Skip to main content

Showing 1–41 of 41 results for author: Ruohonen, J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.01446  [pdf, other

    cs.CR cs.CY

    An Exploratory Case Study on Data Breach Journalism

    Authors: Jukka Ruohonen, Kalle Hjerppe, Maximilian von Zastrow

    Abstract: This paper explores the novel topic of data breach journalism and data breach news through the case of databreaches.net, a news outlet dedicated to data breaches and related cyber crime. Motivated by the issues in traditional crime news and crime journalism, the case is explored by the means of text mining. According to the results, the outlet has kept a steady publishing pace, mainly focusing on… ▽ More

    Submitted 2 May, 2024; originally announced May 2024.

    Comments: Submitted

  2. arXiv:2303.02863  [pdf, ps, other

    cs.CY

    A Note on the Proposed Law for Improving the Transparency of Political Advertising in the European Union

    Authors: Jukka Ruohonen

    Abstract: There is an increasing supply and demand for political advertising throughout the world. At the same time, societal threats, such as election interference by foreign governments and other bad actors, continues to be a pressing concern in many democracies. Furthermore, manipulation of electoral outcomes, whether by foreign or domestic forces, continues to be a concern of many citizens who are also… ▽ More

    Submitted 1 November, 2023; v1 submitted 5 March, 2023; originally announced March 2023.

    Comments: A continuously updated deliberative working paper

  3. Reflections on the Data Governance Act

    Authors: Jukka Ruohonen, Sini Mickelsson

    Abstract: The European Union (EU) has been pursuing a new strategy under the umbrella label of digital sovereignty. Data is an important element in this strategy. To this end, a specific Data Governance Act was enacted in 2022. This new regulation builds upon two ideas: reuse of data held by public sector bodies and voluntary sharing of data under the label of data altruism. This short commentary reviews th… ▽ More

    Submitted 29 March, 2023; v1 submitted 20 February, 2023; originally announced February 2023.

    Comments: Digital Society, vol. 2, no. 1, pp. 1-10

  4. arXiv:2302.09942  [pdf, other

    cs.CY cs.CR

    Recent Trends in Cross-Border Data Access by Law Enforcement Agencies

    Authors: Jukka Ruohonen

    Abstract: Access to online data has long been important for law enforcement agencies in their collection of electronic evidence and investigation of crimes. These activities have also long involved cross-border investigations and international cooperation between agencies and jurisdictions. However, technological advances such as cloud computing have complicated the investigations and cooperation arrangemen… ▽ More

    Submitted 20 September, 2023; v1 submitted 20 February, 2023; originally announced February 2023.

    Comments: Withdrawn from peer review due to lack of time

  5. arXiv:2302.09939  [pdf, other

    cs.CY

    A Text Mining Analysis of Data Protection Politics: The Case of Plenary Sessions of the European Parliament

    Authors: Jukka Ruohonen

    Abstract: Data protection laws and policies have been studied extensively in recent years, but little is known about the parliamentary politics of data protection. This imitation applies even to the European Union (EU) that has taken the global lead in data protection and privacy regulation. For patching this notable gap in existing research, this paper explores the data protection questions raised by the M… ▽ More

    Submitted 20 February, 2023; originally announced February 2023.

    Comments: Submitted

  6. arXiv:2302.09933  [pdf, ps, other

    cs.HC cs.CY

    Mysterious and Manipulative Black Boxes: A Qualitative Analysis of Perceptions on Recommender Systems

    Authors: Jukka Ruohonen

    Abstract: Recommender systems are used to provide relevant suggestions on various matters. Although these systems are a classical research topic, knowledge is still limited regarding the public opinion about these systems. Public opinion is also important because the systems are known to cause various problems. To this end, this paper presents a qualitative analysis of the perceptions of ordinary citizens,… ▽ More

    Submitted 1 November, 2023; v1 submitted 20 February, 2023; originally announced February 2023.

    Comments: A working paper

  7. A Large-Scale Security-Oriented Static Analysis of Python Packages in PyPI

    Authors: Jukka Ruohonen, Kalle Hjerppe, Kalle Rindell

    Abstract: Different security issues are a common problem for open source packages archived to and delivered through software ecosystems. These often manifest themselves as software weaknesses that may lead to concrete software vulnerabilities. This paper examines various security issues in Python packages with static analysis. The dataset is based on a snapshot of all packages stored to the Python Package I… ▽ More

    Submitted 26 December, 2021; v1 submitted 27 July, 2021; originally announced July 2021.

    Comments: Proceedings of the 18th Annual International Conference on Privacy, Security and Trust (PST 2021), Auckland (online), IEEE, pp. 1-10

  8. Digital Divides and Online Media

    Authors: Jukka Ruohonen, Anne-Marie Tuikka

    Abstract: Digital divide has been a common concern during the past two or three decades; traditionally, it refers to a gap between developed and developing countries in the adoption and use of digital technologies. Given the importance of the topic, digital divide has been also extensively studied, although, hitherto, there is no previous research that would have linked the concept to online media. Given th… ▽ More

    Submitted 26 December, 2021; v1 submitted 25 June, 2021; originally announced June 2021.

    Comments: Proceedings of the 5th International Conference on E-Society, E-Education and E-Technology (ICSET 2021), Taipei (online), ACM, pp. 157-163

  9. Crossing Cross-Domain Paths in the Current Web

    Authors: Jukka Ruohonen, Joonas Salovaara, Ville Leppänen

    Abstract: The loading of resources from third-parties has evoked new security and privacy concerns about the current world wide web. Building on the concepts of forced and implicit trust, this paper examines cross-domain transmission control protocol (TCP) connections that are initiated to domains other than the domain queried with a web browser. The dataset covers nearly ten thousand domains and over three… ▽ More

    Submitted 25 June, 2021; originally announced June 2021.

    Comments: Proceedings of the 16th Annual Conference on Privacy, Security and Trust (PST 2018), Belfast, IEEE, pp. 1-5

  10. arXiv:2106.11000  [pdf, other

    cs.CY

    A Comparative Study of Online Disinformation and Offline Protests

    Authors: Jukka Ruohonen

    Abstract: In early 2021 the United States Capitol in Washington was stormed during a riot and violent attack. A similar storming occurred in Brazil in 2023. Although both attacks were instances in longer sequences of events, these have provided a testimony for many observers who had claimed that online actions, including the propagation of disinformation, have offline consequences. Soon after, a number of… ▽ More

    Submitted 17 September, 2023; v1 submitted 21 June, 2021; originally announced June 2021.

    Comments: Withdrawn from peer review due to lack of time

  11. arXiv:2106.10427  [pdf, other

    cs.CY

    Reassessing Measures for Press Freedom

    Authors: Jukka Ruohonen

    Abstract: There has been an increasing interest in press freedom in the face of various global scandals, transformation of media, technological change, obstacles to deliberative democracy, and other factors. Press freedom is frequently used also as an explanatory factor in comparative empirical research. However, validations of existing measurement instruments on press freedom have been far and few between.… ▽ More

    Submitted 19 September, 2023; v1 submitted 19 June, 2021; originally announced June 2021.

    Comments: Withdrawn from peer review due to lack of time

  12. arXiv:2104.04389  [pdf, other

    cs.CY

    A Few Observations About State-Centric Online Propaganda

    Authors: Jukka Ruohonen

    Abstract: This paper presents a few observations about pro-Kremlin propaganda between 2015 and early 2021 with a dataset from the East Stratcom Task Force (ESTF), which is affiliated with the European Union (EU) but working independently from it. Instead of focusing on misinformation and disinformation, the observations are motivated by classical propaganda research and the ongoing transformation of media s… ▽ More

    Submitted 9 April, 2021; originally announced April 2021.

    Comments: Submitted

  13. Assessing the Readability of Policy Documents on the Digital Single Market of the European Union

    Authors: Jukka Ruohonen

    Abstract: Today, literature skills are necessary. Engineering and other technical professions are not an exception from this requirement. Traditionally, technical reading and writing have been framed with a limited scope, containing documentation, specifications, standards, and related text types. Nowadays, however, the scope covers also other text types, including legal, policy, and related documents. Give… ▽ More

    Submitted 15 September, 2021; v1 submitted 23 February, 2021; originally announced February 2021.

    Comments: Proceedings of the Eighth International Conference on eDemocracy & eGovernment (ICEDEG 2021), Quito (online), IEEE, pp. 205-209

  14. A Review of Product Safety Regulations in the European Union

    Authors: Jukka Ruohonen

    Abstract: Product safety has been a concern in Europe ever since the early 1960s. Despite the long and relatively stable historical lineage of product safety regulations, new technologies, changes in the world economy, and other major transformations have in recent years brought product safety again to the forefront of policy debates. As reforms are also underway, there is a motivation to review the complex… ▽ More

    Submitted 19 June, 2022; v1 submitted 6 February, 2021; originally announced February 2021.

    Comments: International Cybersecurity Law Review

  15. The Treachery of Images in the Digital Sovereignty Debate

    Authors: Jukka Ruohonen

    Abstract: This short theoretical and argumentative essay contributes to the ongoing deliberation about the so-called digital sovereignty, as pursued particularly in the European Union (EU). Drawing from classical political science literature, the essay approaches the debate through paradoxes that arise from applying classical notions of sovereignty to the digital domain. With these paradoxes and a focus on… ▽ More

    Submitted 27 July, 2021; v1 submitted 4 December, 2020; originally announced December 2020.

    Comments: Minds and Machines, published online in July 2021, pp. 1-18

  16. arXiv:2011.07212  [pdf, other

    cs.CY

    Do Cyber Capabilities and Cyber Power Incentivize International Cooperation?

    Authors: Jukka Ruohonen

    Abstract: This paper explores a research question about whether defensive and offensive cyber security power and the capabilities to exercise the power influence the incentives of nation-states to participate in bilateral and multilateral cooperation (BMC) through formal and informal agreements, alliances, and norms. Drawing from international relations in general and structural realism in particular, three… ▽ More

    Submitted 13 November, 2020; originally announced November 2020.

    Comments: Submitted

  17. The GDPR Enforcement Fines at Glance

    Authors: Jukka Ruohonen, Kalle Hjerppe

    Abstract: The General Data Protection Regulation (GDPR) came into force in 2018. After this enforcement, many fines have already been imposed by national data protection authorities in Europe. This paper examines the individual GDPR articles referenced in the enforcement decisions, as well as predicts the amount of enforcement fines with available meta-data and text mining features extracted from the enforc… ▽ More

    Submitted 1 September, 2021; v1 submitted 2 November, 2020; originally announced November 2020.

    Comments: Information Systems, published online in August 2021, pp. 1-11. Substantial overlap expected with arXiv:2003.05151; accepted by venue (i.e., extended conference paper)

  18. arXiv:2011.00751  [pdf, other

    cs.CY

    A Critical Correspondence on Humpty Dumpty's Funding for European Journalism

    Authors: Jukka Ruohonen

    Abstract: This short critical correspondence discusses the Digital News Innovation (DNI) fund orchestrated by Humpty Dumpty -- a.k.a. Google -- for helping European journalism to innovate and renew itself. Based on topic modeling and critical discourse analysis, the results indicate that the innovative projects mostly mimic the old business model of Humpty Dumpty. With these results and the accompanying cri… ▽ More

    Submitted 14 June, 2021; v1 submitted 2 November, 2020; originally announced November 2020.

    Comments: Revised

  19. A Case Study on Software Vulnerability Coordination

    Authors: Jukka Ruohonen, Sampsa Rauti, Sami Hyrynsalmi, Ville Leppänen

    Abstract: Context: Coordination is a fundamental tenet of software engineering. Coordination is required also for identifying discovered and disclosed software vulnerabilities with Common Vulnerabilities and Exposures (CVEs). Motivated by recent practical challenges, this paper examines the coordination of CVEs for open source projects through a public mailing list. Objective: The paper observes the histori… ▽ More

    Submitted 24 July, 2020; originally announced July 2020.

    Journal ref: Information and Software Technology, 2018, vol. 103, pp. 239-257

  20. Extracting Layered Privacy Language Purposes from Web Services

    Authors: Kalle Hjerppe, Jukka Ruohonen, Ville Leppänen

    Abstract: Web services are important in the processing of personal data in the World Wide Web. In light of recent data protection regulations, this processing raises a question about consent or other basis of legal processing. While a consent must be informed, many web services fail to provide enough information for users to make informed decisions. Privacy policies and privacy languages are one way for add… ▽ More

    Submitted 30 April, 2020; originally announced April 2020.

    Comments: 2020 International Workshop on Privacy Engineering - IWPE'20

  21. Annotation-Based Static Analysis for Personal Data Protection

    Authors: Kalle Hjerppe, Jukka Ruohonen, Ville Leppänen

    Abstract: This paper elaborates the use of static source code analysis in the context of data protection. The topic is important for software engineering in order for software developers to improve the protection of personal data during software development. To this end, the paper proposes a design of annotating classes and functions that process personal data. The design serves two primary purposes: on one… ▽ More

    Submitted 22 March, 2020; originally announced March 2020.

    Journal ref: Privacy and Identity Management. Data for Better Living: AI and Privacy: 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Windisch, Switzerland, August 19--23, 2019, Revised Selected Papers, pp 343--358

  22. arXiv:2003.05151  [pdf, other

    cs.CY

    Predicting the Amount of GDPR Fines

    Authors: Jukka Ruohonen, Kalle Hjerppe

    Abstract: The General Data Protection Regulation (GDPR) was enforced in 2018. After this enforcement, many fines have already been imposed by national data protection authorities in the European Union (EU). This paper examines the individual GDPR articles referenced in the enforcement decisions, as well as predicts the amount of enforcement fines with available meta-data and text mining features extracted f… ▽ More

    Submitted 2 November, 2020; v1 submitted 11 March, 2020; originally announced March 2020.

    Journal ref: Proceedings of the First International Workshop "CAiSE for Legal Documents" (COUrT 2020), Grenoble (online), CEUR-WS, pp. 3-14, http://ceur-ws.org/Vol-2690/COUrT-paper1.pdf

  23. arXiv:2002.10731  [pdf, other

    cs.NI

    Measuring Basic Load-Balancing and Fail-Over Setups for Email Delivery via DNS MX Records

    Authors: Jukka Ruohonen

    Abstract: The domain name system (DNS) has long provided means to assure basic load-balancing and fail-over (BLBFO) for email delivery. A traditional method uses multiple mail exchanger (MX) records to distribute the load across multiple email servers. Round-robin DNS is the common alternative to this MX-based balancing. Despite the classical nature of these two solutions, neither one has received particula… ▽ More

    Submitted 24 July, 2020; v1 submitted 25 February, 2020; originally announced February 2020.

    Journal ref: Proceedings of the Global Internet Symposium (GIS 2020), IFIP Networking Conference (Networking 2020), Paris (online), IEEE, pp. 815-820, https://ieeexplore.ieee.org/document/9142814

  24. A Dip Into a Deep Well: Online Political Advertisements, Valence, and European Electoral Campaigning

    Authors: Jukka Ruohonen

    Abstract: Online political advertisements have become an important element in electoral campaigning throughout the world. At the same time, concepts such as disinformation and manipulation have emerged as a global concern. Although these concepts are distinct from online political ads and data-driven electoral campaigning, they tend to share a similar trait related to valence, the intrinsic attractiveness o… ▽ More

    Submitted 2 November, 2020; v1 submitted 28 January, 2020; originally announced January 2020.

    Journal ref: Proceedings of the 2nd Multidisciplinary International Symposium on Disinformation in Open Online Media (MISDOOM 2020), Leiden (online), Springer, pp. 37-51

  25. Empirical Notes on the Interaction Between Continuous Kernel Fuzzing and Development

    Authors: Jukka Ruohonen, Kalle Rindell

    Abstract: Fuzzing has been studied and applied ever since the 1990s. Automated and continuous fuzzing has recently been applied also to open source software projects, including the Linux and BSD kernels. This paper concentrates on the practical aspects of continuous kernel fuzzing in four open source kernels. According to the results, there are over 800 unresolved crashes reported for the four kernels by th… ▽ More

    Submitted 5 September, 2019; originally announced September 2019.

    Comments: The 4th IEEE International Workshop on Reliability and Security Data Analysis (RSDA), 2019 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW), Berlin, IEEE

  26. arXiv:1907.07498  [pdf, other

    cs.SE cs.CR cs.CY

    The General Data Protection Regulation: Requirements, Architectures, and Constraints

    Authors: Kalle Hjerppe, Jukka Ruohonen, Ville Leppänen

    Abstract: The General Data Protection Regulation (GDPR) in the European Union is the most famous recently enacted privacy regulation. Despite of the regulation's legal, political, and technological ramifications, relatively little research has been carried out for better understanding the GDPR's practical implications for requirements engineering and software architectures. Building on a grounded theory app… ▽ More

    Submitted 17 July, 2019; originally announced July 2019.

    Comments: Forthcoming in the 27th IEEE International Requirements Engineering Conference (RE'19), Jeju Island, IEEE

  27. Updating the Wassenaar Debate Once Again: Surveillance, Intrusion Software, and Ambiguity

    Authors: Jukka Ruohonen, Kai Kimppa

    Abstract: This paper analyzes a recent debate on regulating cyber weapons through multilateral export controls. The background relates to the amending of the international Wassenaar Arrangement with offensive cyber security technologies known as intrusion software. Implicitly, such software is related to previously unregulated software vulnerabilities and exploits, which also make the ongoing debate particu… ▽ More

    Submitted 5 June, 2019; originally announced June 2019.

    Comments: Journal of Information Technology & Politics (published online in May 2019)

  28. arXiv:1906.01883  [pdf, ps, other

    cs.CY

    David and Goliath: Privacy Lobbying in the European Union

    Authors: Jukka Ruohonen

    Abstract: The paper examines a question of how much more resources do organized business interests have when compared to resources of civil society groups in the context of privacy lobbying in the European Union (EU). To answer to the question, the paper draws from classical literature on power resources and pluralism. The empirical material comes from a lobbying register maintained by the EU. According to… ▽ More

    Submitted 5 June, 2019; originally announced June 2019.

    Comments: Submitted

  29. A Demand-Side Viewpoint to Software Vulnerabilities in WordPress Plugins

    Authors: Jukka Ruohonen

    Abstract: WordPress has long been the most popular content management system (CMS). This CMS powers millions and millions of websites. Although WordPress has had a particularly bad track record in terms of security, in recent years many of the well-known security risks have transmuted from the core WordPress to the numerous plugins and themes written for the CMS. Given this background, the paper analyzes kn… ▽ More

    Submitted 13 March, 2019; v1 submitted 13 December, 2018; originally announced December 2018.

    Comments: Forthcoming in: Proceedings of Evaluation and Assessment in Software Engineering (EASE 2019), Copenhagen, ACM

  30. An Empirical Analysis of Vulnerabilities in Python Packages for Web Applications

    Authors: Jukka Ruohonen

    Abstract: This paper examines software vulnerabilities in common Python packages used particularly for web development. The empirical dataset is based on the PyPI package repository and the so-called Safety DB used to track vulnerabilities in selected packages within the repository. The methodological approach builds on a release-based time series analysis of the conditional probabilities for the releases o… ▽ More

    Submitted 16 November, 2018; v1 submitted 31 October, 2018; originally announced October 2018.

    Comments: Forthcoming in: Proceedings of the 9th International Workshop on Empirical Software Engineering in Practice (IWESEP 2018), Nara, IEEE

  31. On the Integrity of Cross-Origin JavaScripts

    Authors: Jukka Ruohonen, Joonas Salovaara, Ville Leppänen

    Abstract: The same-origin policy is a fundamental part of the Web. Despite the restrictions imposed by the policy, embedding of third-party JavaScript code is allowed and commonly used. Nothing is guaranteed about the integrity of such code. To tackle this deficiency, solutions such as the subresource integrity standard have been recently introduced. Given this background, this paper presents the first empi… ▽ More

    Submitted 14 September, 2018; originally announced September 2018.

    Comments: Proceedings of the 33rd IFIP International Conference on ICT Systems Security and Privacy Protection (IFIP SEC 2018), Poznan, Springer, pp. 385--398

  32. Toward Validation of Textual Information Retrieval Techniques for Software Weaknesses

    Authors: Jukka Ruohonen, Ville Leppänen

    Abstract: This paper presents a preliminary validation of common textual information retrieval techniques for mapping unstructured software vulnerability information to distinct software weaknesses. The validation is carried out with a dataset compiled from four software repositories tracked in the Snyk vulnerability database. According to the results, the information retrieval techniques used perform unsat… ▽ More

    Submitted 5 September, 2018; originally announced September 2018.

    Comments: Proceedings of the 29th International Conference on Database and Expert Systems Applications (DEXA 2018), Regensburg, Springer, pp.~265--277

  33. Invisible Pixels Are Dead, Long Live Invisible Pixels!

    Authors: Jukka Ruohonen, Ville Leppänen

    Abstract: Privacy has deteriorated in the world wide web ever since the 1990s. The tracking of browsing habits by different third-parties has been at the center of this deterioration. Web cookies and so-called web beacons have been the classical ways to implement third-party tracking. Due to the introduction of more sophisticated technical tracking solutions and other fundamental transformations, the use of… ▽ More

    Submitted 22 August, 2018; originally announced August 2018.

    Comments: Forthcoming in the 17th Workshop on Privacy in the Electronic Society (WPES 2018), Toronto, ACM

  34. arXiv:1805.09850  [pdf, other

    cs.CR cs.CY cs.SE

    A Bug Bounty Perspective on the Disclosure of Web Vulnerabilities

    Authors: Jukka Ruohonen, Luca Allodi

    Abstract: Bug bounties have become increasingly popular in recent years. This paper discusses bug bounties by framing these theoretically against so-called platform economy. Empirically the interest is on the disclosure of web vulnerabilities through the Open Bug Bounty (OBB) platform between 2015 and late 2017. According to the empirical results based on a dataset covering nearly 160 thousand web vulnerabi… ▽ More

    Submitted 24 May, 2018; originally announced May 2018.

    Comments: 17th Annual Workshop on the Economics of Information Security, Innsbruck, https://weis2018.econinfosec.org/

  35. arXiv:1805.06158  [pdf, other

    cs.CR cs.NI cs.SI

    Investigating the Agility Bias in DNS Graph Mining

    Authors: Jukka Ruohonen, Ville Leppänen

    Abstract: The concept of agile domain name system (DNS) refers to dynamic and rapidly changing mappings between domain names and their Internet protocol (IP) addresses. This empirical paper evaluates the bias from this kind of agility for DNS-based graph theoretical data mining applications. By building on two conventional metrics for observing malicious DNS agility, the agility bias is observed by comparin… ▽ More

    Submitted 16 May, 2018; originally announced May 2018.

    Comments: Proceedings of the 17th IEEE International Conference on Computer and Information Technology (CIT 2017), pp. 253--260, Helsinki, IEEE

  36. An Empirical Survey on the Early Adoption of DNS Certification Authority Authorization

    Authors: Jukka Ruohonen

    Abstract: A new certification authority authorization (CAA) resource record for the domain name system (DNS) was standardized in 2013. Motivated by the later 2017 decision to enforce mandatory CAA checking for most certificate authorities, this paper surveys the early adoption of CAA by using an empirical sample collected from the Alexa's top-million domains. According to the results, (i) the adoption of CA… ▽ More

    Submitted 20 April, 2018; originally announced April 2018.

    Comments: Under review since early November 2017

  37. arXiv:1801.07759  [pdf, other

    cs.CR cs.CY cs.NI

    Whose Hands Are in the Finnish Cookie Jar?

    Authors: Jukka Ruohonen, Ville Leppänen

    Abstract: Web cookies are ubiquitously used to track and profile the behavior of users. Although there is a solid empirical foundation for understanding the use of cookies in the global world wide web, thus far, limited attention has been devoted for country-specific and company-level analysis of cookies. To patch this limitation in the literature, this paper investigates persistent third-party cookies used… ▽ More

    Submitted 23 January, 2018; originally announced January 2018.

    Comments: Proceedings of the European Intelligence and Security Informatics Conference (EISIC 2017)

  38. A Look at the Time Delays in CVSS Vulnerability Scoring

    Authors: Jukka Ruohonen

    Abstract: This empirical paper examines the time delays that occur between the publication of Common Vulnerabilities and Exposures (CVEs) in the National Vulnerability Database (NVD) and the Common Vulnerability Scoring System (CVSS) information attached to published CVEs. According to the empirical results based on regularized regression analysis of over eighty thousand archived vulnerabilities, (i) the CV… ▽ More

    Submitted 3 January, 2018; originally announced January 2018.

    Comments: http://www.sciencedirect.com/science/article/pii/S2210832717302995

    Journal ref: Applied Computing and Informatics (published online in December 2017)

  39. How PHP Releases Are Adopted in the Wild?

    Authors: Jukka Ruohonen, Ville Leppänen

    Abstract: This empirical paper examines the adoption of PHP releases in the the contemporary world wide web. Motivated by continuous software engineering practices and software traceability improvements for release engineering, the empirical analysis is based on big data collected by web crawling. According to the empirical results based on discrete time-homogeneous Markov chain (DTMC) analysis, (i)~adoptio… ▽ More

    Submitted 16 October, 2017; originally announced October 2017.

    Comments: Forthcoming in the Proceedings of the 24th Asia-Pacific Software Engineering Conference http://www.apsec2017.org/

  40. arXiv:1710.05561  [pdf, other

    cs.CR cs.IR cs.SE

    Classifying Web Exploits with Topic Modeling

    Authors: Jukka Ruohonen

    Abstract: This short empirical paper investigates how well topic modeling and database meta-data characteristics can classify web and other proof-of-concept (PoC) exploits for publicly disclosed software vulnerabilities. By using a dataset comprised of over 36 thousand PoC exploits, near a 0.9 accuracy rate is obtained in the empirical experiment. Text mining and topic modeling are a significant boost facto… ▽ More

    Submitted 16 October, 2017; originally announced October 2017.

    Comments: Proceedings of the 2017 28th International Workshop on Database and Expert Systems Applications (DEXA). http://ieeexplore.ieee.org/abstract/document/8049693/

  41. arXiv:1707.06071  [pdf, other

    cs.SI

    Malware distributions and graph structure of the Web

    Authors: Sanja Šćepanović, Igor Mishkovski, Jukka Ruohonen, Frederick Ayala-Gómez, Tuomas Aura, Sami Hyrynsalmi

    Abstract: Knowledge about the graph structure of the Web is important for understanding this complex socio-technical system and for devising proper policies supporting its future development. Knowledge about the differences between clean and malicious parts of the Web is important for understanding potential treats to its users and for devising protection mechanisms. In this study, we conduct data science m… ▽ More

    Submitted 19 July, 2017; originally announced July 2017.