Security Engineering for Lifelong Evolvable Systems

Publications

Export 149 results:
Sort by: Author Title [ Type  (Desc)] Year
Conference Proceedings
Massacci, F., S. Neuhaus, and V. H. Nguyen, "After-Life Vulnerabilities: A Study on Firefox Evolution, its Vulnerabilities and Fixes", Proceeding of the International Symposium on Engineering Secure Software and Systems (ESSoS)'11, Madrid, Spain, 2/2011.
Pironti, A., and J. Jürjens, "Formally Based Black Box Monitoring of Security Protocols", International Symposium on Engineering Secure Software and Systems (ESSOS 2010): Springer-Verlag, 2010.
Hegedüs, A., and D. Varró, "Guided State Space Exploration using Back-annotation of Occurrence Vectors", Proceedings of the Fourth International Workshop on Petri Nets and Graph Transformation, 2010.
V.H.Nguyen, and F.Massacci, "An Idea of an Independent Validation of Vulnerability Discovery Models", International Symposium on Engineering Secure Software and Systems (ESSoS), Eindhoven, 2012.
Bergmann, G., A. Horvath, I. Ráth, D. Varró, and al., "Incremental query evaluation over EMF models", ACM/IEEE 13th International Conference On Model Driven Engineering Languages and Systems, Oslo, Norway, ACM/IEEE , 10/2010.
Fontaine, A., S. Hym, and I. Simplot-Ryl, "Verifiable control flow properties for Java bytecode", FAST 2011: Springer Berlin / Heidelberg, to appear, 2011.
Hegedüs, A., Z. Ujhelyi, I. Ráth, and A. Horváth, "Visualization of Traceability Models with Domain-specific Layouting", Proceedings of the Fourth International Workshop on Graph-Based Tools, 2010.
Massacci, F., and V. H. Nguyen, "Which is the Right Source of Vulnerability Studies? An Empirical Analysis on Mozilla Firefox", International Workshop on Security Measurement and Metrics (MetriSec)'10, Bolzano-Bozen, Italy, 9/2010.
Conference Paper
Vogels, F., B. Jacobs, F. Piessens, and J. Smans, "Annotation inference for separation logic based verifiers", Formal Techniques for Distributed Systems (FMOODS/FORTE 2011), vol. 6722: Springer, pp. 319–333, 2011.

Reykjavik, Iceland, 6-9 June 2011

Gander, M., M. Hafner, H. Yu, and M. Memon, "Architectural Patterns for Model Driven Security in SOA", Communications and Multimedia Security - CMS 2010, Linz, Austria, 05/2010.
Chen, B., X. Peng, Y. Yu, and W. Zhao, "Are your sites down? Requirements-driven self-tuning for the survivability of Web systems", Requirements Engineering Conference (RE), 2011 19th IEEE International, pp. 219 -228, 29 2011-sept. 2. Abstract
Hegedüs, A., G. Bergmann, I. Ráth, and D. Varró, "Back-annotation of Simulation Traces with Change-Driven Model Transformations", Proceedings of the Eighth International Conference on Software Engineering and Formal Methods, Pisa, IEEE Computer Society, pp. 145-155, 09/2010.

Acceptance rate: 22%

Philippaerts, P., F. Vogels, J. Smans, B. Jacobs, and F. Piessens, "The Belgian electronic identity card: a verification case study", Proceedings of the International Workshop Automated Verification of Critical Systems (AVOCS'11): Elsevier, 2011.

Newcastle (UK), 12-14 September 2011, to appear

Dragoni, N., O. Gadyatskaya, and F. Massacci, "Can We Support Applications' Evolution in Multi-Application Smart Cards by Security-by-Contract?", Security and Privacy of Pervasive Systems and Small Devices, Passau, Germany, Springer, Submitted.
Montrieux, L., M. Wermelinger, and Y. Yu, "Challenges in Model-Based Evolution and Merging of Access Control Policies", Joint 12th International Workshop on Principles on Software Evolution and 7th ERCIM Workshop on Software Evolution, 2011. Abstract

ISBN: 978-1-4503-0848-9 Pages: 116-120

Montrieux, L., M. Wermelinger, and Y. Yu, "Challenges in Model-Based Evolution and Merging of Access Control Policies", Joint 12th International Workshop on Principles on Software Evolution and 7th ERCIM Workshop on Software Evolution, 2011. Abstract

ISBN: 978-1-4503-0848-9 Pages: 116-120

Trojer, T., M. Breu, and S. Löw, "Change-driven Model Evolution for Living Models", 3rd Workshop Model-driven Tool and Process Intergration (MDTPI), ECMFA 2010, Paris, France, 06/2010.
Ráth, I., G. Varró, and D. Varró, "Change-driven Model Transformations", Proc. of MODELS'09, ACM/IEEE 12th International Conference On Model Driven Engineering Languages and Systems, vol. 5795/2009, pp. 342-356, 2009. Abstract
L.M.S.Tran, and F.Massacci, "Dealing with Known Unknowns: Towards a Game-Theoretic Foundation for Software Requirement Evolution", 23rd International Conference on Advanced Information Systems Engineering (CAiSE'11), London, Sringer-Verlag , 2011.
Ujhelyi, Z., A. Horváth, and D. Varró, "Dynamic Backwards Slicing of Model Transformations", Software Testing, Verification and Validation (ICST), 2012 IEEE Fifth International Conference on, 04/2012.

Accepted