Publications
"Solving the TTC 2011 Reengineering Case with VIATRA2",
TTC 2011: Fifth Transformation Tool Contest, Zürich, Switzerland, June 29-30 2011, Post-Proceedings, vol. 74, Zürich, Switzerland, Open Publishing Association, pp. 136-148, 11/2011.
Abstract
"Towards Dynamic Backward Slicing of Model Transformations",
26th IEEE/ACM International Conference on Automated Software Engineering (ASE 2011), Lawrence, Kansas, IEEE Computer Society, 11/2011.
"After-Life Vulnerabilities: A Study on Firefox Evolution, its Vulnerabilities and Fixes",
Proceeding of the International Symposium on Engineering Secure Software and Systems (ESSoS)'11, Madrid, Spain, 2/2011.
"Change-driven model transformations. Change (in) the rule to rule the change.",
Software and Systems Modeling, issue Online first.: Springer Berlin / Heidelberg, pp. 1-31, 2011.
"A Tool for Managing Evolving Security Requirements",
CAiSE Forum: CEUR-WS.org, pp. 49-56, 2011.
"Are your sites down? Requirements-driven self-tuning for the survivability of Web systems",
Requirements Engineering Conference (RE), 2011 19th IEEE International, pp. 219 -228, 29 2011-sept. 2.
Abstract
"OpenArgue: supporting argumentation to evolve secure software systems",
2011 IEEE 19th International Requirements Engineering Conference, Trento, Italy, IEEE, pp. 351–352, August 2011.
Abstract
ISBN: 978-1-4577-0924-1
"Risk and argument: A risk-based argumentation method for practical security",
19th IEEE International Requirements Engineering Conference, Trento, Italy, IEEE, pp. 239-248, August 29 2011.
Abstract
"Expressive modular fine-grained concurrency specification",
Principles of Programming Languages (POPL 2011), January, 2011.
"Assessing architectural evolution: a case study",
Empirical Software Engineering, vol. 16, no. 5, pp. 623–666, June, 2011.
Abstract
The final version is available at the DOI given above. The zip file is the web companion mentioned in the paper.
"PrimAndroid: privacy policy modelling and analysis for Android applications",
IEEE International Symposium on Policies for Distributed Systems and Networks, June, 2011.
Abstract
"Towards learning to detect meaningful changes in software",
Proceedings of the International Workshop on Machine Learning Technologies in Software Engineering, New York, NY, USA, ACM, pp. 51–54, November, 2011.
Abstract
"Specifying and detecting meaningful changes in programs",
26th IEEE/ACM International Conference on Automated Software Engineering (ASE 2011), IEEE, Lawrence, KS, USA, pp. 273-282, November 6-10, 2011.
Abstract
"Verifiable control flow properties for Java bytecode",
FAST 2011: Springer Berlin / Heidelberg, to appear, 2011.
"An Idea of an Independent Validation of Vulnerability Discovery Models",
International Symposium on Engineering Secure Software and Systems (ESSoS), Eindhoven, 2012.
"Maintaining invariant traceability through bidirectional transformations",
34th International Conference on Software Engineering, 2012.
"A Sound Decision Procedure for the Compositionality of Secrecy",
4th International Symposium on Engineering Secure Software and Systems (ESSOS 2012): Springer, 2012.
"Sound Formal Verification of Linux's USB BP Keyboard Driver",
The 4th NASA Formal Methods Symposium (NFM 2012), 2012.
to appear
"State-based Evolution Management of Risk-based System Tests for Service-centric Systems.",
Emerging Technologies for the Evolution and Maintenance of Software Models.: IGI Global, pp. 298-318., 2012.
"Vérification et Test pour des systèmes évolutifs",
AFADL'12, Congrès Approches Formelles dans l'Assistance au Développement de Logiciels, Grenoble, France, pp. 150–164, 2012.
"Dynamic Backwards Slicing of Model Transformations",
Software Testing, Verification and Validation (ICST), 2012 IEEE Fifth International Conference on, 04/2012.
Accepted
"Can We Support Applications' Evolution in Multi-Application Smart Cards by Security-by-Contract?",
Security and Privacy of Pervasive Systems and Small Devices, Passau, Germany, Springer, Submitted.
"Change Patterns: Co-evolving Requirements and Architecture",
Software and Systems Modeling: Springer, Submitted.
"Enhancing Argumentation with Risk Assessment for Achieving Good-Enough Security",
Requirements Engineering Journal , Submitted.