Barthe, G., Crespo, J. M., Gulwani, S., Kunz, C. & Marron, M (2013). From relational verification to SIMD loop synthesis. In Nicolau, A., Shen, X., Amarasinghe, S. P. & Vuduc, R. (editors), ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming, PPoPP '13, Shenzhen, China, February 23-27, 2013, pages 123-134. ACM.[More][Bibtex]
Barthe, G., Crespo, J. M. & Kunz, C (2013). Beyond 2-Safety: Asymmetric Product Programs for Relational Program Verification. In Artëmov, S. N. & Nerode, A. (editors), Logical Foundations of Computer Science, International Symposium, LFCS 2013, San Diego, CA, USA, January 6-8, 2013. Proceedings, pages 29-43. Springer.[More][Bibtex]
Tran, L. M (2013). Early Dealing with Evolving Risks in Software Systems. In The 3rd International Workshop on Information Systems Security Engineering (WISSE'13).[More][Bibtex]
Ligaarden, O. (2013). A Framework for Analyzing and Monitoring the Impact of Dependencies on Quality. Phd Thesis, University of Oslo.[More][Bibtex]
Tran, L. M. & Massacci, F (2013). UNICORN: A Tool for Modeling and Reasoning on the Uncertainty of Requirements Evolutions. In Proceedings of Caise 2013.[More][Bibtex]
Beckers, K., Côté, I., Hatebur, D., Bender, S. F. & Heisel, M (2013). Common Criteria CompliAnt Software Development (CC-CASD). In Proceedings 28th Symposium on Applied Computing, pages 1298-1304. New York, NY, USA : ACM.[More][Bibtex]
Polla, M. L., Martinelli, F. & Sgandurra, D. (2013). A Survey on Security for Mobile Devices. IEEE Communications Surveys and Tutorials, 15(1), 446-471.[More][Bibtex]
Egea, M., Paci, F., Petrocchi, M. & Zannone, N (2013). PERSONA: A Personalized DataProtection Framework. In 7th IFIP WG 11.11 International Conference on Trust Management, pages 272-280.[More][Bibtex]
Lunardelli, A., Matteucci, I., Mori, P. & Petrocchi, M (2013). A Prototype for Solving Conflicts in XACML-based e-Health Policies. In 26th IEEE International Symposium on Computer-Based Medical Systems (CBMS 2013).[More][Bibtex]
Nguyen, B. T. & Sprenger, C (2013). Sound Security Protocol Transformations. In Principles of Security and Trust - Second International Conference, POST 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2013, Rome, Italy, March 16-24, 2013. Proceedings, pages 83-104. Springer.[More][Bibtex]
Bertolino, A., Busch, M., Daoudagh, S., Koch, N., Lonetti, F. & Marchetti, E (2013). A Toolchain for Designing and Testing XACML Policies. In Proceedings of ICST 2013 (Poster).[More][Bibtex]
Bertolino, A., Daoudagh, S., Lonetti, F. & Marchetti., E (2013). XACMUT: XACML 2.0 Mutants Generator. In Software Testing, Verification and Validation Workshops (ICSTW), 2013 IEEE Sixth International Conference on, pages 28-33.[More][Bibtex]
Alcaraz, C. & Lopez, J. (2013). Wide-Area Situational Awareness for Critical Infrastructure Protection. IEEE Computer, 46(4), 30-37.[More][Bibtex]
Backes, M., Doychev, G. & Köpf, B (2013). Preventing Side-Channel Leaks in Web Traffic: A Formal Approach. In Proc. 20th Network and Distributed Systems Security Symposium (NDSS), to appear. Internet Society.[More][Bibtex]
Karopoulos, G., Mori, P. & Martinelli, F. (2013). Usage control in SIP-based multimedia delivery. Computers & Security, 39, 406-418.[More][Bibtex]
Costantino, G. & Sgandurra, D (2013). How to Grant Less Permissions to Facebook Applications. In.[More][Bibtex]
Year: 2012
Decat, M., Lagaisse, B. & Joosen, W (2012). Toward efficient and confidentiality-aware federation of access control policies. In Proceedings of the 7th Workshop on Middleware for Next Generation Internet Computing, pages 4:1-4:6. ACM.[More][Online version][Bibtex]
Vogels, F. (2012). Formalisation and Soundness of Static Verification Algorithms for Imperative Programs (Formalisatie en correctheid van statische verificatiealgoritmes voor imperatieve programmatextquotesingles). Phd Thesis.[More][Online version][Bibtex]
Agten, P., Acker, S. V., Brondsema, Y., Phung, P. H., Desmet, L. & Piessens, F (2012). JSand: Complete client-side sandboxing of third-party JavaScript without browser modifications. In Proceedings of the 28th Annual Computer Security Applications Conference (ACSAC 2012), pages 1-10. ACM.[More][Online version][Bibtex]
Dini, G., Martinelli, F., Matteucci, I., Petrocchi, M., Saracino, A. & Sgandurra, D (2012). A Multi-Criteria Based Evaluation of Android Applications. In Proceedings of 4th Intl. Conference on Trusted Systems (InTrust2012). Springer.[More][Online version][Bibtex]
Avanesov, T., Chevalier, Y., Rusinowitch, M. & Turuani, M (2012). Towards the Orchestration of Secured Services under Non-disclosure Policies. In Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings, pages 130-145.[More][Bibtex]
Nikiforakis, N., Invernizzi, L., Kapravelos, A., Acker, S. V., Joosen, W., Kruegel, C. et al (2012). You are what you include: Large-scale evaluation of remote JavaScript inclusions. In Proceedings of the 19th ACM conference on Computer and Communications Security (CCS 2012), pages 736-747.[More][Online version][Bibtex]
Strackx, R. & Piessens, F (2012). Fides: Selectively hardening software application components against kernel-level or process-level malware. In Proceedings of the 19th ACM conference on Computer and Communications Security (CCS 2012), pages 2-13. ACM Press.[More][Online version][Bibtex]
Ciancia, V., Martin, A., Martinelli, F., Matteucci, I., Petrocchi, M. & Pimentel, E (2012). A tool for the synthesis of secure orchestrators. In Proceedings of Model-Driven Security Workshop (MDSec2012). ACM-DL.[More][Online version][Bibtex]
Reynaert, T., Groef, W. D., Devriese, D., Desmet, L. & Piessens, F (2012). PESAP: a Privacy enhanced social application platform. In International Workshop on Security and Privacy in Social Networks (SPSN), pages 827-833. IEEE Computer Society.[More][Online version][Bibtex]