal":{"name":"Information and Software Technology","volume":"177 ","pages":"Article 107566"},"PeriodicalIF":3.8,"publicationDate":"2024-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S095058492400171X/pdfft?md5=51c2432186d2a7513da1bb84a4daf260&pid=1-s2.0-S095058492400171X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142149949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Information and Software Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1