Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Joseph W. Ligman is active.

Publication


Featured researches published by Joseph W. Ligman.


mobile data management | 2015

Labyrinth: Visually Configurable Data-Leakage Detection in Mobile Applications

Marco Pistoia; Omer Tripp; Paolina Centonze; Joseph W. Ligman

Mobile devices have revolutionized many aspects of our lives. We use smartphones and tablets as portable computers and, often without realizing it, we run various types of security-sensitive programs on them, such as personal and enterprise email and instant-messaging applications, as well as social, banking, insurance and retail programs. These applications access and transmit over the network numerous pieces of private information, including our geographical location, device ID, contacts, calendar events, passwords, and health records, as well as credit-card, social-security, and bank-account numbers. Guaranteeing that no private information is exposed to unauthorized observers is very challenging given the level of complexity that these applications have reached. Furthermore, using program-analysis tools with out-of-the-box configurations in order to detect confidentiality violations may not yield the desired results because only a few pieces of private data, such as the devices ID and geographical location, are obtained from standard sources. The majority of confidentiality sources (such as credit-card and bank-account numbers) are application-specific and require careful configuration. This paper presents Labyrinth, a run-time privacy enforcement system that automatically detects leakage of private data originating from standard as well as application-specific sources. Labyrinth features several novel contributions: (i) it allows for visually configuring, directly atop the applications User Interface (UI), the fields that constitute custom sources of private data, (ii) it does not require operating-system instrumentation, but relies only an application-level instrumentation and on a proxy that intercepts the communication between the mobile device and the back-end servers, and (iii) it performs an enhanced form of value-similarity analysis to detect data leakage even when sensitive data (such as a password) has been encoded or hashed. Labyrinth supports both Android and iOS. We have evaluated Labyrinth experimentally, and in this paper we report results on production-level applications.


intelligent user interfaces | 2017

UI X-Ray: Interactive Mobile UI Testing Based on Computer Vision

Chun-fu Richard Chen; Marco Pistoia; Conglei Shi; Paolo Girolami; Joseph W. Ligman; Yong Wang

User Interface/eXperience (UI/UX) significantly affects the lifetime of any software program, particularly mobile apps. A bad UX can undermine the success of a mobile app even if that app enables sophisticated capabilities. A good UX, however, needs to be supported of a highly functional and user friendly UI design. In spite of the importance of building mobile apps based on solid UI designs, UI discrepancies---inconsistencies between UI design and implementation---are among the most numerous and expensive defects encountered during testing. This paper presents UI X-Ray, an interactive UI testing system that integrates computer-vision methods to facilitate the correction of UI discrepancies---such as inconsistent positions, sizes and colors of objects and fonts. Using UI X-Ray does not require any programming experience; therefore, UI X-Ray can be used even by non-programmers---particularly designers---which significantly reduces the overhead involved in writing tests. With the feature of interactive interface, UI testers can quickly generate defect reports and revision instructions---which would otherwise be done manually. We verified our UI X-Ray on 4 developed mobile apps of which the entire development history was saved. UI X-Ray achieved a 99.03% true-positive rate, which significantly surpassed the 20.92% true-positive rate obtained via manual analysis. Furthermore, evaluating the results of our automated analysis can be completed quickly (< 1 minute per view on average) compared to hours of manual work required by UI testers. On the other hand, UI X-Ray received the appreciations from skilled designers and UI X-Ray improves their current work flow to generate UI defect reports and revision instructions. The proposed system, UI X-Ray, presented in this paper has recently become part of a commercial product.


Archive | 2012

Automatically generating challenge questions inferred from user history data for user authentication

Paul C. Castro; Joseph W. Ligman; David Lubensky; Marco Pistoia; John Ponzo; Umut Topkara


Archive | 2013

Automatically rendering web or hybrid applications natively

Joseph W. Ligman; Marco Pistoia; John Ponzo; Gegi Thomas


Archive | 2015

Automatic extraction, modeling, and code mapping of application user interface display screens and components

Joseph W. Ligman; Marco Pistoia; John Ponzo; Gegi Thomas


Archive | 2014

Automatically capturing user interactions and evaluating user interfaces in software programs using field testing

Joseph W. Ligman; Marco Pistoia; John Ponzo; Gegi Thomas


Archive | 2013

System, Method, and Apparatus for Automatic Recording and Replaying of Application Executions

Joseph W. Ligman; Marco Pistoia; John Ponzo; Gegi Thomas


Archive | 2013

Method, Apparatus and Computer Program Product Providing Performance and Energy Optimization for Mobile Computing

Joseph W. Ligman; Marco Pistoia; Gegi Thomas; Omer Tripp


Archive | 2012

AUTOMATIC AND TRANSPARENT APPLICATION LOGGING

Joseph W. Ligman; Marco Pistoia; John Ponzo; Umut Topkara


Archive | 2013

System, method and apparatus for transparently enabling software applications with adaptive user interfaces

Joseph W. Ligman; Marco Pistoia; John Ponzo; Gegi Thomas

Researchain Logo
Decentralizing Knowledge