Olga Gadyatskaya
Olga Gadyatskaya
Assistant professor at LIACS, Leiden University
Verified email at - Homepage
Cited by
Cited by
Stadyna: Addressing the problem of dynamic code updates in the security analysis of android applications
Y Zhauniarovich, M Ahmad, O Gadyatskaya, B Crispo, F Massacci
Proceedings of the 5th ACM Conference on Data and Application Security andá…, 2015
FSquaDRA: Fast detection of repackaged applications
Y Zhauniarovich, O Gadyatskaya, B Crispo, F La Spina, E Moser
IFIP Annual Conference on Data and Applications Security and Privacy, 130-145, 2014
Using attack-defense trees to analyze threats and countermeasures in an ATM: a case study
M Fraile, M Ford, O Gadyatskaya, R Kumar, M Stoelinga, R Trujillo-Rasua
IFIP Working Conference on The Practice of Enterprise Modeling, 326-334, 2016
Attack trees for practical security assessment: ranking of attack scenarios with ADTool 2.0
O Gadyatskaya, R Jhawar, P Kordy, K Lounis, S Mauw, R Trujillo-Rasua
International Conference on Quantitative Evaluation of Systems, 159-162, 2016
Small changes, big changes: an updated view on the android permission system
Y Zhauniarovich, O Gadyatskaya
International Symposium on Research in Attacks, Intrusions, and Defensesá…, 2016
Modelling attack-defense trees using timed automata
O Gadyatskaya, RR Hansen, KG Larsen, A Legay, MC Olesen, ...
International Conference on Formal Modeling and Analysis of Timed Systems, 35-50, 2016
Towards black box testing of android apps
Y Zhauniarovich, A Philippov, O Gadyatskaya, B Crispo, F Massacci
2015 10th International Conference on Availability, Reliability and Securityá…, 2015
Security in the Firefox OS and Tizen mobile platforms
O Gadyatskaya, F Massacci, Y Zhauniarovich
Computer 47 (6), 57-63, 2014
Evaluation of resource-based app repackaging detection in android
O Gadyatskaya, AL Lezza, Y Zhauniarovich
Nordic Conference on Secure IT Systems, 135-151, 2016
Refinement-aware generation of attack trees
O Gadyatskaya, R Jhawar, S Mauw, R Trujillo-Rasua, TAC Willemse
International Workshop on Security and Trust Management, 164-179, 2017
Bridging two worlds: reconciling practical risk assessment methodologies with theory of attack trees
O Gadyatskaya, C Harpes, S Mauw, C Muller, S Muller
International Workshop on Graphical Models for Security, 80-93, 2016
Fine-grained code coverage measurement in automated black-box android testing
A Pilgun, O Gadyatskaya, Y Zhauniarovich, S Dashevskyi, A Kushniarou, ...
ACM Transactions on Software Engineering and Methodology (TOSEM) 29 (4), 1-35, 2020
Enabling trusted stores for android
Y Zhauniarovich, O Gadyatskaya, B Crispo
Proceedings of the 2013 ACM SIGSAC conference on Computer & communicationsá…, 2013
Can We Support Applications’ Evolution in Multi-Application Smart Cards by Security-by-Contract?
N Dragoni, O Gadyatskaya, F Massacci
IFIP International Workshop on Information Security Theory and Practicesá…, 2010
Attribute evaluation on attack trees with incomplete information
A Buldas, O Gadyatskaya, A Lenin, S Mauw, R Trujillo-Rasua
Computers & Security 88, 101630, 2020
An effective android code coverage tool
A Pilgun, O Gadyatskaya, S Dashevskyi, Y Zhauniarovich, A Kushniarou
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communicationsá…, 2018
How to generate security cameras: Towards defence generation for socio-technical systems
O Gadyatskaya
International Workshop on Graphical Models for Security, 50-65, 2015
New directions in attack tree research: catching up with industrial needs
O Gadyatskaya, R Trujillo-Rasua
International Workshop on Graphical Models for Security, 115-126, 2017
Security-by-Contract for the OSGi platform
O Gadyatskaya, F Massacci, A Philippov
IFIP International Information Security Conference, 364-375, 2012
Dissecting android cryptocurrency miners
S Dashevskyi, Y Zhauniarovich, O Gadyatskaya, A Pilgun, H Ouhssain
Proceedings of the Tenth ACM Conference on Data and Application Security andá…, 2020
The system can't perform the operation now. Try again later.
Articles 1–20