Olga Gadyatskaya
Olga Gadyatskaya
Associate professor at LIACS, Leiden University
Bestätigte E-Mail-Adresse bei - Startseite
Zitiert von
Zitiert von
Stadyna: Addressing the problem of dynamic code updates in the security analysis of android applications
Y Zhauniarovich, M Ahmad, O Gadyatskaya, B Crispo, F Massacci
Proceedings of the 5th ACM Conference on Data and Application Security and …, 2015
FSquaDRA: Fast detection of repackaged applications
Y Zhauniarovich, O Gadyatskaya, B Crispo, F La Spina, E Moser
Data and Applications Security and Privacy XXVIII: 28th Annual IFIP WG 11.3 …, 2014
Using attack-defense trees to analyze threats and countermeasures in an ATM: a case study
M Fraile, M Ford, O Gadyatskaya, R Kumar, M Stoelinga, R Trujillo-Rasua
The Practice of Enterprise Modeling: 9th IFIP WG 8.1. Working Conference …, 2016
Modelling attack-defense trees using timed automata
O Gadyatskaya, RR Hansen, KG Larsen, A Legay, MC Olesen, ...
Formal Modeling and Analysis of Timed Systems: 14th International Conference …, 2016
Attack trees for practical security assessment: ranking of attack scenarios with ADTool 2.0
O Gadyatskaya, R Jhawar, P Kordy, K Lounis, S Mauw, R Trujillo-Rasua
International Conference on Quantitative Evaluation of Systems, 159-162, 2016
Small changes, big changes: an updated view on the android permission system
Y Zhauniarovich, O Gadyatskaya
Research in Attacks, Intrusions, and Defenses: 19th International Symposium …, 2016
Towards black box testing of android apps
Y Zhauniarovich, A Philippov, O Gadyatskaya, B Crispo, F Massacci
2015 10th International Conference on Availability, Reliability and Security …, 2015
Attribute evaluation on attack trees with incomplete information
A Buldas, O Gadyatskaya, A Lenin, S Mauw, R Trujillo-Rasua
Computers & Security 88, 101630, 2020
Fine-grained code coverage measurement in automated black-box android testing
A Pilgun, O Gadyatskaya, Y Zhauniarovich, S Dashevskyi, A Kushniarou, ...
ACM Transactions on Software Engineering and Methodology (TOSEM) 29 (4), 1-35, 2020
Refinement-aware generation of attack trees
O Gadyatskaya, R Jhawar, S Mauw, R Trujillo-Rasua, TAC Willemse
Security and Trust Management: 13th International Workshop, STM 2017, Oslo …, 2017
Evaluation of resource-based app repackaging detection in android
O Gadyatskaya, AL Lezza, Y Zhauniarovich
Secure IT Systems: 21st Nordic Conference, NordSec 2016, Oulu, Finland …, 2016
Security in the Firefox OS and Tizen mobile platforms
O Gadyatskaya, F Massacci, Y Zhauniarovich
Computer 47 (6), 57-63, 2014
Bridging two worlds: reconciling practical risk assessment methodologies with theory of attack trees
O Gadyatskaya, C Harpes, S Mauw, C Muller, S Muller
Graphical Models for Security: Third International Workshop, GraMSec 2016 …, 2016
How to generate security cameras: towards defence generation for socio-technical systems
O Gadyatskaya
Graphical Models for Security: Second International Workshop, GraMSec 2015 …, 2016
New directions in attack tree research: catching up with industrial needs
O Gadyatskaya, R Trujillo-Rasua
Graphical Models for Security: 4th International Workshop, GraMSec 2017 …, 2018
Dissecting android cryptocurrency miners
S Dashevskyi, Y Zhauniarovich, O Gadyatskaya, A Pilgun, H Ouhssain
Proceedings of the Tenth ACM Conference on Data and Application Security and …, 2020
Enabling trusted stores for android
Y Zhauniarovich, O Gadyatskaya, B Crispo
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
Can We Support Applications’ Evolution in Multi-Application Smart Cards by Security-by-Contract?
N Dragoni, O Gadyatskaya, F Massacci
Information Security Theory and Practices. Security and Privacy of Pervasive …, 2010
An effective android code coverage tool
A Pilgun, O Gadyatskaya, S Dashevskyi, Y Zhauniarovich, A Kushniarou
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
Security-by-Contract for the OSGi platform
O Gadyatskaya, F Massacci, A Philippov
IFIP International Information Security Conference, 364-375, 2012
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20