FAIL: Analyzing Software Failures from the News Using LLMsThis is a brief for the research paper “FAIL: Analyzing Software Failures from the News Using LLMs”, published at the IEEE/ACM 2024…Nov 9, 2024Nov 9, 2024
Pruning One More Token is EnoughThis is a brief for the research paper “Pruning One More Token is Enough: Leveraging Latency-Workload Non-Linearities for Vision…Nov 8, 2024Nov 8, 2024
On the Contents and Utility of IoT Cybersecurity GuidelinesThis is a brief for the research paper “On the Contents and Utility of IoT Cybersecurity Guidelines,” published at ACM FSE 2024.Jul 8, 2024Jul 8, 2024
Signing in Four Public Software Package Registries: Quantity, Quality, and Influencing FactorsThis is a brief for the research paper “Signing in Four Public Software Package Registries: Quantity, Quality, and Influencing Factors,”…May 10, 2024May 10, 2024
Published inStackademicSystematically Detecting Packet Validation Vulnerabilities in Embedded Network StacksThis is a brief for the research paper “Systematically Detecting Packet Validation Vulnerabilities in Embedded Network Stacks”.Sep 4, 2023Sep 4, 2023
The Software Engineer as Tool-UserThis essay explores the ways in which software engineers use tools, focused on themes of Efficiency and Responsibility.Aug 14, 20232Aug 14, 20232
Published inStackademicReflecting on the use of the policy-process-product theoryWhat do empirical software engineering researchers write papers about? This is a brief of a research paper at ESEC/FSE-IVR’23.Aug 2, 20231Aug 2, 20231
An Empirical Study of Pre-Trained Model Reuse in the Hugging Face Deep Learning Model RegistryBrief for ICSE’23 and MSR’23 papers.May 26, 2023May 26, 2023
Incorporating Failure Knowledge into Design Decisions for IoT Systems: A Controlled ExperimentThis is a brief for the research paper “Incorporating Failure Knowledge into Design Decisions for IoT Systems“.May 24, 2023May 24, 2023
Reflections on Software Failure AnalysisThis is a brief for the research paper “Reflecting on Software Failure Analysis”, published at ACM’s ESEC/FSE-IVR’22.Jan 10, 2023Jan 10, 2023
Reflecting on Recurring Failures in IoT DevelopmentThis is a brief for the research paper “Reflecting on Recurring Failures in IoT Development”, published at ASE 2022.Dec 16, 2022Dec 16, 2022
Published inStackademicSoK: Analysis of Software Supply Chain Security by Establishing Secure Design PropertiesThis is a brief for the research paper “SoK: Analysis of Software Supply Chain Security by Establishing Secure Design Properties”.Dec 16, 2022Dec 16, 2022
An Empirical Study of Artifacts and Security Risks in the Pre-trained Model Supply ChainThis is a brief for the research paper “An Empirical Study of Artifacts and Security Risks in the Pre-trained Model Supply Chain”.Nov 2, 2022Nov 2, 2022
So you didn’t land a summer software engineering internship…Now what?This is my advice for computing students who were hoping for — but did not get — a summer internship in software engineering.Apr 21, 2022Apr 21, 2022
Published inCodeXSoftware FatigueThis post proposes a metaphor for software engineering: software fatigue. First I’ll talk briefly about the role of metaphor in software…Mar 30, 20222Mar 30, 20222
Exploiting Input Sanitization for Regex Denial of ServiceThis is a brief for the research paper “Exploiting Input Sanitization for Regex Denial of Service”, published at ICSE 2022. This work was…Mar 7, 2022Mar 7, 2022
Published inLevel Up CodingLow-Power Multi-Camera Object Re-Identification using Hierarchical Neural NetworksThis is a brief for the research paper “Low-Power Multi-Camera Object Re-Identification using Hierarchical Neural Networks”, published in…Jan 3, 2022Jan 3, 2022
Published inCodeXA Partial Replication of “DeepBugs: A Learning Approach to Name-based Bug Detection”This is a brief for the research paper “A Partial Replication of “DeepBugs: A Learning Approach to Name-based Bug Detection”, published in…Jul 19, 2021Jul 19, 2021
Ethical conduct in cybersecurity researchThe case of Linux vs. Wu & Lu 2021Apr 22, 20213Apr 22, 20213