Publications
"Which is the Right Source of Vulnerability Studies? An Empirical Analysis on Mozilla Firefox",
International Workshop on Security Measurement and Metrics (MetriSec)'10, Bolzano-Bozen, Italy, 9/2010.
"Visualization of Traceability Models with Domain-specific Layouting",
Proceedings of the Fourth International Workshop on Graph-Based Tools, 2010.
"Visualization of Traceability Models with Domain-specific Layouting",
Electronic Communications of the EASST, Proceedings of the Fourth International Workshop on Graph-Based Tools, vol. 32, 04/2011.
Abstract
"Verifying FreeRTOS: from requirements to binary code",
Proceedings of the International Workshop Automated Verification of Critical Systems (AVOCS'11), vol. CS-TR-1272, 2011.
Short paper
"Verification of unloadable modules",
17th International Symposium on Formal Methods (FM 2011), vol. 6664: Springer, pp. 402–416, 2011.
Limerick (Ireland), 20-24 June 2011
"Vérification et Test pour des systèmes évolutifs",
AFADL'12, Congrès Approches Formelles dans l'Assistance au Développement de Logiciels, Grenoble, France, pp. 150–164, 2012.
"Verifiable control flow properties for Java bytecode",
FAST 2011: Springer Berlin / Heidelberg, to appear, 2011.
"Using CORAS to Support Change Management",
Model-Driven Risk Analysis: The CORAS Approach: Springer, 2011.
UMLsec4UML2 - Adopting UMLsec to Support UML2,
, 02/2011.
"UML/OCL based impact analysis to test evolvin critical software",
ETAI'11, Society for Electronics, Telecommunications, Automatics and Informatics 10-th Int. Conf., Ohrid, Macedonia, 2011.
"Towards learning to detect meaningful changes in software",
Proceedings of the International Workshop on Machine Learning Technologies in Software Engineering, New York, NY, USA, ACM, pp. 51–54, November, 2011.
Abstract
"Towards Guided Trajectory Exploration of Graph Transformation Systems",
Electronic Communications of the EASST, Petri Nets and Graph Transformations 2010, vol. 40, 08/2011.
Abstract
"Towards Dynamic Backward Slicing of Model Transformations",
26th IEEE/ACM International Conference on Automated Software Engineering (ASE 2011), Lawrence, Kansas, IEEE Computer Society, 11/2011.
"Tool support for UML-based specification and verification of role-based access control properties",
8th joint meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, 2011.
Abstract
The UML profile and example described in this paper can be downloaded from the Related URL given below. Pages: 456-459 ISBN: 978-1-4503-0443-6
"Tool Support for Code Generation from a UMLsec Property",
25th IEEE/ACM International Conference on Automated Software Engineering (ASE'10), 2010.
"Tool support for code generation from a UMLsec property",
Proceedings of the IEEE/ACM international conference on Automated software engineering, New York, NY, USA, ACM, pp. 357–358, 2010.
"A Tool for Managing Evolving Security Requirements",
CAiSE Forum: CEUR-WS.org, pp. 49-56, 2011.
"A Tool for Managing Evolving Security Requirements",
CAiSE Forum , London, Springer-Verlag, pp. 49-56, 2011.
"Test Generation using Symbolic Animation of Models",
Model-Based Testing for Embedded Systems: CRC Press, pp. ***–***, 2010.
Accepted manuscript. To appear
"Test Generation Based on Abstraction and Test Purposes to Complement Structural Tests",
A-MOST'10, 6th int. Workshop on Advances in Model Based Testing, in conjunction with ICST'10, Paris, France, pp. 54–61, 2010.
"Ten Principles for Living Models - A Manifesto of Change-Driven Software Engineering",
International Conference on Complex, Intelligent and Software Intensive Systems (CISIS)), 2010.
"Systematic Development of UMLsec Design Models Based On Security Requirements",
14th International Conference on Fundamental Approaches to Software Engineering (FASE 2011), Saarbrücken, Germany, 26 March - 3 April, 2011, Springer, 2011.
"Synchronization of abstract and concrete syntax in domain-specific modeling languages",
Software and Systems Modeling, vol. 9, pp. 453-471, 2010.
Abstract
"Supporting Software Evolution for Open Smart Cards by Security-by-Contract",
Dependability and Computer Engineering: Concepts for Software-Intensive Systems: IGI , 2011.