Publications | Google Scholar

Computer Security Top-Tier Venues: IEEE Symposium on Security & Privacy (S&P), USENIX Security Symposium (USENIX), ACM Conference on Computer and Communications Security (CCS), and the ISOC Network and Distributed Systems Security Symposium (NDSS).
Software Engineering Top-Tier Venues: International Conference on Software Engineering (ICSE), European Software Engineering Conference/ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE) and Automated Software Engineering Conference (ASE).
Premier Journals: ACM Transactions on Privacy & Security (TOPS) - Security, ACM Transactions on Software Engineering and Methodology (TOSEM) - Software Engineering.

1. P. Mandal, A. S. Ami, V. Olaiya, S. H. Razmjo, and A. Nadkarni, “‘Belt and suspenders’ or ‘just red tape’?: Investigating Early Artifacts and User Perceptions of IoT App Security Certification,” in Proceedings of the 2024 USENIX Security Symposium (USENIX), Aug. 2024.
[articlePDF]
BibTeX
@inproceedings{maon24,
  author = {Mandal, Prianka and Ami, Amit Seal and Olaiya, Victor and Razmjo, Sayyed Hadi and Nadkarni, Adwait},
  title = {{"Belt and suspenders" or "just red tape"?: Investigating Early Artifacts and User Perceptions of IoT App Security Certification}},
  booktitle = {Proceedings of the 2024 USENIX Security Symposium (USENIX)},
  year = {2024},
  month = aug,
  note = {to be published in},
  pdf = {https://www.adwaitnadkarni.com/downloads/mandal-sec24.pdf},
  month_numeric = {8}
}

2. A. S. Ami, K. Moran, D. Poshyvanyk, and A. Nadkarni, “‘False negative - that one is going to kill you’ - Understanding Industry Perspectives of Static Analysis based Security Testing,” in Proceedings of the 2024 IEEE Symposium on Security and Privacy (S&P), San Francisco, CA, USA, May 2024.
[articlePDF] [languageWebsite] [sourceArtifact] [menu_bookRead Online]
BibTeX
@inproceedings{ami-fn-oakland24,
  author = {Ami, Amit Seal and Moran, Kevin and Poshyvanyk, Denys and Nadkarni, Adwait},
  title = {{"False negative - that one is going to kill you" - Understanding Industry Perspectives of Static Analysis based Security Testing}},
  booktitle = {Proceedings of the 2024 IEEE Symposium on Security and Privacy (S\&P)},
  address = {San Francisco, CA, USA},
  year = {2024},
  publisher = {IEEE Computer Society},
  month = may,
  note = {to be published in},
  pdf = {https://amitsealami.com/publications/ami-fn-oakland24.pdf},
  month_numeric = {5}
}

3. A. S. Ami et al., “MASC: A Tool for Mutation-Based Evaluation of Static Crypto-API Misuse Detectors,” in Proceedings of the ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE’23), Demonstration Track, San Francisco, Dec. 2023, doi: 10.1145/3611643.3613099.
[articlePDF] [languageWebsite] [videocamVideo] [sourceArtifact]
BibTeX
@inproceedings{asr-masc-demo,
  author = {Ami, Amit Seal and Ahmed, Syed Yusuf and Redoy, Radowan Mahmud and Cooper, Nathan and Kafle, Kaushal and Moran, Kevin and Poshyvanyk, Denys and Nadkarni, Adwait},
  title = {{MASC: A Tool for Mutation-Based Evaluation of Static Crypto-API Misuse Detectors}},
  booktitle = {Proceedings of the ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE'23), Demonstration Track},
  year = {2023},
  doi = {10.1145/3611643.3613099},
  pdf = {https://amitsealami.com/publications/ami-fse23demo.pdf},
  address = {San Francisco},
  month = dec,
  month_numeric = {12}
}

4. A. S. Ami, N. Cooper, K. Kafle, K. Moran, D. Poshyvanyk, and A. Nadkarni, “Why Crypto-detectors Fail: A Systematic Evaluation of Cryptographic Misuse Detection Techniques,” in 2022 IEEE Symposium on Security and Privacy (S&P), San Francisco, CA, USA, May 2022, pp. 397–414, doi: 10.1109/SP46214.2022.9833582 [Online]. Available at: https://ieeexplore.ieee.org/document/9833582
[articlePDF] [languageWebsite] [videocamVideo] [sourceArtifact] [newspaperNews]
BibTeX
@inproceedings{ami-masc-oakland22,
  author = {Ami, {Amit Seal} and Cooper, Nathan and Kafle, Kaushal and Moran, Kevin and Poshyvanyk, Denys and Nadkarni, Adwait},
  booktitle = {2022 IEEE Symposium on Security and Privacy (S\&P)},
  title = {{Why Crypto-detectors Fail: A Systematic Evaluation of Cryptographic Misuse Detection Techniques}},
  year = {2022},
  address = {San Francisco, CA, USA},
  month = may,
  pages = {397--414},
  publisher = {IEEE Computer Society},
  issn = {2375-1207},
  pdf = {https://amitsealami.com/publications/ami-oakland22.pdf},
  url = {https://ieeexplore.ieee.org/document/9833582},
  doi = {10.1109/SP46214.2022.9833582},
  month_numeric = {5}
}

5. A. S. Ami, K. Kafle, K. Moran, A. Nadkarni, and D. Poshyvanyk, “Demo: Mutation-based Evaluation of Security-focused Static Analysis Tools for Android,” in Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering (ICSE’21), Formal Tool Demonstration, Virtual (originally Madrid, Spain), May 25th - 28th, 2021, May 2021.
[articlePDF] [languageWebsite] [videocamVideo] [sourceArtifact]
BibTeX
@inproceedings{demo-muse-2021,
  title = {{Demo: Mutation-based Evaluation of Security-focused Static Analysis Tools for Android}},
  author = {Ami, {Amit Seal} and Kafle, Kaushal and Moran, Kevin and Nadkarni, Adwait and Poshyvanyk, Denys},
  booktitle = {{Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering (ICSE’21), Formal Tool Demonstration, Virtual (originally Madrid, Spain), May 25th - 28th, 2021}},
  year = {2021},
  month = may,
  pdf = {https://amitsealami.com/publications/ami-icse21.pdf},
  month_numeric = {5}
}

6. A. S. Ami, K. Kafle, K. Moran, A. Nadkarni, and D. Poshyvanyk, “Systematic Mutation-based Evaluation of the Soundness of Security-focused Android Static Analysis Techniques,” ACM Transactions on Privacy and Security, vol. 24, no. 3, Feb. 2021 [Online]. Available at: https://doi.org/10.1145/3439802
[articlePDF] [languageWebsite] [sourceArtifact]
BibTeX
@article{musetops,
  author = {Ami, {Amit Seal} and Kafle, Kaushal and Moran, Kevin and Nadkarni, Adwait and Poshyvanyk, Denys},
  title = {Systematic Mutation-based Evaluation of the Soundness of Security-focused Android Static Analysis Techniques},
  journal = {ACM Transactions on Privacy and Security},
  month = feb,
  articleno = {15},
  numpages = {37},
  year = {2021},
  issue_date = {February 2021},
  publisher = {Association for Computing Machinery},
  address = {New York, NY, USA},
  volume = {24},
  number = {3},
  issn = {2471-2566},
  url = {https://doi.org/10.1145/3439802},
  pdf = {https://amitsealami.com/publications/ami-tops21.pdf},
  month_numeric = {2}
}

7. A. S. Ami, M. M. Hasan, M. R. Rahman, and K. Sakib, “MobiCoMonkey - Context Testing of Android Apps,” in IEEE/ACM 5th International Conference on Mobile Software Engineering and Systems (MOBILESoft), May 2018, pp. 76–79.
[articlePDF] [sourceArtifact]
BibTeX
@inproceedings{MobiCoMonkeyContextTestingami2018,
  title = {{{MobiCoMonkey}} - {{Context Testing}} of {{Android Apps}}},
  booktitle = {{{IEEE}}/{{ACM}} 5th {{International Conference}} on {{Mobile Software Engineering}} and {{Systems}} ({{MOBILESoft}})},
  author = {Ami, Amit Seal and Hasan, Md. Mehedi and Rahman, Md. Rayhanur and Sakib, Kazi},
  year = {2018},
  month = may,
  pages = {76--79},
  pdf = {https://arxiv.org/pdf/1804.02533.pdf},
  month_numeric = {5}
}

8. M. Shafiuzzaman, A. S. Ami, and R. Rahman, “A Proactive Self-Adaptive Framework for Context-Aware Mobile Applications,” International Journal of Computer Applications, vol. 180, no. 20, pp. 1–8, Feb. 2018, doi: 10.5120/ijca2018916477. [Online]. Available at: http://www.ijcaonline.org/archives/volume180/number20/29045-2018916477
BibTeX
@article{ProactiveApproachContextawareshafiuzzaman2018,
  author = {Shafiuzzaman, Md. and Ami, Amit Seal and Rahman, Rayhanur},
  title = {A Proactive Self-Adaptive Framework for Context-Aware Mobile Applications},
  journal = {International Journal of Computer Applications},
  issue_date = {February 2018},
  volume = {180},
  number = {20},
  month = feb,
  year = {2018},
  issn = {0975-8887},
  pages = {1-8},
  numpages = {8},
  url = {http://www.ijcaonline.org/archives/volume180/number20/29045-2018916477},
  doi = {10.5120/ijca2018916477},
  publisher = {Foundation of Computer Science (FCS), NY, USA},
  address = {New York, USA},
  month_numeric = {2}
}

9. K. N. Neela, S. A. Ali, A. S. Ami, and A. U. Gias, “Modeling Software Defects as Anomalies: A Case Study on Promise Repository.,” JSW, vol. 12, no. 10, pp. 759–772, 2017.
BibTeX
@article{ModelingSoftwareDefectsneela2017,
  title = {Modeling Software Defects as Anomalies: {{A}} Case Study on Promise Repository.},
  author = {Neela, {Kamrun Nahar} and Ali, {Syed Asif} and Ami, {Amit Seal} and Gias, {Alim Ul}},
  year = {2017},
  volume = {12},
  pages = {759--772},
  journal = {JSW},
  number = {10}
}

10. A. Satter, A. S. Ami, and K. Sakib, “A Static Code Search Technique to Identify Dead Fields by Analyzing Usage of Setup Fields and Field Dependency in Test Code.,” in CDUD@ CLA, 2016, pp. 60–71.
BibTeX
@inproceedings{StaticCodeSearchsatter2016,
  title = {A Static Code Search Technique to Identify Dead Fields by Analyzing Usage of Setup Fields and Field Dependency in Test Code.},
  booktitle = {{{CDUD}}@ {{CLA}}},
  author = {Satter, Abdus and Ami, {Amit Seal} and Sakib, Kazi},
  year = {2016},
  pages = {60--71}
}

11. P. Mandal and A. S. Ami, “Selecting Best Attributes for Software Defect Prediction,” in 2015 IEEE International WIE Conference on Electrical and Computer Engineering (WIECON-ECE), Dec. 2015, pp. 110–113, doi: 10.1109/WIECON-ECE.2015.7444011.
BibTeX
@inproceedings{SelectingBestAttributesmandal2015,
  title = {Selecting Best Attributes for Software Defect Prediction},
  booktitle = {2015 {{IEEE International WIE Conference}} on {{Electrical}} and {{Computer Engineering}} ({{WIECON}}-{{ECE}})},
  author = {Mandal, Prianka and Ami, {Amit Seal}},
  year = {2015},
  month = dec,
  pages = {110--113},
  doi = {10.1109/WIECON-ECE.2015.7444011},
  month_numeric = {12}
}

12. A. S. Ami and S. Islam, “A Content Assist Based Approach for Providing Rationale of Method Change for Object Oriented Programming,” International Journal of Information Engineering and Electronic Business, vol. 7, no. 1, p. 49, 2015.
BibTeX
@article{ContentAssistBasedami2015,
  title = {A Content Assist Based Approach for Providing Rationale of Method Change for Object Oriented Programming},
  author = {Ami, {Amit Seal} and Islam, Shariful},
  year = {2015},
  volume = {7},
  pages = {49},
  publisher = {{Modern Education and Computer Science Press}},
  journal = {International Journal of Information Engineering and Electronic Business},
  number = {1}
}

13. A. S. Ami and M. S. Islam, “An Efficient Approach for Providing Rationale of Method Change for Object Oriented Programming,” in 2014 International Conference on Informatics, Electronics Vision (ICIEV), May 2014, pp. 1–6, doi: 10.1109/ICIEV.2014.6850772.
BibTeX
@inproceedings{EfficientApproachProvidingamitsealami2014,
  title = {An Efficient Approach for Providing Rationale of Method Change for Object Oriented Programming},
  booktitle = {2014 {{International Conference}} on {{Informatics}}, {{Electronics Vision}} ({{ICIEV}})},
  author = {Ami, Amit Seal and Islam, Md. Shariful},
  year = {2014},
  month = may,
  pages = {1--6},
  doi = {10.1109/ICIEV.2014.6850772},
  month_numeric = {5}
}

14. A. U. Gias et al., “A Formal Approach to Verify Software Scalability Requirements Using Set Theory and Hoare Triple,” in 16th Int’l Conf. Computer and Information Technology, Mar. 2014, pp. 7–12, doi: 10.1109/ICCITechn.2014.6997367.
BibTeX
@inproceedings{FormalApproachVerifygias2014,
  title = {A Formal Approach to Verify Software Scalability Requirements Using Set Theory and {{Hoare}} Triple},
  booktitle = {16th {{Int}}'l {{Conf}}. {{Computer}} and {{Information Technology}}},
  author = {Gias, Alim Ul and Tabassum, {Mirza Rehenuma} and Ami, {Amit Seal} and Imran, Asif and Ibrahim, Mohammad and Rahman, Rayhanur and Sakib, Kazi},
  year = {2014},
  month = mar,
  pages = {7--12},
  doi = {10.1109/ICCITechn.2014.6997367},
  month_numeric = {3}
}

15. A. Imran et al., “Cloud-Niagara: A High Availability and Low Overhead Fault Tolerance Middleware for the Cloud,” in 16th Int’l Conf. Computer and Information Technology, Mar. 2014, pp. 271–276, doi: 10.1109/ICCITechn.2014.6997344.
BibTeX
@inproceedings{CloudNiagaraHighAvailabilityimran2014,
  title = {Cloud-{{Niagara}}: {{A}} High Availability and Low Overhead Fault Tolerance Middleware for the Cloud},
  shorttitle = {Cloud-{{Niagara}}},
  booktitle = {16th {{Int}}'l {{Conf}}. {{Computer}} and {{Information Technology}}},
  author = {Imran, Asif and Gias, {Alim Ul} and Rahman, Rayhanur and Ami, {Amit Seal} and Rahman, Tajkia and Ishraque, Farhan and Sakib, Kazi},
  year = {2014},
  month = mar,
  pages = {271--276},
  doi = {10.1109/ICCITechn.2014.6997344},
  month_numeric = {3}
}