Stadyna: Addressing the problem of dynamic code updates in the security analysis of android applications Y Zhauniarovich, M Ahmad, O Gadyatskaya, B Crispo, F Massacci Proceedings of the 5th ACM Conference on Data and Application Security and …, 2015 | 129 | 2015 |
FSquaDRA: Fast detection of repackaged applications Y Zhauniarovich, O Gadyatskaya, B Crispo, F La Spina, E Moser Data and Applications Security and Privacy XXVIII: 28th Annual IFIP WG 11.3 …, 2014 | 86 | 2014 |
Using attack-defense trees to analyze threats and countermeasures in an ATM: a case study M Fraile, M Ford, O Gadyatskaya, R Kumar, M Stoelinga, R Trujillo-Rasua The Practice of Enterprise Modeling: 9th IFIP WG 8.1. Working Conference …, 2016 | 71 | 2016 |
Modelling attack-defense trees using timed automata O Gadyatskaya, RR Hansen, KG Larsen, A Legay, MC Olesen, ... Formal Modeling and Analysis of Timed Systems: 14th International Conference …, 2016 | 68 | 2016 |
Attack trees for practical security assessment: ranking of attack scenarios with ADTool 2.0 O Gadyatskaya, R Jhawar, P Kordy, K Lounis, S Mauw, R Trujillo-Rasua International Conference on Quantitative Evaluation of Systems, 159-162, 2016 | 62 | 2016 |
Towards black box testing of android apps Y Zhauniarovich, A Philippov, O Gadyatskaya, B Crispo, F Massacci 2015 10th International Conference on Availability, Reliability and Security …, 2015 | 50 | 2015 |
Small changes, big changes: an updated view on the android permission system Y Zhauniarovich, O Gadyatskaya Research in Attacks, Intrusions, and Defenses: 19th International Symposium …, 2016 | 49 | 2016 |
Attribute evaluation on attack trees with incomplete information A Buldas, O Gadyatskaya, A Lenin, S Mauw, R Trujillo-Rasua Computers & Security 88, 101630, 2020 | 40 | 2020 |
Fine-grained code coverage measurement in automated black-box android testing A Pilgun, O Gadyatskaya, Y Zhauniarovich, S Dashevskyi, A Kushniarou, ... ACM Transactions on Software Engineering and Methodology (TOSEM) 29 (4), 1-35, 2020 | 36 | 2020 |
Refinement-aware generation of attack trees O Gadyatskaya, R Jhawar, S Mauw, R Trujillo-Rasua, TAC Willemse Security and Trust Management: 13th International Workshop, STM 2017, Oslo …, 2017 | 32 | 2017 |
Security in the Firefox OS and Tizen mobile platforms O Gadyatskaya, F Massacci, Y Zhauniarovich Computer 47 (6), 57-63, 2014 | 28 | 2014 |
Evaluation of resource-based app repackaging detection in android O Gadyatskaya, AL Lezza, Y Zhauniarovich Secure IT Systems: 21st Nordic Conference, NordSec 2016, Oulu, Finland …, 2016 | 27 | 2016 |
Bridging two worlds: reconciling practical risk assessment methodologies with theory of attack trees O Gadyatskaya, C Harpes, S Mauw, C Muller, S Muller Graphical Models for Security: Third International Workshop, GraMSec 2016 …, 2016 | 24 | 2016 |
How to generate security cameras: towards defence generation for socio-technical systems O Gadyatskaya Graphical Models for Security: Second International Workshop, GraMSec 2015 …, 2016 | 22 | 2016 |
Dissecting android cryptocurrency miners S Dashevskyi, Y Zhauniarovich, O Gadyatskaya, A Pilgun, H Ouhssain Proceedings of the Tenth ACM Conference on Data and Application Security and …, 2020 | 21 | 2020 |
New directions in attack tree research: catching up with industrial needs O Gadyatskaya, R Trujillo-Rasua Graphical Models for Security: 4th International Workshop, GraMSec 2017 …, 2018 | 21 | 2018 |
Enabling trusted stores for android Y Zhauniarovich, O Gadyatskaya, B Crispo Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 19 | 2013 |
Can We Support Applications’ Evolution in Multi-Application Smart Cards by Security-by-Contract? N Dragoni, O Gadyatskaya, F Massacci Information Security Theory and Practices. Security and Privacy of Pervasive …, 2010 | 18 | 2010 |
An effective android code coverage tool A Pilgun, O Gadyatskaya, S Dashevskyi, Y Zhauniarovich, A Kushniarou Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 17 | 2018 |
Security-by-Contract for the OSGi platform O Gadyatskaya, F Massacci, A Philippov IFIP International Information Security Conference, 364-375, 2012 | 13 | 2012 |