Print ISSN 1751-8806
This journal was previously known as IEE Proceedings - Software 1997-2006. ISSN 1462-5970. more..
Latest content
-
Guest Editorial: Machine learning applied to quality and security in software systems
- Author(s): Honghao Gao ; Walayat Hussain ; Ramón J. Durán Barroso ; Junaid Arshad ; Yuyu Yin
- + Show details - Hide details
-
p.
345
–347
(3)
-
Android malware detection via efficient application programming interface call sequences extraction and machine learning classifiers
- Author(s): Tanjie Wang ; Yueshen Xu ; Xinkui Zhao ; Zhiping Jiang ; Rui Li
- + Show details - Hide details
-
p.
348
–361
(14)
AbstractMalware detection is an important task for the ecosystem of mobile applications (APPs), especially for the Android ecosystem, and is vital to guarantee the user experience of Android APPs. There have been some exiting methods trying to solve the problem of malware detection, but the methods suffer from several defects, such as high time complexity and mediocre accuracy, which seriously decrease the practicability of existing methods. To solve these problems, in this study, we propose a novel Android malware detection framework, where we contribute an efficient Application Programming Interface (API) call sequences extraction algorithm and an investigation of different types of classifiers. In API call sequences extraction, we propose an algorithm for transforming the function call graph from a multigraph into a directed simple graph, which successfully avoids the unnecessary repetitive path searching. We also propose a pruning search, which further reduces the number of paths to be searched. Our algorithm greatly reduces the time complexity. We generate the transition matrix as classification features and investigate three types of machine learning classifiers to complete the malware detection task. The experiments are performed on real‐world Android Packages (APKs), and the results demonstrate that our method significantly reduces the running time and produces high detection accuracy.
In this paper, we propose a novel Android malware detection framework, where we contribute an efficient API call sequences extraction algorithm and an investigation of different types of classifiers. In API call sequences extraction, we propose an algorithm for transforming the function call graph from a multigraph into a directed simple graph. We also propose an effective pruning search algorithm.image
-
Selecting reliable blockchain peers via hybrid blockchain reliability prediction
- Author(s): Peilin Zheng ; Zibin Zheng ; Liang Chen
- + Show details - Hide details
-
p.
362
–377
(16)
AbstractBlockchain and blockchain‐based decentralised applications have been attracting increasing attention recently. In public blockchain systems, users usually connect to third‐party peers or run a peer to join the P2P blockchain network. However, connecting to unreliable blockchain peers will lead to resource waste and even loss of cryptocurrencies by repeated transactions. In order to select reliable blockchain peers, it is urgently needed to evaluate and predict their reliability of them. Faced with this problem, we propose hybrid blockchain reliability prediction (H‐BRP), a Hybrid Blockchain Reliability Prediction model, to extract the blockchain reliability factors and then make the personalised prediction for each user. Comprehensive experiments conducted on 100 blockchain requesters and 200 blockchain peers demonstrate the effectiveness of the proposed H‐BRP model. Further, the implementation and dataset of 2,000,000 test cases are released.
In public blockchain systems, users usually connect to third‐party peers or run a peer to join the P2P blockchain network. However, connecting to unreliable blockchain peers will lead to resource waste and even loss of cryptocurrencies by repeated transactions. We propose a Hybrid Blockchain Reliability Prediction model, to extract the blockchain reliability factors and then make the personalised prediction for each user.image
-
Just‐in‐time defect prediction enhanced by the joint method of line label fusion and file filtering
- Author(s): Huan Zhang ; Li Kuang ; Aolang Wu ; Qiuming Zhao ; Xiaoxian Yang
- + Show details - Hide details
-
p.
378
–391
(14)
AbstractJust‐In‐Time (JIT) defect prediction aims to predict the defect proneness of software changes when they are initially submitted. It has become a hot topic in software defect prediction due to its timely manner and traceability. Researchers have proposed many JIT defect prediction approaches. However, these approaches cannot effectively utilise line labels representing added or removed lines and ignore the noise caused by defect‐irrelevant files. Therefore, a JIT defect prediction model enhanced by the joint method of line label Fusion and file Filtering (JIT‐FF) is proposed. Firstly, to distinguish added and removed lines while preserving the original software changes information, the authors represent the code changes as original, added, and removed codes according to line labels. Secondly, to obtain semantics‐enhanced code representation, a cross‐attention‐based line label fusion method to perform complementary feature enhancement is proposed. Thirdly, to generate code changes containing fewer defect‐irrelevant files, the authors formalise the file filtering as a sequential decision problem and propose a reinforcement learning‐based file filtering method. Finally, based on generated code changes, CodeBERT‐based commit representation and multi‐layer perceptron‐based defect prediction are performed to identify the defective software changes. The experiments demonstrate that JIT‐FF can predict defective software changes more effectively.
Existing Just‐In‐Time (JIT) defect prediction approaches cannot effectively utilise line labels representing added or removed lines and ignore the noise caused by defect‐irrelevant files. To this end, we propose a JIT defect prediction model enhanced by the joint method of line label Fusion and file Filtering(JIT‐FF). The experiments demonstrate that JIT‐FF can predict defective software changes more effectively.image
-
Robust Malware identification via deep temporal convolutional network with symmetric cross entropy learning
- Author(s): Jiankun Sun ; Xiong Luo ; Weiping Wang ; Yang Gao ; Wenbing Zhao
- + Show details - Hide details
-
p.
392
–404
(13)
AbstractRecent developments in the field of Internet of things (IoT) have aroused growing attention to the security of smart devices. Specifically, there is an increasing number of malicious software (Malware) on IoT systems. Nowadays, researchers have made many efforts concerning supervised machine learning methods to identify malicious attacks. High‐quality labels are of great importance for supervised machine learning, but noises widely exist due to the non‐deterministic production environment. Therefore, learning from noisy labels is significant for machine learning‐enabled Malware identification. In this study, motivated by the symmetric cross entropy with satisfactory noise robustness, the authors propose a robust Malware identification method using temporal convolutional network (TCN). Moreover, word embedding techniques are generally utilised to understand the contextual relationship between the input operation code (opcode) and application programming interface function names. Here, considering the numerous unlabelled samples in real‐world intelligent environments, the authors pre‐train the TCN model on an unlabelled set using a word embedding method, that is, Word2Vec. In the experiments, the proposed method is compared with several traditional statistical methods and more recent neural networks on a synthetic Malware dataset and a real‐world dataset. The performance comparisons demonstrate the better performance and noise robustness of their proposed method, especially that the proposed method can yield the best identification accuracy of 98.75% in real‐world scenarios.
The malware identification scheme includes two phases. The learning phase trains a symmetric cross entropy (SCE)‐optimised temporal convolutional network (STCN) model on the word embedding from the pre‐trained word matrix. The identification phase predicts the malware category on the trained STCN.image
Most downloaded
Most cited
-
Progress on approaches to software defect prediction
- Author(s): Zhiqiang Li ; Xiao-Yuan Jing ; Xiaoke Zhu
-
Systematic review of success factors and barriers for software process improvement in global software development
- Author(s): Arif Ali Khan and Jacky Keung
-
Empirical investigation of the challenges of the existing tools used in global software development projects
- Author(s): Mahmood Niazi ; Sajjad Mahmood ; Mohammad Alshayeb ; Ayman Hroub
-
Feature extraction based on information gain and sequential pattern for English question classification
- Author(s): Yaqing Liu ; Xiaokai Yi ; Rong Chen ; Zhengguo Zhai ; Jingxuan Gu
-
Early stage software effort estimation using random forest technique based on use case points
- Author(s): Shashank Mouli Satapathy ; Barada Prasanna Acharya ; Santanu Kumar Rath