Publications
"Which is the Right Source of Vulnerability Studies? An Empirical Analysis on Mozilla Firefox",
International Workshop on Security Measurement and Metrics (MetriSec)'10, Bolzano-Bozen, Italy, 9/2010.
Expressive modular fine-grained concurrency specification (Extended version),
, no. CW590: Department of Computer Science, K.U.Leuven, July, 2010.
"A quick tour of the VeriFast program verifier",
Programming Languages and Systems (APLAS 2010): Springer-Verlag, pp. 304–311, November, 2010.
"Algorithms for Security-by-Contract on Multi-Application Java Cards",
Journal of Critical Computer-Based Systems, 2011.
"Analyzing evolution of variability in a software product line: From contexts and requirements to features",
Information and Software Technology, vol. 53, no. 7, pp. 707 - 721, 2011.
Abstract
"Annotation inference for separation logic based verifiers",
Formal Techniques for Distributed Systems (FMOODS/FORTE 2011), vol. 6722: Springer, pp. 319–333, 2011.
Reykjavik, Iceland, 6-9 June 2011
"The Belgian electronic identity card: a verification case study",
Proceedings of the International Workshop Automated Verification of Critical Systems (AVOCS'11): Elsevier, 2011.
Newcastle (UK), 12-14 September 2011, to appear
"Challenges in Model-Based Evolution and Merging of Access Control Policies",
Joint 12th International Workshop on Principles on Software Evolution and 7th ERCIM Workshop on Software Evolution, 2011.
Abstract
ISBN: 978-1-4503-0848-9 Pages: 116-120
"Challenges in Model-Based Evolution and Merging of Access Control Policies",
Joint 12th International Workshop on Principles on Software Evolution and 7th ERCIM Workshop on Software Evolution, 2011.
Abstract
ISBN: 978-1-4503-0848-9 Pages: 116-120
"Change Patterns: Co-evolving Requirements and Architecture",
Software and Systems Modeling: Springer, 2011.
to appear
Combining Formal Methods and Testing: A Case Study on FreeRTOS,
, 2011.
Invited talk at the 10th International Conference on Software QA and Testing on Embedded Systems (QA&Test 2011), Bilbao, Spain.
"Computer-Aided Threat Identification",
CEC 2011, New Orleans, IEEE, 2011.
"Dealing with Known Unknowns: Towards a Game-Theoretic Foundation for Software Requirement Evolution",
23rd International Conference on Advanced Information Systems Engineering (CAiSE'11), London, Sringer-Verlag , 2011.
"An Extended Ontology for Security Requirements",
Advanced Information Systems Engineering Workshops, vol. 83: Springer Berlin Heidelberg, pp. 622-636, 2011.
Abstract
10.1007/978-3-642-22056-2_64
"Generating Tests from B Specifications and Dynamic Selection Criteria",
FAC, Formal Aspects of Computing, vol. 23, no. 1, pp. 3–19, 2011.
Revised and extended version of a paper from the ABZ'08 conference
"A Graph Query Language for EMF models",
Theory and Practice of Model Transformations, Fourth International Conference, ICMT 2011, Zurich, Switzerland, June 27-28, 2011. Proceedings, vol. 6707: Springer, pp. 167-182, 2011.
Abstract
"Incremental Evaluation of Model Queries over EMF Models: A Tutorial on EMF-IncQuery",
Modelling Foundations and Applications, vol. 6698: Springer Berlin / Heidelberg, pp. 389-390, 2011.
Abstract
"Incremental Security Verification for Evolving UMLsec models",
Proc. of the 7th European Conference on Modelling Foundations and Applications (ECMFA'11), Birmingham, UK, pp. 52-68, 2011.
"Living Models - Ten Principles for Change-Driven Software Engineering",
Int. J. Software and Informatics, vol. 5, no. 1-2, pp. 267-290, 2011.
"A Load Time Policy Checker for Open Multi-application Smart Cards",
Policy symposium 2011, Pisa, 2011.
"Load Time Security Verification",
ICISS: Springer- Verlag, 2011.
"Managing Changes with Legacy Security Engineering Processes",
ISI: Springer-Verlag, 2011.