Security Engineering for Lifelong Evolvable Systems

Publications

Export 149 results:
Sort by: Author Title [ Type  (Asc)] Year
Conference Paper
Breu, R., "Ten Principles for Living Models - A Manifesto of Change-Driven Software Engineering", International Conference on Complex, Intelligent and Software Intensive Systems (CISIS)), 2010.
Bouquet, F., P. - C. Bué, J. Julliand, and P. - A. Masson, "Test Generation Based on Abstraction and Test Purposes to Complement Structural Tests", A-MOST'10, 6th int. Workshop on Advances in Model Based Testing, in conjunction with ICST'10, Paris, France, pp. 54–61, 2010.
Montrieux, L., J. Jürjens, C. B. Haley, Y. Yu, P. - Y. Schobbens, and H. Toussaint, "Tool Support for Code Generation from a UMLsec Property", 25th IEEE/ACM International Conference on Automated Software Engineering (ASE'10), 2010.
Montrieux, L., J. Jürjens, C. B. Haley, Y. Yu, P. - Y. Schobbens, and H. Toussaint, "Tool support for code generation from a UMLsec property", Proceedings of the IEEE/ACM international conference on Automated software engineering, New York, NY, USA, ACM, pp. 357–358, 2010.
Montrieux, L., M. Wermelinger, and Y. Yu, "Tool support for UML-based specification and verification of role-based access control properties", 8th joint meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, 2011. Abstract

The UML profile and example described in this paper can be downloaded from the Related URL given below. Pages: 456-459 ISBN: 978-1-4503-0443-6

Ujhelyi, Z., A. Horváth, and D. Varró, "Towards Dynamic Backward Slicing of Model Transformations", 26th IEEE/ACM International Conference on Automated Software Engineering (ASE 2011), Lawrence, Kansas, IEEE Computer Society, 11/2011.
Yu, Y., A. Bandara, T. T. Tun, and B. Nuseibeh, "Towards learning to detect meaningful changes in software", Proceedings of the International Workshop on Machine Learning Technologies in Software Engineering, New York, NY, USA, ACM, pp. 51–54, November, 2011. Abstract
Fourneret, E., and F. Bouquet, "UML/OCL based impact analysis to test evolvin critical software", ETAI'11, Society for Electronics, Telecommunications, Automatics and Informatics 10-th Int. Conf., Ohrid, Macedonia, 2011.
Fourneret, E., F. Bouquet, M. Ochoa, J. Jürjens, and S. Wenzel, "Vérification et Test pour des systèmes évolutifs", AFADL'12, Congrès Approches Formelles dans l'Assistance au Développement de Logiciels, Grenoble, France, pp. 150–164, 2012.
Jacobs, B., J. Smans, and F. Piessens, "Verification of unloadable modules", 17th International Symposium on Formal Methods (FM 2011), vol. 6664: Springer, pp. 402–416, 2011.

Limerick (Ireland), 20-24 June 2011

Mühlberg, J. T., and L. Freitas, "Verifying FreeRTOS: from requirements to binary code", Proceedings of the International Workshop Automated Verification of Critical Systems (AVOCS'11), vol. CS-TR-1272, 2011.

Short paper

Conference Proceedings
Massacci, F., S. Neuhaus, and V. H. Nguyen, "After-Life Vulnerabilities: A Study on Firefox Evolution, its Vulnerabilities and Fixes", Proceeding of the International Symposium on Engineering Secure Software and Systems (ESSoS)'11, Madrid, Spain, 2/2011.
Pironti, A., and J. Jürjens, "Formally Based Black Box Monitoring of Security Protocols", International Symposium on Engineering Secure Software and Systems (ESSOS 2010): Springer-Verlag, 2010.
Hegedüs, A., and D. Varró, "Guided State Space Exploration using Back-annotation of Occurrence Vectors", Proceedings of the Fourth International Workshop on Petri Nets and Graph Transformation, 2010.
V.H.Nguyen, and F.Massacci, "An Idea of an Independent Validation of Vulnerability Discovery Models", International Symposium on Engineering Secure Software and Systems (ESSoS), Eindhoven, 2012.
Bergmann, G., A. Horvath, I. Ráth, D. Varró, and al., "Incremental query evaluation over EMF models", ACM/IEEE 13th International Conference On Model Driven Engineering Languages and Systems, Oslo, Norway, ACM/IEEE , 10/2010.
Fontaine, A., S. Hym, and I. Simplot-Ryl, "Verifiable control flow properties for Java bytecode", FAST 2011: Springer Berlin / Heidelberg, to appear, 2011.
Hegedüs, A., Z. Ujhelyi, I. Ráth, and A. Horváth, "Visualization of Traceability Models with Domain-specific Layouting", Proceedings of the Fourth International Workshop on Graph-Based Tools, 2010.
Massacci, F., and V. H. Nguyen, "Which is the Right Source of Vulnerability Studies? An Empirical Analysis on Mozilla Firefox", International Workshop on Security Measurement and Metrics (MetriSec)'10, Bolzano-Bozen, Italy, 9/2010.
Journal Article