Publications

photo

Peer-reviewed publications

Generated using php-bibHTML by Hugo Jonker, based on the BiblioPhile PHP BibTex parser.

  • 2018:
    1. An Effective Android Code Coverage Tool. A. Pilgun, O. Gadyatskaya, S. Dashevskyi, Y. Zhauniarovich and A. Kushniarou. In Proc. of CCS Poster session, pp. 2189–2191, 2018. bib ]
    2. The Influence of Code Coverage Metrics on Automated Testing Efficiency in Android. S. Dashevskyi, O. Gadyatskaya, A. Pilgun and Y. Zhauniarovich. In Proc. of CCS Poster session, pp. 2216–2218, 2018. bib ]
    3. Attribute Evaluation on Attack Trees with Incomplete Information. A. Buldas, O. Gadyatskaya, A. Lenin, S. Mauw and R. Trujillo-Rasua. arXiv preprint arXiv:1812.10754, 2018. bib ]
  • 2017:
    1. Refinement-aware generation of attack trees. O. Gadyatskaya, R. Jhawar, S. Mauw, R. Trujillo-Rasua and T. Willemse. In Proc. of STM, pp. 164–179, 2017. bib ]
    2. New Directions in Attack Tree Research: Catching up with Industrial Needs. O. Gadyatskaya and R. Trujillo-Rasua. In Proc. of GramSec, pp. 115–126, 2017. bib ]
  • 2016:
    1. Evaluation of Resource-based App Repackaging Detection in Android. O. Gadyatskaya, A.-L. Lezza and Y. Zhauniarovich. In Proc. of NordSec, Springer, LNCS 10014, 2016. bib ]
    2. Small changes, big changes: An updated view on the Android permission system. Y. Zhauniarovich and O. Gadyatskaya. In Proc. of RAID, Springer, LNCS 9854, pp. 346-367, 2016. bib ]
    3. Using attack–defense trees to analyze threats and countermeasures in an ATM: A case study. M. Ford, M. Fraile, O. Gadyatskaya, R. Kumar, M. Stoellinga and R. Trujillo-Rasua. In Proc. of PoEM, Springer, 2016. bib ]
    4. Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0. O. Gadyatskaya, R. Jhawar, P. Kordy, K. Lounis, S. Mauw and R. Trujillo-Rasua. In Proc. of QEST, Springer, LNCS 9826, pp. 159-162, 2016. bib ]
    5. Bridging two worlds: Reconciling practical risk assessment methodologies with theory of attack trees. O. Gadyatskaya, C. Harpes, S. Mauw, C. Muller and S. Muller. In Proc. of GraMSec, Springer, LNCS 9987, 2016. bib ]
    6. Towards Empirical Evaluation of Automated Risk Assessment Methods. O. Gadyatskaya, K. Labunets and F. Paci. In Proc. of CRiSIS, Springer, 2016. bib ]
    7. Modelling Attack-defense Trees Using Timed Automata. O. Gadyatskaya, R.R. Hansen, K.G. Larsen, A. Legay, M.C. Olesen and D.B. Poulsen. In Proc. of FORMATS, Springer, LNCS 9884, pp. 35-50, 2016. bib ]
  • 2015:
    1. StaDynA: Addressing the Problem of Dynamic Code Updates in the Security Analysis of Android Applications. Y. Zhauniarovich, M. Ahmad, O. Gadyatskaya, B. Crispo and F. Massacci. In Proceedings of CODASPY, ACM, 2015. bib ]
    2. Towards Black Box Testing of Android Apps. Y. Zhauniarovich, A. Philippov, O. Gadyatskaya, B. Crispo and F. Massacci. In Proc. of Software Assurance Workshop at the 10th International Conference on Availability, Reliability and Security (ARES), IEEE, pp. 501–510, 2015. bib ]
    3. How to Generate Security Cameras: Towards Defence Generation for Socio-Technical Systems. O. Gadyatskaya. In Proc. of GraMSec, Springer, LNCS 9390, 2015. bib ]
  • 2014:
    1. FSquaDRA: Fast Detection of Repackaged Applications. Y. Zhauniarovich, O. Gadyatskaya, B. Crispo, L.F. Spina and E. Moser. In Proc. of DBSec, Springer, LNCS 8566, pp. 130-145, 2014. bib ]
    2. Security in the Firefox OS and Tizen Mobile Platforms. O. Gadyatskaya, F. Massacci and Y. Zhauniarovich. IEEE Computer, 47(6):57–63, 2014. bib ]
    3. An Empirical Study of the Technology Transfer Potential of EU Security and Trust R&D Projects. M. de Gramatica, F. Massacci and O. Gadyatskaya. In Cyber Security and Privacy - Third Cyber Security and Privacy EU Forum, CSP Forum 2014, Athens, Greece, May 21-22, 2014, Revised Selected Papers, pp. 159–170, 2014. bib ]
  • 2013:
    1. DEMO: Enabling Trusted Stores for Android. Y. Zhauniarovich, O. Gadyatskaya and B. Crispo. In Proc. of CCS, ACM, pp. 1345-1348, 2013. bib ]
    2. Load time code validation for mobile phone Java Cards. O. Gadyatskaya, F. Massacci, Q. Nguyen and B. Chetali. J. Inf. Sec. Appl., 18(2-3):108–129, 2013. bib ]
  • 2012:
    1. High-level algorithms and data structures requirements for security-by-contract on Java cards. N. Dragoni, O. Gadyatskaya, F. Massacci and A. Philippov. IJCCBS, 3(4):284–304, 2012. bib ]
    2. Controlling Application Interactions on the Novel Smart Cards with Security-by-Contract. O. Gadyatskaya and F. Massacci. In Formal Methods for Components and Objects - 11th International Symposium, FMCO 2012, Bertinoro, Italy, September 24-28, 2012, Revised Lectures, pp. 197–215, 2012. bib ]
    3. Security-by-Contract for the OSGi Platform. O. Gadyatskaya, F. Massacci and A. Philippov. In Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings, pp. 364–375, 2012. bib ]
  • 2011:
    1. Load Time Security Verification. O. Gadyatskaya, E. Lostal and F. Massacci. In Information Systems Security - 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, Procedings, pp. 250–264, 2011. bib ]
    2. A Load Time Policy Checker for Open Multi-application Smart Cards. N. Dragoni, E. Lostal, O. Gadyatskaya, F. Massacci and F. Paci. In POLICY 2011, IEEE International Symposium on Policies for Distributed Systems and Networks, Pisa, Italy, 6-8 June 2011, pp. 153–156, 2011. bib ]
  • 2010:
    1. Java Card Architecture for Autonomous Yet Secure Evolution of Smart Cards Applications. O. Gadyatskaya, F. Massacci, F. Paci and S. Stankevich. In Information Security Technology for Applications - 15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010, Revised Selected Papers, pp. 187–192, 2010. bib ]
    2. Can We Support Applications’ Evolution in Multi-application Smart Cards by Security-by-Contract?. N. Dragoni, O. Gadyatskaya and F. Massacci. In Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010. Proceedings, pp. 221–228, 2010. bib ]