Stadyna: Addressing the problem of dynamic code updates in the security analysis of android applications Y Zhauniarovich, M Ahmad, O Gadyatskaya, B Crispo, F Massacci Proceedings of the 5th ACM Conference on Data and Application Security and …, 2015 | 90 | 2015 |
FSquaDRA: Fast detection of repackaged applications Y Zhauniarovich, O Gadyatskaya, B Crispo, F La Spina, E Moser IFIP Annual Conference on Data and Applications Security and Privacy, 130-145, 2014 | 69 | 2014 |
Attack trees for practical security assessment: ranking of attack scenarios with ADTool 2.0 O Gadyatskaya, R Jhawar, P Kordy, K Lounis, S Mauw, R Trujillo-Rasua International Conference on Quantitative Evaluation of Systems, 159-162, 2016 | 40 | 2016 |
Using attack-defense trees to analyze threats and countermeasures in an ATM: a case study M Fraile, M Ford, O Gadyatskaya, R Kumar, M Stoelinga, R Trujillo-Rasua IFIP Working Conference on The Practice of Enterprise Modeling, 326-334, 2016 | 34 | 2016 |
Modelling attack-defense trees using timed automata O Gadyatskaya, RR Hansen, KG Larsen, A Legay, MC Olesen, ... International Conference on Formal Modeling and Analysis of Timed Systems, 35-50, 2016 | 33 | 2016 |
Towards black box testing of android apps Y Zhauniarovich, A Philippov, O Gadyatskaya, B Crispo, F Massacci 2015 10th International Conference on Availability, Reliability and Security …, 2015 | 32 | 2015 |
Small changes, big changes: an updated view on the Android permission system Y Zhauniarovich, O Gadyatskaya International Symposium on Research in Attacks, Intrusions, and Defenses …, 2016 | 29 | 2016 |
Evaluation of resource-based app repackaging detection in android O Gadyatskaya, AL Lezza, Y Zhauniarovich Nordic Conference on Secure IT Systems, 135-151, 2016 | 20 | 2016 |
Bridging two worlds: reconciling practical risk assessment methodologies with theory of attack trees O Gadyatskaya, C Harpes, S Mauw, C Muller, S Muller International Workshop on Graphical Models for Security, 80-93, 2016 | 19 | 2016 |
How to generate security cameras: Towards defence generation for socio-technical systems O Gadyatskaya International Workshop on Graphical Models for Security, 50-65, 2015 | 16 | 2015 |
Security in the Firefox OS and Tizen mobile platforms O Gadyatskaya, F Massacci, Y Zhauniarovich Computer 47 (6), 57-63, 2014 | 16 | 2014 |
Enabling trusted stores for android Y Zhauniarovich, O Gadyatskaya, B Crispo Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 16 | 2013 |
Can We Support Applications’ Evolution in Multi-Application Smart Cards by Security-by-Contract? N Dragoni, O Gadyatskaya, F Massacci IFIP International Workshop on Information Security Theory and Practices …, 2010 | 15 | 2010 |
Refinement-aware generation of attack trees O Gadyatskaya, R Jhawar, S Mauw, R Trujillo-Rasua, TAC Willemse International Workshop on Security and Trust Management, 164-179, 2017 | 14 | 2017 |
Security-by-Contract for the OSGi platform O Gadyatskaya, F Massacci, A Philippov IFIP International Information Security Conference, 364-375, 2012 | 12 | 2012 |
A load time Policy Checker for open multi-application smart cards N Dragoni, E Lostal, O Gadyatskaya, F Massacci, F Paci 2011 IEEE International Symposium on Policies for Distributed Systems and …, 2011 | 11 | 2011 |
An effective android code coverage tool A Pilgun, O Gadyatskaya, S Dashevskyi, Y Zhauniarovich, A Kushniarou Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 9 | 2018 |
New directions in attack tree research: Catching up with industrial needs O Gadyatskaya, R Trujillo-Rasua International Workshop on Graphical Models for Security, 115-126, 2017 | 9 | 2017 |
Load time security verification O Gadyatskaya, E Lostal, F Massacci International Conference on Information Systems Security, 250-264, 2011 | 6 | 2011 |
Security-by-contract for applicationsevolution in multi-application smart cards N Dragoni, O Gadyatskaya, F Massacci Proc. of NODES, DTU Technical Report, 297-312, 2010 | 6 | 2010 |