-
Mahdavi-Hazaveh, R., Dremann, J., and Williams, L. :
"Software Development with Feature Toggles: Practices Used by Practitioners", Empirical Software Engineering journal, to appear.
-
Rahman, A., Parnin, C., and Williams, L. "Security Smells in Ansible and Chef Scripts: A Replication Study", ACM Transactions on Software Engineering (TOSEM), to appear.
-
Rahman, R., Mahdavi-Hazaveh, R., and Williams, L. :
A Literature Review on Mining Cyberthreat Intelligence from Unstructured Texts, Workshop on Deep Learning for Cyber Threat Intelligence (DL-CTI) at IEEE International Conference on Data Mining (ICDM'20), to appear
-
Rahman, A., Farhana, E., and Williams, L. :
The 'as Code' Activities: Development Anti-patterns for Infrastructure as Code, Empirical Software Engineering journal, 25, pp. 3430- 3467, 2020
-
Hui Guo, Ozgur Kafali, Anne-Liz Jeukeng, Laurie Williams, Munindar P. Singh:
Çorba: crowdsourcing to obtain requirements from regulations and breaches. Empirical Software Engineering 25(1): 532-561 (2020)
-
Christopher Theisen, Laurie Williams: Better together: Comparing vulnerability prediction models. Inf. Softw. Technol. 119 (2020)
-
Mehdi Mirakhorli, Matthias Galster, Laurie Williams:
Understanding Software Security from Design to Deployment. ACM SIGSOFT Software Engineering Notes 45(2): 25-26 (2020)
-
Rahman, A., Farhana, E., Parnin, C., Laurie Williams:
Gang of Eight: A Defect Taxonomy for Infrastructure as Code Scripts, International Conference on Software Engineering (ICSE) 2020, Seoul, South Korea
-
Rahman, R., Enck, W., Williams, L., :
Do Configuration Management Tools Make Systems More Secure? An Empirical Research Plan, HotSoS 2020 Poster, Lawrenceville, KS
-
Williams, L. at al., Continuous Deployment Transitions at Scale, in Tools and Techniques for Software Development in Large Organizations: Emerging Research and Opportunities, Vishnu Pendyala, ed. IGI Global, 2020.
-
Laurie Williams:
Science Leaves Clues. IEEE Secur. Priv. 17(5): 4-6 (2019)
-
Inger Anne Tøndel, Martin Gilje Jaatun, Daniela Soares Cruzes, Laurie Williams:
Collaborative security risk estimation in agile software development. Inf. Comput. Secur. 27(4) (2019)
-
Akond Rahman, Rezvan Mahdavi-Hezaveh, Laurie Williams:
A systematic mapping study of infrastructure as code research. Inf. Softw. Technol. 108: 65-77 (2019)
-
Akond Rahman, Laurie Williams:
Source code properties of defective infrastructure as code scripts. Inf. Softw. Technol. 112: 148-163 (2019)
-
Nuthan Munaiah, Akond Rahman, Justin Pelletier, Laurie Williams, Andrew Meneely:
Characterizing Attacker Behavior in a Cybersecurity Penetration Testing Competition. ESEM 2019: 1-6
-
Akond Rahman, Laurie Williams:
A bird's eye view of knowledge needs related to penetration testing. HotSoS 2019: 9:1-9:2
-
Nasif Imtiaz, Laurie Williams:
A synopsis of static analysis alerts on open source software. HotSoS 2019: 12:1-12:3
-
Akond Rahman, Chris Parnin, Laurie Williams:
The seven sins: security smells in infrastructure as code scripts. ICSE 2019: 164-175 ACM Distinguished Paper
-
Md. Rayhanur Rahman, Akond Rahman, Laurie Williams:
Share, But be Aware: Security Smells in Python Gists. ICSME 2019: 536-540
-
Nasif Imtiaz, Brendan Murphy, Laurie Williams:
How Do Developers Act on Static Analysis Alerts? An Empirical Study of Coverity Usage. ISSRE 2019: 323-333
-
Nasif Imtiaz, Akond Rahman, Effat Farhana, Laurie Williams:
Challenges with responding to static analysis tool alerts. MSR 2019: 245-249
-
Rui Shu, Tianpei Xia, Laurie Williams, Tim Menzies:
Better Security Bug Report Classification via Hyperparameter Optimization. CoRR abs/1905.06872 (2019)
-
Rezvan Mahdavi-Hezaveh, Jacob Dremann, Laurie Williams:
Feature Toggle Driven Development: Practices usedby Practitioners. CoRR abs/1907.06157 (2019)
-
Akond Rahman, Md. Rayhanur Rahman, Chris Parnin, Laurie Williams:
Security Smells in Infrastructure as Code Scripts. CoRR abs/1907.07159 (2019)
-
Rui Shu, Tianpei Xia, Jianfeng Chen, Laurie Williams, Tim Menzies:
Improved Recognition of Security Bugs via Dual Hyperparameter Optimization. CoRR abs/1911.02476 (2019)
-
Patrick Morrison, Rahul Pandita, Xusheng Xiao, Ram Chillarege, Laurie Williams:
Are vulnerabilities discovered and resolved like other defects? Empirical Software Engineering 23(3): 1383-1421 (2018)
-
Morrison, P., Moye, D., Pandita, R., Williams, L.
Mapping the Field of Software Development Security Metrics, Information and Software Technology, Vol 102, October 2018, pp. 146-159, https://doi.org/10.1016/j.infsof.2018.05.011.
-
Christopher Theisen, Nuthan Munaiah, Mahran Al-Zyoud, Jeffrey C. Carver, Andrew Meneely, Laurie Williams:
Attack surface definitions: A systematic literature review. Inf. Softw. Technol. 104: 94-103 (2018)
-
Laurie Williams, Gary McGraw, Sammy Migues:
Engineering Security Vulnerability Prevention, Detection, and Response. IEEE Softw. 35(5): 76-80 (2018)
-
Nuthan Munaiah, Akond Rahman, Justin Pelletier, Laurie Williams, Andrew Meneely:
Characterizing Attacker Behavior in a Cybersecurity Penetration Testing Competition. ESEM 2019: 1-6
-
Sarah Elder, Anna Mattapallil, Laurie Williams:
A comparative analysis of manual methods for analyzing security requirements in regulatory documents: POSTER. HotSoS 2018: 13:1
-
Christopher Theisen, Laurie Williams:
How bad is it, really? an analysis of severity scores for vulnerabilities: poster. HotSoS 2018: 20:1
-
Hui Guo, Özgür Kafali, Anne-Liz Jeukeng, Laurie Williams, Munindar P. Singh:
Toward extraction of security requirements from text: poster. HotSoS 2018: 27:1
-
Akond Rahman, Asif Partho, Patrick Morrison, Laurie Williams:
What questions do programmers ask about configuration as code? RCoSE@ICSE 2018: 16-22
-
Akond Rahman, Jonathan Stallings, Laurie Williams:
Defect prediction metrics for infrastructure as code scripts in DevOps. ICSE (Companion Volume) 2018: 414-415
-
Patrick Morrison, Tosin Daniel Oyetoyan, Laurie Williams:
Identifying security issues in software development: are keywords enough? ICSE (Companion Volume) 2018: 426-427
-
Akond Rahman, Laurie Williams:
Characterizing Defective Configuration Scripts Used for Continuous Deployment. ICST 2018: 34-45
-
Christopher Theisen, Hyunwoo Sohn, Dawson Tripp, Laurie Williams:
BP: Profiling Vulnerabilities on the Attack Surface. SecDev 2018: 110-119
-
Akond Rahman, Rezvan Mahdavi-Hezaveh, Laurie Williams:
Where Are The Gaps? A Systematic Mapping Study of Infrastructure as Code Research. CoRR abs/1807.04872 (2018)
-
Akond Rahman, Sarah Elder, Faysal Hossain Shezan, Vanessa Frost, Jonathan Stallings, Laurie Williams:
Categorizing Defects in Infrastructure as Code. CoRR abs/1809.07937 (2018)
-
Akond Rahman, Laurie Williams:
Source Code Properties of Defective Infrastructure as Code Scripts. CoRR abs/1810.09605 (2018)
Kevic, K., C., Murphy, Williams, L., Beckman, J., Characterizing Experimentation in Continuous Deployment: A Case Study on Bing, International Conference on Software Engineering (ICSE) Software Engineering in Practice (SEIP) 2017, Buenos Aires, Argentina, DOI: 10.1109/ICSE-SEIP.2017.19.
-
Rahman, A., Partho, A., Meder, D., and Williams, L., Which Factors Influence Usage of Build Automation Tools? International Conference on Software Engineering (ICSE), 3rd International Workshop on Rapid Continuous Software Engineering (RCoSE) 2017, Buenos Aires, Argentina, pp. 20-26.
-
Parnin, C., Helms, E, Atlee, C., Boughton, H., Ghattas, M., Glover, A., Holman, J., Micco, J., Murphy, B., Savor, T., Stumm, M., Whitaker, S., Williams, L., Top 10 Adages in Continuous Deployment, IEEE Software, Vol. 34, Issue 3, May-June 2017, pp. 86 - 95.
-
Kafali, O., Jones, J., Petruso, M., Williams, L. and Singh, M., How Good is a Security Policy against Real Breaches? A HIPAA Case Study, International Conference on Software Engineering (ICSE) 2017, Buenos Aires, Argentina, DOI: 10.1109/ICSE.2017.55.
-
Theisen, C., Murphy, B., Kerzig, K., Williams, L., Risk-Based Attack Surface Approximation: How Much Data is Enough?, International Conference on Software Engineering (ICSE) Software Engineering in Practice (SEIP) 2017, Buenos Aires, Argentina, DOI: 10.1109/ICSE-SEIP.2017.9.
-
King, J., Stallings, J., Riaz, M., and Williams, L., To Log, or Not to Log: Using Heuristics to Identify Mandatory Log Events – A Controlled Experiment, Empirical Software Engineering, doi:10.1007/s10664-016-9449-1, October 2017, Volume 22, Issue 5, pp 2684–2717.
-
Christopher Theisen, Marcel Dunaiski, Laurie Williams, Willem Visser:
Software Engineering Research at the International Conference on Software Engineering in 2016. ACM SIGSOFT Software Engineering Notes 42(4): 1-7 (2017).
-
Maria Riaz, Jason Tyler King, John Slankas, Laurie Williams, Fabio Massacci, Christian Quesada-López, Marcelo Jenkins:, Identifying the Implied: Findings from Three Differentiated Replications on the Use of Security Requirements Templates, Empirical Software Engineering, 10.1007/s10664-016-9481-1, August 2017, Volume 22, Issue 4, pp 2127-2178.
-
Morrison, P. and Williams, L., Surveying Security Practice use in Software Development, Symposium and Bootcamp on the Science of Security (HotSoS) 2017, Hanover, MD, pp. 85-94.
-
Burcham, M., Al-Zyoud, M., Carver, J., Alsaleh, M., Du, H., Gilani, F., Jiang, J., Rahman, A., Kafali, O., Al-Shaer, E., Williams, L., Characterizing Scientific Reporting in Security Literature: An analysis of ACM CCS and IEEE S&P Paper, Symposium and Bootcamp on the Science of Security (HotSoS) 2017, Hanover, MD, pp. 13-23.
-
Morrison, P. and Williams, L., Measuring Security Practice Use: A Case Study At IBM, 3rd International Workshop on Rapid Continuous Software Engineering (RCoSE) 2017, 5th International Workshop on Conducting empirical studies in industry (CESI) 2017, Buenos Aires, Argentina, DOI: 10.1109/CESI.2017.4
-
Rahman, A., Pradhan, P., Partho, A., and Williams, L., Predicting Android Application Security and Privacy Risk With Static Code Metrics, Short paper, 4th IEEE/ACM International Conference on Mobile Software Engineering and Systems (MobileSoft) 2017, Buenos Aires, Argentina, DOI: 10.1109/MOBILESoft.2017.14.
-
Rahul Pandita, Raoul Jetley, Sithu D. Sudarsan, Tim Menzies, Laurie Williams:
TMAP: Discovering relevant API methods through text mining of API documentation. J. Softw. Evol. Process. 29(12) (2017)
-
Christopher Theisen, Ted Zhu, Kevin Oliver, Laurie Williams:
Teaching Secure Software Development Through an Online Course. SecSE@ESORICS 2017: 19-33
-
Christopher Theisen, Marcel Dunaiski, Laurie A. Williams, Willem Visser:
Writing good software engineering research papers: revisited. ICSE (Companion Volume) 2017: 402
-
Best Paper, Savor, T., Douglas, M., Gentili, M., Williams, L., Beck, K., Stumm, M., Continuous Deployment at Facebook and OANDA, International Conference on Software Engineering (ICSE 2016) Software Engineering in Practice, Austin, TX, Companion pp. 21-30.
-
Rahman, A. and Williams, L., Security in DevOps: Synthesizing Practitioners Perceptions and Practices, International Workshop on Continuous Software Evolution and Delivery at the International Conference on Software Engineering (ICSE) 2016, Austin, TX, DOI: 10.1109/CSED.2016.021.
-
Riaz, M., Stallings, J., Singh, M., Slankas, J., and Williams, L., DIGS: A Framework for Discovering Goals for Security Requirements Engineering, International Symposium on Empirical Software Engineering and Measurement (ESEM) 2016, Ciudad Real, Spain, Article 35
-
Kafali, O., Singh, M., Williams, L. NANE: Identifying Misuse Cases Using Temporal Norm Enactments, International Conference on Requirements Engineering (RE 2016), Beijing, China, DOI: 10.1109/RE.2016.34.
-
Theisen, C., Williams, L., Oliver, K., and Murphy-Hill, E. Software Security Education at Scale, International Conference on Software Engineering (ICSE) Software Engineering Education and Training (SEET) track 2016, Austin, TX, 2016.
-
Riaz, M., Elder, S., and Williams, L., Prevention, Detection, and Response Patterns of Security Requirements, at Third International Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE) at Requirements Engineering (RE) 2016, DOI 10.1109/REW.2016.025.
-
Carver, J., Burcham, M., Kocak, S. A., Bener, A., Felderer, M., Gander, M., King, J., Markkula, J., Oivo, M., Sauerwein, C. and Williams, L., Establishing a Baseline for Measuring Advancement in the Science of Security – an Analysis of the 2015 IEEE Security & Privacy Proceedings, Symposium and Bootcamp on the Science of Security (HotSoS) 2016, Pittsburgh, PA, pp. 38-51.
-
Pandita. R., Kunal, T., Tung, T., ICON: Inferring Temporal Constraints from Natural Language API Descriptions, International Conference on Software Maintenance and Evolution (ICSME) 2016, Raleigh, NC DOI: 10.1109/ICSME.2016.59.
-
Menzies, T., Williams, L., Zimmerman, T., Perspective in Data Science for Software Engineering, Morgan Kaufmann, 2016.
-
Hanan Hibshi, Travis D. Breaux, Maria Riaz, Laurie Williams:
A grounded analysis of experts' decision-making during security assessments. J. Cybersecur. 2(2): 147-163 (2016)
-
Özgür Kafali, Munindar P. Singh, Laurie Williams:
Toward a normative approach for forensicability. HotSoS 2016: 65-67
-
Akond Ashfaque Ur Rahman, Laurie Williams:
Security practices in DevOps. HotSoS 2016: 109-111
-
Christopher Theisen, Laurie Williams:
Risk-based attack surface approximation: poster. HotSoS 2016: 121-123
-
Christopher Theisen, Laurie Williams:
Stack traces reveal attack surfaces. Perspectives on Data Science for Software Engineering 2016: 73-76
-
Rahman, A., Helms, E., Parnin, C., and Williams, L., Synthesizing Continuous Deployment Practices Used in Software Development, Agile 2015, Washington, DC, pp. 1-10.
-
Theisen, C., Herzig, K., Morrison, P., Murphy, B., and Williams, L., Approximating Attack Surfaces with Stack Traces, International Conference on Software Engineering (ICSE) Software Engineering in Practice 2015, Florence, Italy.
-
King, J., Pandita, R., and Williams, L., Enabling Forensics by Proposing Heuristics to Identify Mandatory Log Events, Symposium and bootcamp on the Science of Security (HotSoS 2015), Urbana-Champaign, IL, Article 6.
-
Morrison, P., Herzig, K., Murphy, B. and Williams, L., Challenges with Applying Vulnerability Prediction Models, Symposium and bootcamp on the Science of Security (HotSoS 2015), Urbana-Champaign, IL, Article 4.
-
Pandita, R., Jetley, R., Sudarsan, S., and Williams, L., Discoving Likely Mappings between APIs using Text Mining, 15th IEEE International Working Conference on Source Code Anaalysis and Manipulation (SCAM) 2015, Bremen, Germany, pp. 231 - 240.
-
Riaz, M., Breaux, T., and Williams, L., How Have We Evaluated Software Patterns in Problem Solving? A Systematic Mapping Study of Research Design Practices, Information and Software Technology, April 2015.
-
Murphy, B., Czerwonka, J., and Williams, L, Using Data to Make Decisions in Software Engineering: Providing a Method to Our Madness, in "The Art and Science of Analyzing Software Data" Bird, C., Menzies, T., and Zimmerman, T. (eds), Morgan Kaufmann, 2015.
-
Doyle, M., Williams, L. Cohn, M., and Rubin, K.,
Agile Software Development in Practice, 15th International Conference on Agile Software Development (XP2014), Rome, Italy, in Springer-Verlag Berlin, Heidelberg: Springer Agile Processes in Software Engineering and Extreme Programming, pp. 32-45.
-
Srikanth, H. and Williams, L.,Toward the Prioritization of System Test Cases, Software Testing, Verification and Reliability, Volume 24 Issue 4, June 2014, pp.320-337 .
-
John Slankas, Xusheng Xiao, Laurie A. Williams, Tao Xie:
Relation extraction for inferring access control rules from natural language artifacts. ACSAC 2014: 366-375
-
Maria Riaz, John Slankas, Jason Tyler King, Laurie A. Williams:
Using templates to elicit implied security requirements from functional requirements - a controlled experiment. ESEM 2014: 22:1-22:10
-
Jason Tyler King, Laurie A. Williams:
Log your CRUD: design principles for software logging mechanisms. HotSoS 2014: 5
-
JeeHyun Hwang, Laurie Williams, Mladen A. Vouk:
Access control policy evolution: an empirical study. HotSoS 2014: 28
-
Shweta Subramani, Mladen A. Vouk, Laurie A. Williams:
An analysis of Fedora security profile. HotSoS 2014: 35
-
JeeHyun Hwang, Da Young Lee, Laurie A. Williams, Mladen A. Vouk:
Access Control Policy Evolution: An Empirical Study. ISSRE 2014: 245-254.
-
Hanan Hibshi, Travis D. Breaux, Maria Riaz, Laurie A. Williams:
Towards a framework to measure security expertise in requirements analysis. ESPRE 2014: 13-18
-
Maria Riaz, Jason Tyler King, John Slankas, Laurie A. Williams:
Hidden in plain sight: Automatically identifying security requirements from natural language artifacts. RE 2014: 183-192
-
Anthony Thyron Rivers, Mladen A. Vouk, Laurie A. Williams:
On Coverage-Based Attack Profiles. SERE (Companion) 2014: 5-6
-
Williams, L., After All These Years, What Do Agile Teams Think About the Agile Principles?, Communications of the ACM, Vol.55, No. 4, April 2012,pp. 71-76.
-
King, J., Smith, B, and Williams, L.,Modifying Without a Trace: General Audit Guidelines are Inadequate for Electronic Health Record Audit Mechanisms, 2nd ACM SIGHIT International Health Informatics Symposium (IHI) 2012, Miami, FL, USA, pp.305-314r.
-
Meneely, A, Smith, B. and Williams, L., Validating Software Metrics: A Spectrum of Philosophies, ACM Transactions on Software Engineering, Volume 21 Issue 4, November 2012 Article No. 24.
-
Jason Tyler King, Ben H. Smith, Laurie Williams:
Audit Mechanisms in Electronic Health Record Systems: Protected Health Information May Remain Vulnerable to Undetected Misuse. Int. J. Comput. Model. Algorithms Medicine 3(2): 23-42 (2012)
-
Kumi Jinzenji, Takashi Hoshino, Laurie Williams, Kenji Takahashi:
Metric-Based Quality Evaluations for Iterative Software Development Approaches Like Agile. ISSRE Workshops 2012: 54-63
-
John Slankas, Laurie Williams:
Classifying Natural Language Sentences for Policy. POLICY 2012: 33-36
-
Maria Riaz, Laurie Williams:
Security requirements patterns: understanding the science behind the art of pattern writing. RePa 2012: 29-34
-
Ben H. Smith, Laurie Williams:
On the Effective Use of Security Test Patterns. SERE 2012: 108-117
-
Jason Tyler King, Laurie Williams:
Secure Logging and Auditing in Electronic Health Records Systems: What Can We Learn from the Payment Card Industry. HealthSec 2012
-
Patrick Morrison, Laurie Williams:
An Analysis of HIPAA Breach Data. HealthSec 2012
-
Williams, L., Brown, G., Meltzer, A., Nagappan, N.,
Scrum + Engineering Practices: Experiences of Three Microsoft Teams, International Symposium on Empirical Software Engineering and Measurement (ESEM) 2011, Banff, Canada, DOI: 10.1109/ESEM.2011.65.
IEEE Software Best Exerience Paper Award
-
Shin, Y. and Williams, L., An Initial Study on the Use of Execution Complexity Metrics as Indicators of Software Vulnerabilities, 7th International Workshop on Software Engineering for Secure Systems 2011 at the International Conference on Software Engineering, Honolulu, USA, electronic proceedings.
-
Helms, E. and Williams, L., Evaluating Access Control of Open Source Health Record Systems, 3rd Workshop on Software Engineering in Healthcare (SEHC) at the International Conference on Software Engineering, Honolulu, USA, electronic proceedings.
-
Austin, A. and Williams, L., One Technique is Not Enough: An Empirical Comparison of Vulnerability Discovery Techniques, International Symposium on Empirical Software Engineering and Meaurement (ESEM) 2011, Banff, Canada, DOI: 10.1109/ESEM.2011.18.
-
-
Shin, Y., Meneely, A., Williams, L., Osbourne, J., Evaluating Complexity, Code Churn, and Developer Activity Metrics as Indicators of Software Vulnerabilities, IEEE Transactions in Software Engineering, Volume: 37, Issue: 6, Nov.-Dec. 2011, pp. 772 - 787.
-
Zimmermann, T., Nagappan, N. Herzig, K., Premraj, R. and Williams, L.,
An Empirical Study on the Relation between Dependency Neighborhoods and Failures, International Conference on Software Testing, Verification, and Validation (ICST) 2011, Berlin, 347-356.
-
Williams, L., "Pair Programming", in Making Software: What Really Works, and Why We Believe It , O'Reilly Media, Inc., 2011.
-
Schmidt, J. Y., Antón, A., Williams, L., and Otto, P., The Role of Data Use Agreements in Specifying Legally Compliant Software Requirements, Fourth Workshop on Requirements Engineering and Law at Requirements Engineering (RE) 2011, Trento, Italy, pp. 1-4,.
-
Meneely, A, Rotella, P. and Williams, L., Does Adding Manpower Also Affect Quality? An Empirical Longitudinal Analysis, ACM Foundations of Software Engineering (FSE) 2011, Szeged, Hungary, pp. 81-90.
-
Meneely, A, Smith, B. and Williams, L., The iTrust Electronic Health Records System in Software and Systems Traceability, Huang, Jane, Gotel, Orlena, Zisman, Andrea (Eds.) ISBN: 978-1-4471-2238-8.
-
-
Heckman, S. and Williams, L.,
Systematic Literature Review of Actionable Alert Identification Techniques for Automated Static Code Analysis, Information and Software Technology, Vol. 53, No. 4, April 2011.