Publications
 
"Which is the Right Source of Vulnerability Studies? An Empirical Analysis on Mozilla Firefox",  
International Workshop on Security Measurement and Metrics (MetriSec)'10, Bolzano-Bozen, Italy, 9/2010.
 
Expressive modular fine-grained concurrency specification (Extended version),  
, no. CW590: Department of Computer Science, K.U.Leuven, July, 2010.
 
"A quick tour of the VeriFast program verifier",  
Programming Languages and Systems (APLAS 2010): Springer-Verlag, pp. 304–311, November, 2010.
 
"Algorithms for Security-by-Contract on Multi-Application Java Cards",  
Journal of Critical Computer-Based Systems, 2011.
 
"Analyzing evolution of variability in a software product line: From contexts and requirements to features",  
Information and Software Technology, vol. 53, no. 7, pp. 707 - 721, 2011.
 Abstract
 
"Annotation inference for separation logic based verifiers",  
Formal Techniques for Distributed Systems (FMOODS/FORTE 2011), vol. 6722: Springer, pp. 319–333, 2011.
Reykjavik, Iceland, 6-9 June 2011
 
"The Belgian electronic identity card: a verification case study",  
Proceedings of the International Workshop Automated Verification of Critical Systems (AVOCS'11): Elsevier, 2011.
Newcastle (UK), 12-14 September 2011, to appear
 
"Challenges in Model-Based Evolution and Merging of Access Control Policies",  
Joint 12th International Workshop on Principles on Software Evolution and 7th ERCIM Workshop on Software Evolution, 2011.
 Abstract
ISBN: 978-1-4503-0848-9 Pages: 116-120
 
"Challenges in Model-Based Evolution and Merging of Access Control Policies",  
Joint 12th International Workshop on Principles on Software Evolution and 7th ERCIM Workshop on Software Evolution, 2011.
 Abstract
ISBN: 978-1-4503-0848-9 Pages: 116-120
 
"Change Patterns: Co-evolving Requirements and Architecture",  
Software and Systems Modeling: Springer, 2011.
to appear
 
Combining Formal Methods and Testing: A Case Study on FreeRTOS,  
, 2011.
Invited talk at the 10th International Conference on Software QA and Testing on Embedded Systems (QA&Test 2011), Bilbao, Spain.
 
"Computer-Aided Threat Identification",  
CEC 2011, New Orleans, IEEE, 2011.
 
"Dealing with Known Unknowns: Towards a Game-Theoretic Foundation for Software Requirement Evolution",  
23rd International Conference on Advanced Information Systems Engineering (CAiSE'11), London, Sringer-Verlag , 2011.
 
"An Extended Ontology for Security Requirements",  
Advanced Information Systems Engineering Workshops, vol. 83: Springer Berlin Heidelberg, pp. 622-636, 2011.
 Abstract
10.1007/978-3-642-22056-2_64
 
"Generating Tests from B Specifications and Dynamic Selection Criteria",  
FAC, Formal Aspects of Computing, vol. 23, no. 1, pp. 3–19, 2011.
Revised and extended version of a paper from the ABZ'08 conference
 
"A Graph Query Language for EMF models",  
Theory and Practice of Model Transformations, Fourth International Conference, ICMT 2011, Zurich, Switzerland, June 27-28, 2011. Proceedings, vol. 6707: Springer, pp. 167-182, 2011.
 Abstract
 
"Incremental Evaluation of Model Queries over EMF Models: A Tutorial on EMF-IncQuery",  
Modelling Foundations and Applications, vol. 6698: Springer Berlin / Heidelberg, pp. 389-390, 2011.
 Abstract
 
"Incremental Security Verification for Evolving UMLsec models",  
Proc. of the 7th European Conference on Modelling Foundations and Applications (ECMFA'11),  Birmingham, UK, pp. 52-68, 2011.
 
"Living Models - Ten Principles for Change-Driven Software Engineering",  
Int. J. Software and Informatics, vol. 5, no. 1-2, pp. 267-290, 2011.
 
"A Load Time Policy Checker for Open Multi-application Smart Cards",  
Policy symposium 2011, Pisa, 2011.
 
"Load Time Security Verification",  
ICISS: Springer- Verlag, 2011.
 
"Managing Changes with Legacy Security Engineering Processes",  
ISI: Springer-Verlag, 2011.
          
] 



