default search action
Mohammad Ghafari
- > Home > Persons > Mohammad Ghafari
Publications
- 2022
- [c58]Arash Ale Ebrahim, Mohammadreza Hazhirpasand, Oscar Nierstrasz, Mohammad Ghafari:
FuzzingDriver: the Missing Dictionary to Increase Code Coverage in Fuzzers. SANER 2022: 268-272 - [i29]Arash Ale Ebrahim, Mohammadreza Hazhirpasand, Oscar Nierstrasz, Mohammad Ghafari:
FuzzingDriver: the Missing Dictionary to Increase Code Coverage in Fuzzers. CoRR abs/2201.04853 (2022) - 2021
- [j7]Pooja Rani, Sebastiano Panichella, Manuel Leuenberger, Mohammad Ghafari, Oscar Nierstrasz:
What do class comments tell us? An investigation of comment evolution and practices in Pharo Smalltalk. Empir. Softw. Eng. 26(5): 112 (2021) - [c57]Pascal Gadient, Marc-Andrea Tarnutzer, Oscar Nierstrasz, Mohammad Ghafari:
Security Smells Pervade Mobile App Servers. ESEM 2021: 19:1-19:10 - [c55]Mohammadreza Hazhirpasand, Oscar Nierstrasz, Mohammadhossein Shabani, Mohammad Ghafari:
Hurdles for Developers in Cryptography. ICSME 2021: 659-663 - [c52]Mohammadreza Hazhirpasand, Oscar Nierstrasz, Mohammad Ghafari:
Dazed and Confused: What's Wrong with Crypto Libraries? PST 2021: 1-6 - [c50]Pascal Gadient, Oscar Nierstrasz, Mohammad Ghafari:
Security Header Fields in HTTP Clients. QRS 2021: 93-101 - [c48]Pascal Gadient, Pascal Gerig, Oscar Nierstrasz, Mohammad Ghafari:
Phish What You Wish. QRS 2021: 1048-1059 - [c47]Pooja Rani, Mathias Birrer, Sebastiano Panichella, Mohammad Ghafari, Oscar Nierstrasz:
What Do Developers Discuss about Code Comments? SCAM 2021: 153-164 - [i26]Mohammadreza Hazhirpasand, Oscar Nierstrasz, Mohammadhossein Shabani, Mohammad Ghafari:
Hurdles for Developers in Cryptography. CoRR abs/2108.07141 (2021) - [i25]Pascal Gadient, Marc-Andrea Tarnutzer, Oscar Nierstrasz, Mohammad Ghafari:
Security Smells Pervade Mobile App Servers. CoRR abs/2108.07188 (2021) - [i23]Pooja Rani, Mathias Birrer, Sebastiano Panichella, Mohammad Ghafari, Oscar Nierstrasz:
What Do Developers Discuss about Code Comments? CoRR abs/2108.07648 (2021) - [i22]Mohammadreza Hazhirpasand, Oscar Nierstrasz, Mohammad Ghafari:
Worrisome Patterns in Developers: A Survey in Cryptography. CoRR abs/2109.14363 (2021) - [i21]Mohammadreza Hazhirpasand, Oscar Nierstrasz, Mohammad Ghafari:
Crypto Experts Advise What They Adopt. CoRR abs/2109.15093 (2021) - [i20]Mohammadreza Hazhirpasand, Oscar Nierstrasz, Mohammad Ghafari:
Dazed and Confused: What's Wrong with Crypto Libraries? CoRR abs/2111.01406 (2021) - [i18]Pascal Gadient, Pascal Gerig, Oscar Nierstrasz, Mohammad Ghafari:
Phish What You Wish. CoRR abs/2111.03596 (2021) - [i17]Pascal Gadient, Oscar Nierstrasz, Mohammad Ghafari:
Security Header Fields in HTTP Clients. CoRR abs/2111.03601 (2021) - 2020
- [c46]Nitish Patkar, Mohammad Ghafari, Oscar Nierstrasz, Sofija Hotomski:
Caveats in Eliciting Mobile App Requirements. EASE 2020: 180-189 - [c45]Mohammadreza Hazhirpasand, Mohammad Ghafari, Oscar Nierstrasz:
Tricking Johnny into Granting Web Permissions. EASE 2020: 276-281 - [c43]Mohammadreza Hazhirpasand, Mohammad Ghafari, Oscar Nierstrasz:
Java Cryptography Uses in the Wild. ESEM 2020: 40:1-40:6 - [c42]Pascal Gadient, Mohammad Ghafari, Marc-Andrea Tarnutzer, Oscar Nierstrasz:
Web APIs in Android through the Lens of Security. SANER 2020: 13-22 - [c41]Mohammadreza Hazhirpasand, Mohammad Ghafari, Oscar Nierstrasz:
CryptoExplorer: An Interactive Web Platform Supporting Secure Use of Cryptography APIs. SANER 2020: 632-636 - [i13]Pascal Gadient, Mohammad Ghafari, Oscar Nierstrasz:
Web APIs in Android through the Lens of Security. CoRR abs/2001.00195 (2020) - [i12]Mohammadreza Hazhirpasand, Mohammad Ghafari, Oscar Nierstrasz:
CryptoExplorer: An Interactive Web Platform Supporting Secure Use of Cryptography APIs. CoRR abs/2001.00773 (2020) - [i11]Nitish Patkar, Mohammad Ghafari, Oscar Nierstrasz, Sofija Hotomski:
Caveats in Eliciting Mobile App Requirements. CoRR abs/2002.08458 (2020) - [i10]Mohammadreza Hazhirpasand, Mohammad Ghafari, Oscar Nierstrasz:
Tricking Johnny into Granting Web Permissions. CoRR abs/2002.08463 (2020) - [i9]Pooja Rani, Sebastiano Panichella, Manuel Leuenberger, Mohammad Ghafari, Oscar Nierstrasz:
What do class comments tell us? An investigation of comment evolution and practices in Pharo. CoRR abs/2005.11583 (2020) - [i8]Mohammad Ghafari, Pascal Gadient, Oscar Nierstrasz:
Security Smells in Android. CoRR abs/2006.01181 (2020) - [i6]Mohammadreza Hazhirpasand, Mohammad Ghafari, Oscar Nierstrasz:
Java Cryptography Uses in the Wild. CoRR abs/2009.01101 (2020) - 2019
- [j6]Pascal Gadient, Mohammad Ghafari, Patrick Frischknecht, Oscar Nierstrasz:
Security code smells in Android ICC. Empir. Softw. Eng. 24(5): 3046-3076 (2019) - [c40]Mohammad Ghafari, Markus Eggiman, Oscar Nierstrasz:
Testability First! ESEM 2019: 1-6 - [c39]Mohammadreza Hazhirpasand, Mohammad Ghafari, Stefan Krüger, Eric Bodden, Oscar Nierstrasz:
The Impact of Developer Experience in Using Java Cryptography. ESEM 2019: 1-6 - [c38]Nitish Patkar, Pascal Gadient, Mohammad Ghafari, Oscar Nierstrasz:
Towards a Catalogue of Mobile Elicitation Techniques - Research Preview. REFSQ 2019: 281-288 - [i5]Mohammad Ghafari, Markus Eggiman, Oscar Nierstrasz:
Testability First! CoRR abs/1908.01476 (2019) - [i4]Mohammadreza Hazhirpasand, Mohammad Ghafari, Stefan Krüger, Eric Bodden, Oscar Nierstrasz:
The Impact of Developer Experience in Using Java Cryptography. CoRR abs/1908.01489 (2019) - 2018
- [j5]Leonel Merino, Mohammad Ghafari, Craig Anslow, Oscar Nierstrasz:
A systematic literature review of software visualization evaluation. J. Syst. Softw. 144: 165-180 (2018) - [j4]Jan Kurs, Jan Vraný, Mohammad Ghafari, Mircea Lungu, Oscar Nierstrasz:
Efficient parsing with parser combinators. Sci. Comput. Program. 161: 57-88 (2018) - [j3]Nevena Milojkovic, Clément Béra, Mohammad Ghafari, Oscar Nierstrasz:
Mining inline cache data to order inferred types in dynamic languages. Sci. Comput. Program. 161: 105-121 (2018) - [j2]Leonel Merino, Mohammad Ghafari, Oscar Nierstrasz:
Towards actionable visualization for software developers. J. Softw. Evol. Process. 30(2) (2018) - [c36]Claudio Corrodi, Timo Spring, Mohammad Ghafari, Oscar Nierstrasz:
Idea: Benchmarking Android Data Leak Detection Tools. ESSoS 2018: 116-123 - [c35]Yuriy Tymchuk, Mohammad Ghafari, Oscar Nierstrasz:
JIT feedback: what experienced developers like about static analysis. ICPC 2018: 64-73 - [i3]Haidar Osman, Mohammad Ghafari, Oscar Nierstrasz:
The Impact of Feature Selection on Predicting the Number of Bugs. CoRR abs/1807.04486 (2018) - [i1]Pascal Gadient, Mohammad Ghafari, Patrick Frischknecht, Oscar Nierstrasz:
Security Code Smells in Android ICC. CoRR abs/1811.12713 (2018) - 2017
- [c33]Leonel Merino, Mohammad Ghafari, Craig Anslow, Oscar Nierstrasz:
CityVR: Gameful Software Visualization. ICSME 2017: 633-637 - [c32]Manuel Leuenberger, Haidar Osman, Mohammad Ghafari, Oscar Nierstrasz:
KOWALSKI: Collecting API Clients in Easy Mode. ICSME 2017: 653-657 - [c31]Nevena Milojkovic, Mohammad Ghafari, Oscar Nierstrasz:
Exploiting type hints in method argument names to improve lightweight type inference. ICPC 2017: 77-87 - [c30]Nevena Milojkovic, Mohammad Ghafari, Oscar Nierstrasz:
It's duck (typing) season! ICPC 2017: 312-315 - [c29]Yuriy Tymchuk, Mohammad Ghafari, Oscar Nierstrasz:
Renraku: the One Static Analysis Model to Rule Them All. IWST 2017: 13:1-13:10 - [c28]Haidar Osman, Andrei Chis, Claudio Corrodi, Mohammad Ghafari, Oscar Nierstrasz:
Exception evolution in long-lived Java systems. MSR 2017: 302-311 - [c27]Haidar Osman, Mohammad Ghafari, Oscar Nierstrasz, Mircea Lungu:
An Extensive Analysis of Efficient Bug Prediction Configurations. PROMISE 2017: 107-116 - [c26]Manuel Leuenberger, Haidar Osman, Mohammad Ghafari, Oscar Nierstrasz:
Harvesting the Wisdom of the Crowd to Infer Method Nullness in Java. SCAM 2017: 71-80 - [c25]Mohammad Ghafari, Pascal Gadient, Oscar Nierstrasz:
Security Smells in Android. SCAM 2017: 121-130 - [c24]Leonel Merino, Johannes Fuchs, Michael Blumenschein, Craig Anslow, Mohammad Ghafari, Oscar Nierstrasz, Michael Behrisch, Daniel A. Keim:
On the Impact of the Medium in the Effectiveness of 3D Software Visualizations. VISSOFT 2017: 11-21 - [c23]Haidar Osman, Mohammad Ghafari, Oscar Nierstrasz:
Automatic feature selection by regularization to improve bug prediction accuracy. MaLTeSQuE@SANER 2017: 27-32 - [c22]Haidar Osman, Mohammad Ghafari, Oscar Nierstrasz:
Hyperparameter optimization to improve bug prediction accuracy. MaLTeSQuE@SANER 2017: 33-38 - [c21]Haidar Osman, Andrei Chis, Jakob Schaerer, Mohammad Ghafari, Oscar Nierstrasz:
On the evolution of exception usage in Java projects. SANER 2017: 422-426 - 2016
- [c19]Jan Kurs, Jan Vraný, Mohammad Ghafari, Mircea Lungu, Oscar Nierstrasz:
Optimizing Parser Combinators. IWST 2016: 1 - [c18]Leonel Merino, Dominik Seliner, Mohammad Ghafari, Oscar Nierstrasz:
CommunityExplorer: A Framework for Visualizing Collaboration Networks. IWST 2016: 2 - [c17]Yuriy Tymchuk, Mohammad Ghafari, Oscar Nierstrasz:
When QualityAssistant Meets Pharo: Enforced Code Critiques Motivate More Valuable Rules. IWST 2016: 5 - [c16]Nevena Milojkovic, Clément Béra, Mohammad Ghafari, Oscar Nierstrasz:
Inferring Types by Mining Class Usage Frequency from Inline Caches. IWST 2016: 6 - [c15]Boris Spasojevic, Mohammad Ghafari, Oscar Nierstrasz:
The Object Repository: Pulling Objects out of the Ecosystem. IWST 2016: 7 - [c13]Leonel Merino, Mohammad Ghafari, Oscar Nierstrasz:
Towards Actionable Visualisation in Software Development. VISSOFT 2016: 61-70 - [c12]Yuriy Tymchuk, Leonel Merino, Mohammad Ghafari, Oscar Nierstrasz:
Walls, Pillars and Beams: A 3D Decomposition of Quality Anomalies. VISSOFT 2016: 126-135 - [c11]Leonel Merino, Mohammad Ghafari, Oscar Nierstrasz, Alexandre Bergel, Juraj Kubelka:
MetaVis: Exploring Actionable Visualization. VISSOFT 2016: 151-155
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-23 00:30 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint