Clone-and-own is a common reuse practice that is widely adopted for evolving a family of software systems. However, this practice loses its effectiveness if not supported with valuable indicators that guide the derivation of new products. In this paper, we propose an approach to support the derivation of new product variants based on clone-and-own, by providing the possible scenarios in terms of operations to perform to accomplish the derivation. We generate a constraints system prior to a product derivation, to facilitate the software engineer selection of the suitable scenario and operations based on his preferences. In addition, we propose a cost estimation for each operation and respectively for each scenario, thus, a software engineer can rely on it as an additional parameter to achieve the derivation. The proposed scenarios and cost estimation are based on indicators retrieved after an automated identification of the mappings between the features implemented by the family of software products and the assets in which they are implemented. We preliminarily validate our approach on a case study where results show that the provided support can considerably reduce the amount of time and efforts that can be required to achieve a product derivation. Index Terms-Clone-and-own, product derivation, software reuse.
The rapid adoption of Android devices comes with the growing prevalence of mobile malware, which leads to serious threats to mobile phone security and attacks private information on mobile devices. In this paper, we designed and implemented a model for malware detection on Android devices to protect private and financial information, for the mobile applications of the ATISCOM project. This model is based on client/server architecture, to reduce the heavy computations on a mobile device by sending data from the mobile device to the server for remote processing (i.e., offloading) of the predictions. We then gradually optimized our proposed model for better classification of the newly installed applications on Android devices. We at first adopted Naive Bayes to build the model with 92.4486% accuracy, then the classification method that gave the best accuracy of 93.85% for stochastic gradient descent (SGD) with binary class (i.e., malware and benign), and finally the regression method with numerical values ranging from −100 to 100 to manage the uncertainty predictions. Therefore, our proposed model with random forest regression gives a good accuracy in terms of performance, with a good correlation coefficient, minimum computation time and the smallest number of errors for malware detection.
Clone-and-own is a simple and intuitive practice adopted to construct new product variants based on existing ones. However, when the developed family of products becomes rich, maintaining shared assets and managing variability between the clones become tedious tasks. Therefore, migrating the family of products into a software product line becomes essential. Despite that, software engineers remain interested in constructing new product variants that are not provided by the software product line. In this short paper, we briefly present our approach to guide software engineers in deriving new products from a software product line based on clone-and-own. This approach consists of proposing the possible configuration scenarios by means of operations to perform at asset level, in order to derive a new product variant.
Android has become the leading operating system for mobile devices, and the most targeted one by malware. Therefore, many analysis methods have been proposed for detecting Android malware. However, few of them use proper datasets for evaluation. In this paper, we propose BrainShield, a hybrid malware detection model trained on the Omnidroid dataset to reduce attacks on Android devices. The latter is the most diversified dataset in terms of the number of different features, and contains the largest number of samples, 22,000 samples, for model evaluation in the Android malware detection field. BrainShield’s implementation is based on a client/server architecture and consists of three fully connected neural networks: (1) the first is used for static analysis and reaches an accuracy of 92.9% trained on 840 static features; (2) the second is a dynamic neural network that reaches an accuracy of 81.1% trained on 3722 dynamic features; and (3) the third neural network proposed is hybrid, reaching an accuracy of 91.1% trained on 7081 static and dynamic features. Simulation results show that BrainShield is able to improve the accuracy and the precision of well-known malware detection methods.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.