Publications
"After-Life Vulnerabilities: A Study on Firefox Evolution, its Vulnerabilities and Fixes",
Proceeding of the International Symposium on Engineering Secure Software and Systems (ESSoS)'11, Madrid, Spain, 2/2011.
"Formally Based Black Box Monitoring of Security Protocols",
International Symposium on Engineering Secure Software and Systems (ESSOS 2010): Springer-Verlag, 2010.
"Guided State Space Exploration using Back-annotation of Occurrence Vectors",
Proceedings of the Fourth International Workshop on Petri Nets and Graph Transformation, 2010.
"An Idea of an Independent Validation of Vulnerability Discovery Models",
International Symposium on Engineering Secure Software and Systems (ESSoS), Eindhoven, 2012.
"Incremental query evaluation over EMF models",
ACM/IEEE 13th International Conference On Model Driven Engineering Languages and Systems, Oslo, Norway, ACM/IEEE , 10/2010.
"Maintaining invariant traceability through bidirectional transformations",
34th International Conference on Software Engineering, 2012.
"Orchestrating Security and System Engineering for Evolving Systems",
ServiceWave, pp. 134-143, 2011.
"Problem Analysis of Traditional IT-Security Risk Assessment Methods – An Experience Report",
IFIP SEC 2011, 2011.
"A Tool for Managing Evolving Security Requirements",
CAiSE Forum , London, Springer-Verlag, pp. 49-56, 2011.
"Verifiable control flow properties for Java bytecode",
FAST 2011: Springer Berlin / Heidelberg, to appear, 2011.
"Visualization of Traceability Models with Domain-specific Layouting",
Proceedings of the Fourth International Workshop on Graph-Based Tools, 2010.
"Which is the Right Source of Vulnerability Studies? An Empirical Analysis on Mozilla Firefox",
International Workshop on Security Measurement and Metrics (MetriSec)'10, Bolzano-Bozen, Italy, 9/2010.
"Annotation inference for separation logic based verifiers",
Formal Techniques for Distributed Systems (FMOODS/FORTE 2011), vol. 6722: Springer, pp. 319–333, 2011.
Reykjavik, Iceland, 6-9 June 2011
"Architectural Patterns for Model Driven Security in SOA",
Communications and Multimedia Security - CMS 2010, Linz, Austria, 05/2010.
"Are your sites down? Requirements-driven self-tuning for the survivability of Web systems",
Requirements Engineering Conference (RE), 2011 19th IEEE International, pp. 219 -228, 29 2011-sept. 2.
Abstract
"Back-annotation of Simulation Traces with Change-Driven Model Transformations",
Proceedings of the Eighth International Conference on Software Engineering and Formal Methods, Pisa, IEEE Computer Society, pp. 145-155, 09/2010.
Acceptance rate: 22%
"The Belgian electronic identity card: a verification case study",
Proceedings of the International Workshop Automated Verification of Critical Systems (AVOCS'11): Elsevier, 2011.
Newcastle (UK), 12-14 September 2011, to appear
"Can We Support Applications' Evolution in Multi-Application Smart Cards by Security-by-Contract?",
Security and Privacy of Pervasive Systems and Small Devices, Passau, Germany, Springer, Submitted.
"Challenges in Model-Based Evolution and Merging of Access Control Policies",
Joint 12th International Workshop on Principles on Software Evolution and 7th ERCIM Workshop on Software Evolution, 2011.
Abstract
ISBN: 978-1-4503-0848-9 Pages: 116-120
"Challenges in Model-Based Evolution and Merging of Access Control Policies",
Joint 12th International Workshop on Principles on Software Evolution and 7th ERCIM Workshop on Software Evolution, 2011.
Abstract
ISBN: 978-1-4503-0848-9 Pages: 116-120
"Change-driven Model Evolution for Living Models",
3rd Workshop Model-driven Tool and Process Intergration (MDTPI), ECMFA 2010, Paris, France, 06/2010.
"Change-driven Model Transformations",
Proc. of MODELS'09, ACM/IEEE 12th International Conference On Model Driven Engineering Languages and Systems, vol. 5795/2009, pp. 342-356, 2009.
Abstract
"Computer-Aided Threat Identification",
CEC 2011, New Orleans, IEEE, 2011.
"Dealing with Known Unknowns: Towards a Game-Theoretic Foundation for Software Requirement Evolution",
23rd International Conference on Advanced Information Systems Engineering (CAiSE'11), London, Sringer-Verlag , 2011.
"Dynamic Backwards Slicing of Model Transformations",
Software Testing, Verification and Validation (ICST), 2012 IEEE Fifth International Conference on, 04/2012.
Accepted