June 2025
·
2 Reads
This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.
June 2025
·
2 Reads
May 2025
·
10 Reads
Esoteric programming languages are challenging to learn, but their unusual features and constraints may serve to improve programming ability. From languages designed to be intentionally obtuse (e.g. INTERCAL) to others targeting artistic expression (e.g. Piet) or exploring the nature of computation (e.g. Fractan), there is rich variety in the realm of esoteric programming languages. This essay examines the counterintuitive appeal of esoteric languages and seeks to analyse reasons for this popularity. We will explore why people are attracted to esoteric languages in terms of (a) program comprehension and construction, as well as (b) language design and implementation. Our assertion is that esoteric languages can improve general PL awareness, at the same time as enabling the esoteric programmer to impress their peers with obscure knowledge. We will also consider pedagogic principles and the use of AI, in relation to esoteric languages. Emerging from the specific discussion, we identify a general set of 'good' reasons for designing new programming languages. It may not be possible to be exhaustive on this topic, and it is certain we have not achieved that goal here. However we believe our most important contribution is to draw attention to the varied and often implicit motivations involved in programming language design.
April 2025
·
7 Reads
Cyber supply chain, encompassing digital asserts, software, hardware, has become an essential component of modern Information and Communications Technology (ICT) provisioning. However, the growing inter-dependencies have introduced numerous attack vectors, making supply chains a prime target for exploitation. In particular, advanced persistent threats (APTs) frequently leverage supply chain vulnerabilities (SCVs) as entry points, benefiting from their inherent stealth. Current defense strategies primarly focus on prevention through blockchain for integrity assurance or detection using plain-text source code analysis in open-source software (OSS). However, these approaches overlook scenarios where source code is unavailable and fail to address detection and defense during runtime. To bridge this gap, we propose a novel approach that integrates multi-source data, constructs a comprehensive dynamic provenance graph, and detects APT behavior in real time using temporal graph learning. Given the lack of tailored datasets in both industry and academia, we also aim to simulate a custom dataset by replaying real-world supply chain exploits with multi-source monitoring.
April 2025
·
4 Reads
Effective anomaly detection from logs is crucial for enhancing cybersecurity defenses by enabling the early identification of threats. Despite advances in anomaly detection, existing systems often fall short in areas such as post-detection validation, scalability, and effective maintenance. These limitations not only hinder the detection of new threats but also impair overall system performance. To address these challenges, we propose CEDLog, a novel practical framework that integrates Elastic Weight Consolidation (EWC) for continual learning and implements distributed computing for scalable processing by integrating Apache Airflow and Dask. In CEDLog, anomalies are detected through the synthesis of Multi-layer Perceptron (MLP) and Graph Convolutional Networks (GCNs) using critical features present in event logs. Through comparisons with update strategies on large-scale datasets, we demonstrate the strengths of CEDLog, showcasing efficient updates and low false positives
April 2025
·
9 Reads
·
1 Citation
Cyber supply chain, encompassing digital asserts, software, hardware, has become an essential component of modern Information and Communications Technology (ICT) provisioning. However, the growing inter-dependencies have introduced numerous attack vectors, making supply chains a prime target for exploitation. In particular, advanced persistent threats (APTs) frequently leverage supply chain vulnerabilities (SCVs) as entry points, benefiting from their inherent stealth. Current defense strategies primarly focus on prevention through blockchain for integrity assurance or detection using plain-text source code analysis in open-source software (OSS). However, these approaches overlook scenarios where source code is unavailable and fail to address detection and defense during runtime. To bridge this gap, we propose a novel approach that integrates multi-source data, constructs a comprehensive dynamic provenance graph, and detects APT behavior in real time using temporal graph learning. Given the lack of tailored datasets in both industry and academia, we also aim to simulate a custom dataset by replaying real-world supply chain exploits with multi-source monitoring.
March 2025
·
28 Reads
Effective anomaly detection from logs is crucial for enhancing cybersecurity defenses by enabling the early identification of threats. Despite advances in anomaly detection, existing systems often fall short in areas such as post-detection validation, scalability, and effective maintenance. These limitations not only hinder the detection of new threats but also impair overall system performance. To address these challenges, we propose CEDLog, a novel practical framework that integrates Elastic Weight Consolidation (EWC) for continual learning and implements distributed computing for scalable processing by integrating Apache Airflow and Dask. In CEDLog, anomalies are detected through the synthesis of Multi-layer Perceptron (MLP) and Graph Convolutional Networks (GCNs) using critical features present in event logs. Through comparisons with update strategies on large-scale datasets, we demonstrate the strengths of CEDLog, showcasing efficient updates and low false positives.
March 2025
·
74 Reads
·
2 Citations
Multi-source logs offer a holistic view of system activities , enabling detailed analysis for detecting potential threats. A practical method for threat detection involves explicit extraction of entity triples (subject, action, object) to construct provenance graphs, facilitating system behavior analysis. However , existing log parsing methods primarily focus on extracting parameters and events from raw logs while entity extraction methods are often limited to processing single log types. To address these limitations, we propose UTLParser, a novel scalable unified framework for log parsing and analysis. UTLParser adopts semantic analysis to construct causal graphs by merging multiple sub-graphs from diverse log sources within a labeled log dataset. It leverages domain-specific knowledge, such as Points of Interest for threat hunting, and implements parallel processing at both subgraph fusion and fine-grained individual log parsing levels. Additionally, UTLParser addresses log generation delays and provides optimized interfaces for temporal graph querying. Our experimental results demonstrate that UTLParser overcomes the limitations of existing log parsing approaches, achieving superior performance on certain log types. Moreover, UTLParser precisely extracts explicit causal threat information while maintaining compatibility with a wide range of downstream applications.
March 2025
·
12 Reads
Reducing the memory footprint of Machine Learning (ML) models, especially Deep Neural Networks (DNNs), is imperative to facilitate their deployment on resource-constrained edge devices. However, a notable drawback of DNN models lies in their susceptibility to adversarial attacks, wherein minor input perturbations can deceive them. A primary challenge revolves around the development of accurate, resilient, and compact DNN models suitable for deployment on resource-constrained edge devices. This paper presents the outcomes of a compact DNN model that exhibits resilience against both black-box and white-box adversarial attacks. This work has achieved this resilience through training with the QKeras quantization-aware training framework. The study explores the potential of QKeras and an adversarial robustness technique, Jacobian Regularization (JR), to co-optimize the DNN architecture through per-layer JR methodology. As a result, this paper has devised a DNN model employing this co-optimization strategy based on Stochastic Ternary Quantization (STQ). Its performance was compared against existing DNN models in the face of various white-box and black-box attacks. The experimental findings revealed that, the proposed DNN model had small footprint and on average, it exhibited better performance than Quanos and DS-CNN MLCommons/TinyML (MLC/T) benchmarks when challenged with white-box and black-box attacks, respectively, on the CIFAR-10 image and Google Speech Commands audio datasets.
February 2025
·
1 Read
January 2025
·
3 Reads
... Graph theory has long provided a solid mathematical foundation for modeling distributed systems and network structures. In systems characterized by multi-node interactions, limited information transmission, and strong structural evolution, graph-theoretic models not only offer structural representations but also serve as the logical core for algorithm design and behavioral analysis [1][2][3][4]. With the increasing demand for the integration of blockchain, supply chains, and enterprise data systems, issues of information transparency and consistency have become critical challenges to supply chain resilience and trust. ...
April 2025
... To process multi-source data into dynamic, comprehensive provenance graphs, we developed UTLParser [18], a scalable tool designed to parse diverse structured data into temporal provenance graphs. These graphs serve as the foundation for subsequent detection methods. ...
March 2025
... To address RQ1, we conducted a comprehensive survey [16] that includes a statistical analysis comparing techniques used in general APT detection and those tailored for APTs exploiting SCVs. The findings reveal the unique exploitation chain of APTs in SCVs. ...
January 2025
IEEE Internet of Things Journal
... 3 https://www.nuget.org/ 4 https://packagist.org/ package execution, feature extraction, and label matching, are available online [8] to facilitate reproducibility and further research. ...
November 2024
... In [20], the authors studied APT attacks more deeply than other works, reviewed APT attack case studies, and gave preventive countermeasures and existing detection methods for APT attacks. In [21], the focus is only on supply chain-based APT attacks. In [21], the authors presented the detection methods that are helpful in realtime detection by studying 26 papers. ...
January 2024
... However, the advancement of technology has introduced innovative approaches that enhance engagement and experience, personalisation, and efficiency in learning. In recent years, studies focused on improving computer programming teaching and learning methods such as project-based and problem-based learning (Alsmadi et al., 2024), student engagement through active learning, pair/peer programming (Orr, 2024), gamification using leaderboards (Cigdem et al., 2024), Kahoot (Zayas, 2023), and other digital tools (Moraes et al., 2023), online learning via interactive coding platforms (Alasmari et al., 2024), debugging instruction and techniques and flipped classroom (Chen & Hsu, 2021) adaptation to remote and hybrid learning settings (see Figure 1). These studies have noted both the benefits and limitations. ...
January 2024
... In general, adaptation of contemporary C/C++ source code to CHERI C/C++ is straightforward and requires only very small changes to the source code (e.g., 0.026% LoC reported for porting a desktop stack based on X11 and KDE [23]). Low-level system and heavily platformspecific C/C++ code tends to require more porting effort [5,11,13,19], as does some code not complying with existing C standards. ...
October 2023
... Voice-activated systems, such as home automation systems discussed in this study, interact with critical devices such as lights, door locks, and appliances, making them vulnerable to several security threats. These include spoofing attacks (e.g., playing pre-recorded or synthetic voice commands) [46], adversarial perturbations that fool the model [47], and privacy concerns related to audio data capture. To overcome such risks, the proposed system addresses key vulnerabilities in the following ways: ...
June 2023
... In general, adaptation of contemporary C/C++ source code to CHERI C/C++ is straightforward and requires only very small changes to the source code (e.g., 0.026% LoC reported for porting a desktop stack based on X11 and KDE [23]). Low-level system and heavily platformspecific C/C++ code tends to require more porting effort [5,11,13,19], as does some code not complying with existing C standards. ...
June 2023
... This model characterizes the overall latency of vehicle task offloading while considering resource utilization, edge server workloads, and vehicle movement characteristics. The suggested PSO metaheuristic has been modified to align with the design of modern GPUs, improving the search for offloading opportunities [40]. A particle swarm optimization (PSO) metaheuristic has been proposed for optimizing heterogeneous work allocation in edge computing microclusters. ...
December 2022