figshare
Browse

Akond Rahman

Assistant Professor (Cybersecurity and privacy; Software engineering)

Auburn, AL, USA

Akond Rahman is an assistant professor at Auburn University. His research interests include DevOps and Secure Software Development. He graduated with a PhD from North Carolina State University, an M.Sc. in Computer Science and Engineering from University of Connecticut, and a B.Sc. in Computer Science and Engineering from Bangladesh University of Engineering and Technology. He won the ACM SIGSOFT Doctoral Symposium Award at ICSE in 2018, the ACM SIGSOFT Distinguished Paper Award at ICSE in 2019, the Computer Science Distinguished Dissertation Award, and the College of Engineering Distinguished Dissertation Award from NC State in 2020. He actively collaborates with industry practitioners from GitHub, WindRiver, and others. To know more about his work visit https://akondrahman.github.io/

Publications

  • A systematic mapping study of infrastructure as code research
  • Source code properties of defective infrastructure as code scripts
  • The ‘as code’ activities: development anti-patterns for infrastructure as code
  • An Exploratory Characterization of Bugs in COVID-19 Software Projects
  • Security Bug Report Usage for Software Vulnerability Research: A Systematic Mapping Study
  • Different Kind of Smells: Security Smells in Infrastructure as Code Scripts
  • Exercise Perceptions: Experience Report from a Secure Software Development Course
  • Testing practices for infrastructure as code
  • Security Smells in Ansible and Chef Scripts
  • Log-related Coding Patterns to Conduct Postmortems of Attacks in Supervised Learning-based Projects
  • Detecting and Characterizing Propagation of Security Weaknesses in Puppet-based infrastructure Management
  • Security Misconfigurations in Open Source Kubernetes Manifests: An Empirical Study
  • Come for syntax, stay for speed, understand defects: an empirical study of defects in Julia programs
  • An empirical study of vulnerabilities in robotics
  • Case Study-Based Approach of Quantum Machine Learning in Cybersecurity: Quantum Support Vector Machine for Malware Classification and Protection
  • Software Supply Chain Vulnerabilities Detection in Source Code: Performance Comparison between Traditional and Quantum Machine Learning Algorithms
  • Quantum Machine Learning for Software Supply Chain Attacks: How Far Can We Go?
  • Evolution of Quantum Computing: A Systematic Survey on the Use of Quantum Computing Tools
  • XI Commandments of Kubernetes Security: A Systematization of Knowledge Related to Kubernetes Security Practices
  • Security Smells in Infrastructure as Code Scripts
  • Malware Detection and Prevention using Artificial Intelligence Techniques
  • Practitioner Perceptions of Ansible Test Smells
  • Vulnerability Discovery Strategies Used in Software Projects
  • A Vision to Mitigate Bioinformatics Software Development Challenges
  • Benefits, Challenges, and Research Topics: A Multi-vocal Literature Review of Kubernetes
  • Characterizing Co-located Insecure Coding Patterns in Infrastructure as Code Scripts
  • How Do Students Feel about Automated Security Static Analysis Exercises?
  • Quality Assurance for Infrastructure Orchestrators: Emerging Results from Ansible
  • What questions do developers ask about Julia?
  • Vision for a Secure Elixir Ecosys tem: An Empirical Study of Vulnerabilities in Elixir Programs
  • Can We use Authentic Learning to Educate Students about Secure Infrastructure as Code Development?
  • Challenges with responding to static analysis tool alerts
  • A Novel Machine Learning Based Framework for Bridge Condition Analysis
  • Gang of eight: A defect taxonomy for infrastructure as code scripts
  • Lessons from Research to Practice on Writing Better Quality Puppet Scripts
  • Can we use software bug reports to identify vulnerability discovery strategies?
  • Shifting Left for Machine Learning: An Empirical Study of Security Weaknesses in Supervised Learning-based Projects
  • Towards Automation for MLOps: An Exploratory Study of Bot Usage in Deep Learning Libraries
  • Development of Blockchain-based e-Voting System: Requirements, Design and Security Perspective
  • Investigating Novel Approaches to Defend Software Supply Chain Attacks
  • Blockchain enabled AI marketplace: The price you pay for trust
  • As Code Testing: Characterizing Test Quality in Open Source Ansible Development
  • 'Under-reported' Security Defects in Kubernetes Manifests
  • A preliminary taxonomy of techniques used in software fuzzing
  • A curated dataset of security defects in scientific software projects
  • Practitioner Perception of Vulnerability Discovery Strategies
  • Characterizing Attacker Behavior in a Cybersecurity Penetration Testing Competition
  • Bie Vote: A Biometric Identification Enabled Blockchain-Based Secure and Transparent Voting Framework
  • A bird's eye view of knowledge needs related to penetration testing
  • Shhh: 12 Practices for Secret Management in Infrastructure as Code
  • Bugs in infrastructure as code
  • Where are the gaps? a systematic mapping study of infrastructure as code research
  • Characterizing the influence of continuous integration: Empirical results from 250+ open source and proprietary projects
  • What is the connection between issues, bugs, and enhancements? (Lessons Learned from 800+ Software Projects)
  • We don’t need another hero? The impact of “Heroes” on software development
  • What is the connection between issues, bugs, and enhancements?: Lessons learned from 800+ software projects
  • What questions do programmers ask about configuration as code?
  • We don't need another hero?: The impact of "heroes" on software development
  • Predicting Android Application Security and Privacy Risk with Static Code Metrics
  • Security practices in DevOps
  • Anti-Patterns in Infrastructure as Code
  • Characterizing Defective Configuration Scripts Used for Continuous Deployment
  • Software security in DevOps: Synthesizing practitioners' perceptions and practices
  • Energy-efficient multiple targets tracking using target kinematics in wireless sensor networks
  • The Seven Sins: Security Smells in Infrastructure as Code Scripts
  • Snakes in Paradise?: Insecure python-related coding practices in stack overflow
  • Which Factors Influence Practitioners' Usage of Build Automation Tools
  • Portable and secure multimedia data transfer in mobile phones using Record Management Store (RMS)
  • Service priority based target tracking framework
  • Characteristics of defective infrastructure as code scripts in DevOps
  • Synthesizing Program Execution Time Discrepancies in Julia Used for Scientific Software
  • Synthesizing Continuous Deployment Practices Used in Software Development
  • Characterizing scientific reporting in security literature: An analysis of ACM CCS and IEEE S&P papers
  • Share, but be Aware: Security Smells in Python Gists
  • Comprehension effort and programming activities: Related? or not related?
  • Poster: Defect prediction metrics for infrastructure as code scripts in DevOps
  • Defect Categorization in Compilers: A Multi-vocal Literature Review
  • An empirical study of task infections in Ansible scripts
  • Student Perceptions of Authentic Learning to Learn White-box Testing
  • Transforming online voting: a novel system utilizing blockchain and biometric verification for enhanced security, privacy, and transparency
  • A Plugin for Kotlin based Android Apps to Detect Security Breaches through Dataflow
  • The ‘as Code’ Activities: Development anti-patterns for infrastructure as code
  • Teaching DevOps Security Education with Hands-on Labware: Automated Detection of Security Weakness in Python
  • Using AI Assistants in Software Development: A Qualitative Study on Security Practices and Concerns
  • Characterizing Static Analysis Alerts for Terraform Manifests: An Experience Report
  • Evaluating the Quality of Open Source Ansible Playbooks: An Executability Perspective
  • State Reconciliation Defects in Infrastructure as Code
  • Does Generative AI Generate Smells Related to Container Orchestration?: An Exploratory Study with Kubernetes Manifests

Usage metrics

Co-workers & collaborators

Akond Rahman's public data