Manar H. Alalfi

Orcid: 0000-0003-4968-4127

According to our database1, Manar H. Alalfi authored at least 55 papers between 2007 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
A Model-Driven-Reverse Engineering Approach for Detecting Privilege Escalation in IoT Systems.
J. Object Technol., 2023

SimSched: A tool for Simulating Autosar Implementaion in Simulink.
CoRR, 2023

Opti Code Pro: A Heuristic Search-based Approach to Code Refactoring.
CoRR, 2023

Timed Model-Based Mutation Operators for Simulink Models.
CoRR, 2023

Optimizing Gas Consumption in Ethereum Smart Contracts: Best Practices and Techniques.
Proceedings of the 23rd IEEE International Conference on Software Quality, 2023

Security and Safety Verification in IoT Apps.
Proceedings of the IEEE International Conference on Software Maintenance and Evolution, 2023

2022
A mutation framework for evaluating security analysis tools in IoT applications.
Softw. Test. Verification Reliab., 2022

Predicting sensitive information leakage in IoT applications using flows-aware machine learning approach.
Empir. Softw. Eng., 2022

A Model-Driven-Engineering Approach for Detecting Privilege Escalation in IoT Systems.
CoRR, 2022

A Survey of Analysis Methods for Security and Safety verification in IoT Systems.
CoRR, 2022

Mining Domain Models in Ethereum DApps using Code Cloning.
CoRR, 2022

VOLCANO: Detecting Vulnerabilities of Ethereum Smart Contracts Using Code Clone Analysis.
CoRR, 2022

An Automated Approach for Privacy Leakage Identification in IoT Apps.
IEEE Access, 2022

Vulnerability Classification of Consumer-based IoT Software.
Proceedings of the 4th IEEE/ACM International Workshop on Software Engineering Research and Practices for the IoT, 2022

A survey of security vulnerabilities in Android automotive apps.
Proceedings of the 3rd International Workshop on Engineering and Cybersecurity of Critical Systems, 2022

2021
Reentrancy Vulnerability Identification in Ethereum Smart Contracts.
CoRR, 2021

SmartScan: An approach to detect Denial of Service Vulnerability in Ethereum Smart Contracts.
Proceedings of the 4th IEEE/ACM International Workshop on Emerging Trends in Software Engineering for Blockchain, 2021

2020
A Mutation Framework for Evaluating Security Analysis Tools in IoT Applications.
Proceedings of the 27th IEEE International Conference on Software Analysis, 2020

Identifying Vulnerable IoT Applications using Deep Learning.
Proceedings of the 27th IEEE International Conference on Software Analysis, 2020

An Approach for the Identification of Information Leakage in Automotive Infotainment systems.
Proceedings of the 20th IEEE International Working Conference on Source Code Analysis and Manipulation, 2020

A survey of security vulnerabilities in ethereum smart contracts.
Proceedings of the CASCON '20: Proceedings of the 30th Annual International Conference on Computer Science and Software Engineering, Toronto, Ontario, Canada, November 10, 2020

2019
Security Smells in Smart Contracts.
Proceedings of the 19th IEEE International Conference on Software Quality, 2019

Automated Identification of Over-Privileged SmartThings Apps.
Proceedings of the 2019 IEEE International Conference on Software Maintenance and Evolution, 2019

Security analysis for SmartThings IoT applications.
Proceedings of the 6th International Conference on Mobile Software Engineering and Systems, 2019

A semi-automated framework for migrating web applications from SQL to document oriented NoSQL database.
Proceedings of the 29th Annual International Conference on Computer Science and Software Engineering, 2019

Detection of feature interaction in dynamic scripting languages.
Proceedings of the 29th Annual International Conference on Computer Science and Software Engineering, 2019

Variability Identification and Representation for Automotive Simulink Models.
Proceedings of the Automotive Systems and Software Engineering, 2019

2018
An approach to clone detection in sequence diagrams and its application to security analysis.
Softw. Syst. Model., 2018

Modeling AUTOSAR Implementations in Simulink.
Proceedings of the Modelling Foundations and Applications - 14th European Conference, 2018

2015
Detecting Android Malware Using Clone Detection.
J. Comput. Sci. Technol., 2015

SimNav: Simulink navigation of model clone classes.
Proceedings of the 15th IEEE International Working Conference on Source Code Analysis and Manipulation, 2015

2014
Clone Detection in Matlab Stateflow Models.
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2014

Towards a Taxonomy for Simulink Model Mutations.
Proceedings of the Seventh IEEE International Conference on Software Testing, 2014

Semi-automatic Identification and Representation of Subsystem Variability in Simulink Models.
Proceedings of the 30th IEEE International Conference on Software Maintenance and Evolution, Victoria, BC, Canada, September 29, 2014

Analysis and clustering of model clones: An automotive industrial experience.
Proceedings of the 2014 Software Evolution Week, 2014

2013
An approach to clone detection in behavioural models.
Proceedings of the 20th Working Conference on Reverse Engineering, 2013

Evolution of Model Clones in Simulink.
Proceedings of the Workshop on Models and Evolution co-located with ACM/IEEE 16th International Conference on Model Driven Engineering Languages and Systems (MoDELS 2013), 2013

A Framework for Migrating Web Applications to Web Services.
Proceedings of the Web Engineering - 13th International Conference, 2013

Using mutation analysis for a model-clone detector comparison framework.
Proceedings of the 35th International Conference on Software Engineering, 2013

2012
Normalizing object-oriented class styles in JavaScript.
Proceedings of the 14th IEEE International Symposium on Web Systems Evolution, 2012

Automated verification of role-based access control security models recovered from dynamic web applications.
Proceedings of the 14th IEEE International Symposium on Web Systems Evolution, 2012

Towards qualitative comparison of Simulink model clone detection approaches.
Proceedings of the Proceeding of the 6th International Workshop on Software Clones, 2012

Near-miss model clone detection for Simulink models.
Proceedings of the Proceeding of the 6th International Workshop on Software Clones, 2012

Recovering Role-Based Access Control Security Models from Dynamic Web Applications.
Proceedings of the Web Engineering - 12th International Conference, 2012

Models are code too: Near-miss clone detection for Simulink models.
Proceedings of the 28th IEEE International Conference on Software Maintenance, 2012

2011
Towards a framework for migrating web applications to web services.
Proceedings of the Center for Advanced Studies on Collaborative Research, 2011

2010
A Verification Framework for Access Control in Dynamic Web Applications.
PhD thesis, 2010

Analyzing natural-language artifacts of the software process.
Proceedings of the 26th IEEE International Conference on Software Maintenance (ICSM 2010), 2010

Automating Coverage Metrics for Dynamic Web Applications.
Proceedings of the 14th European Conference on Software Maintenance and Reengineering, 2010

2009
Modelling methods for web application verification and testing: state of the art.
Softw. Test. Verification Reliab., 2009

WAFA: Fine-grained dynamic analysis of web applications.
Proceedings of the 11th IEEE International Symposium on Web Systems Evolution, 2009

Automated Reverse Engineering of UML Sequence Diagrams for Dynamic Web Applications.
Proceedings of the Second International Conference on Software Testing Verification and Validation, 2009

A verification framework for access control in dynamic web applications.
Proceedings of the Canadian Conference on Computer Science & Software Engineering, 2009

2008
SQL2XMI: Reverse Engineering of UML-ER Diagrams from Relational Database Schemas.
Proceedings of the WCRE 2008, 2008

2007
A Survey of Analysis Models and Methods in Website Verification and Testing.
Proceedings of the Web Engineering, 7th International Conference, 2007


  Loading...