i-manager's Journal on Software Engineering (JSE)


Volume 13 Issue 3 January - March 2019

Research Paper

Requirement Formalization for Model Checking using Extended Backus Naur Form

E. O. Aliyu* , O. S. Adewale**, A. O. Adetunmbi***, B. A. Ojokoh****
* Lecturer, Department of Computer Science, Adekunle Ajasin University, Akungba Akoko, Nigeria.
** Dean and Professor, Department of Computer Science, Federal University of Technology Akure, Nigeria.
*** Professor, Department of Computer Science, Federal University of Technology Akure, Nigeria.
**** Associate Professor, Department of Computer Science, Federal University of Technology Akure, Nigeria.
Aliyu, E. O., Adewale, O. S., Adetunmbi, A. O., Ojokoh, B. A. (2019). Requirement Formalization for Model Checking using Extended Backus Naur Form, i-manager's Journal on Software Engineering, 13(3), 1-6. https://doi.org/10.26634/jse.13.3.15687

Abstract

Describing the structure of a language using rewriting rules in verifying requirements and design is still a vivid area of research. The authors describe the grammar formalism Extended Backus Naur Form (EBNF) to specify the 'if' single block construct with respect to assignment and relational operators as well as Switch, For loop, Do-while, and While loop statement to ensure program free flow. This aim to ensure correctness in the grammar rule for selective and iterative construct to parse C++ programs. The grammar describes the actions a parser must take to parse a string of tokens correctly.

Research Paper

Development of a Secured E-Voting System With OTP as Second Order Authentication

Habu J. Salami* , O. S. Adebayo**, A. O. Isah***, K. H. Lawal****, John K. Alhassan*****
*Information Technology Services, Federal University of Technology, Minna, Nigeria.
**,***,***** Department of Cyber Security Science, Federal University of Technology, Minna, Nigeria.
**** Department of Computer Science, Federal University of Technology, Minna, Nigeria.
Salami, H. J., Adebayo, O. S., Isah, A. O., Lawal, K. H., Alhassan, J. K. (2019). Development of a Secured E-Voting System With OTP as Second Order Authentication, i-manager's Journal on Software Engineering, 13(3), 7-14. https://doi.org/10.26634/jse.13.3.15686

Abstract

Electronic voting has become the most preferred and generally acceptable voting method in the 21st century. Advanced and developed countries are constantly reviewing their e-voting systems. However, the cyber security problem associated with the e-voting system has been giving concerns to cyber security experts and researchers. The authentication methods employed in existing e-voting system is for a voter to input a unique identification number that has been assigned after accreditation. This is to confirm of the voter's details in the voter registration data base. This paper seeks to develop a secured e-voting system that integrates a second order authentication in the form of One-Time Password to again confirm the voters' details in the registration data base before voting is allowed. Java programming language was employed in coding the OTP algorithm into the existing e-voting system algorithm. The e-voting system is more secure with this work.

Research Paper

An Intelligent Crypto-Locker Ransomware Detection Technique using Support Vector Machine Classification and Grey Wolf Optimization Algorithms

Abdullahi Mohammed Maigida* , Shafi’i Muhammad Abdulhamid**, Morufu Olalere***, Idris Ismaila****
*-**-***-****Lecturer, Department of Cyber Security Science, Federal University of Technology Minna, Nigeria.
Maigida, A. M., Abdulhamid, S. M., Olalere, M., Ismaila, I. (2019). An Intelligent Crypto-Locker Ransomware Detection Technique using Support Vector Machine Classification and Grey Wolf Optimization Algorithms, i-manager's Journal on Software Engineering, 13(3), 15-23. https://doi.org/10.26634/jse.13.3.15685

Abstract

Ransomware is advanced malicious software which comes in different forms, with the intention to attack and take control of basic infrastructures and computer systems. The majority of these threats are meant to extort money from their victims by asking for a ransom in exchange for decryption keys. Most of the techniques deployed to detect this could not completely prevent ransomware attacks because of its obfuscation techniques. In this research work, an intelligent crypto-locker ransomware detection technique using Support Vector Machine (SVM) and Grey Wolf Optimization (GWO) algorithm is proposed to overcome the malware obfuscation technique because of its ability to learn, train and fit dataset based on the observed features. The proposed technique has shown remarkable prospects in detecting cryptolocker ransomware attacks with high true positive and low false positive rate.

Research Paper

Development of Pre-Admission Examination Learning and Practicing Software for Prospective Students of Federal University of Technology, Minna

O. A. Abisoye* , A. Thomas**, B. O. Abisoye***
* Department of Computer Science, SICT Federal University of Technology Minna, Niger State, Nigeria.
** PG Student, Department of Computer Engineering, Federal University of Technology Minna, Niger State, Nigeria.
***Department of Computer Engineering, SEET Federal University of Technology Minna, Niger State, Nigeria.
Abisoye, O. A., Thomas, B. A., Abisoye, B. O. (2019). Development of Pre-Admission Examination Learning and Practicing Software for Prospective Students of Federal University of Technology, Minna, i-manager's Journal on Software Engineering, 13(3), 24-31. https://doi.org/10.26634/jse.13.3.15684

Abstract

The undue anxiety of students towards examination being conducted using Computer Base Testing System (CBTS) has led to the introduction of computer base mock examination; a way of familiarizing students with CBT platform before attempting the main examination. The current system is plagued with applicants traveling from various location to a Computer Base Testing Center to take part in a short-lived mock examination in order to familiarize them with the CBT platform; most of the applicants do not have access to the CBT software which is not available online; it has been argued that a thirty-minute brief mock test is not adequate enough to familiarize the use of CBT for some of the candidates. This paper is proposing the development of Online Pre-admission Examination Learning and Practicing Software (ELPS) for the prospective students of Federal University of Technology, Minna. The proposed system will be implemented using Microsoft Visual Studio. Net, Integrated Development Environment. The proposed web based application will be highly user-friend and self-intuitive to help applicants in learning and practicing the computer based test questions from anywhere, any time.

Review Paper

A Review on Software Testing and its Methodology

Jannat Ahmad* , Abu ul Hassan**, Tahreem Naqvi***, Tayyaba Mubeen****
*,***-**** BS, Department of Computer Science, Superior College, Lahore, Pakistan.
** Faculty Member, Department of Computer Science, Superior College, Lahore, Pakistan.
Ahmad, J., Hassan, A. U., Naqvi, T., Mubeen, T. (2019). A Review on Software Testing and its Methodology, i-manager's Journal on Software Engineering, 13(3), 32-38. https://doi.org/10.26634/jse.13.3.15515

Abstract

Software Testing is very important and time intense portion of the software development life cycle as its persistence is to perceive failures in software, so that flaws may be improved and adjusted at the initial stage. Software Testing is a practice for approving that the product/software/program, that has been developed by programmers/coder, is an excellent or quality creation and to guarantee that the synthetic product is functioning and agreeing to the requirement, satisfying the consumer/client needs. There are many approaches to software testing. Testing is a procedure of training a program with precise intent of discovering errors before preceding its delivery to end user. Software Testing is the method of performing a program to locate an error. This paper defines generally used software testing techniques for identifying error and they are white box testing, black box testing and grey box testing. Software testing, in cooperation in terms of quality excellence and consistency, is very essential. In this article, authors describe the testing software and its objectives and testing altered software, debugging software. After a full explanation of software testing, test methods include Black Box and White Box and Gray Box delivered and the variances and advantages and disadvantages of the three methods calculated. And well methods have acknowledged three methods of software testing.

Case Study

A Case Study: Risk Rating Methodology for E-Governance Application Security Risks

B. S. Kumar* , V. Sridhar**, K. R. Sudhindra***
* Scientist `F', Electronics Test and Development Centre (ETDC), Bangalore, India.
** Department of Electronics and Communication Engineering, Nitte Meenakshi Institute of Technology, Bangalore, India.
*** Department of Electronics and Communication Engineering, B M S College of Engineering, Bangalore, Karnadaka, India.
Kumar, B. S., Sridhar, Sudhindra, K. R. (2019). A Case Study: Risk Rating Methodology for E-Governance Application Security Risks, i-manager's Journal on Software Engineering, 13(3), 39-44. https://doi.org/10.26634/jse.13.3.15546

Abstract

Over the last few years, e governance in India has made rapid progress and adopted global best practices in terms of citizen-centricity, reach, connectivity, efficiency, transparency, accountability and availability. Multiple modes and ease of access, seamless connectivity and availability, user friendliness and efficiency of e-governance services have opened up avenues making e-governance services most prone to serious security risks. International trends and domestic experiences show that the e-governance services are constant targets of organized crime by hackers and prominent government sites are being probed daily. The security threat landscape for e-governance applications constantly changes and new type of vulnerabilities keeps manifesting. In today's race to build cutting-edge e-governance business solutions, web applications are being developed and deployed with lesser attention to critical and widespread security threats. The government can no longer afford to tolerate security issues with high risk values, which could hinder delivery of services and impact the confidentiality, integrity and availability of information. To mitigate with appropriate countermeasures and security controls, it is required to evaluate and estimate risks associated with e-governance applications security issues that can be exploited. In this context, this paper outlines the risk rating methodology from e-governance perspective to estimate risk associated with security issues at application layer that are critical and widespread.