Finding architectural flaws using constraints

R Vanciu, M Abi-Antoun - 2013 28th IEEE/ACM International …, 2013 - ieeexplore.ieee.org
During Architectural Risk Analysis (ARA), security architects use a runtime architecture to
look for security vulnerabilities that are architectural flaws rather than coding defects. The …

Identifying core objects for trace summarization using reference relations and access analysis

K Noda, T Kobayashi, T Toda… - 2017 IEEE 41st Annual …, 2017 - ieeexplore.ieee.org
Behaviors of an object-oriented system can be visualized as reverse-engineered sequence
diagrams from execution traces. This approach is a valuable tool for program …

Automatic security-flaw detection replication and comparison

BJ Berger, C Plump - 2023 ACM/IEEE 26th International …, 2023 - ieeexplore.ieee.org
Threat Modeling is an essential step in secure software system development. It is a manual,
attacker-centric approach for identifying architecture-level security flaws during the planning …

Implementation techniques for a parallel relative debugger

D Abramson, R Sosic, C Watson - Proceedings of the 1996 …, 1996 - ieeexplore.ieee.org
This paper discusses a new debugging strategy for parallel programs, called parallel
relative debugging. Relative debugging allows a user to compare the execution of one …

Ownership object graphs with dataflow edges

R Vanciu, M Abi-Antoun - 2012 19th Working Conference on …, 2012 - ieeexplore.ieee.org
During architectural risk analysis, security experts look for architectural flaws based on a
documented runtime structure, which for object-oriented systems can be approximated by an …

Identifying core objects for trace summarization by analyzing reference relations and dynamic properties

K Noda, T Kobayashi, N Atsumi - IEICE TRANSACTIONS on …, 2018 - search.ieice.org
Behaviors of an object-oriented system can be visualized as reverse-engineered sequence
diagrams from execution traces. This approach is a valuable tool for program …

Raindroid: A system for run-time mitigation of Android intent vulnerabilities [poster]

B Schmerl, J Gennari, J Cámara, D Garlan - Proceedings of the …, 2016 - dl.acm.org
Modern frameworks are required to be extendable as well as secure. However, these two
qualities are often at odds. In this poster we describe an approach that uses a combination …

Comparative evaluation of architectural and code-level approaches for finding security vulnerabilities

R Vanciu, E Khalaj, M Abi-Antoun - … of the 2014 ACM Workshop on …, 2014 - dl.acm.org
During architectural risk analysis, Security Information Workers (SIWs) reason about security-
relevant architectural flaws using a high-level representation of the system's structure …

[LLIBRE][B] Static extraction of dataflow communication for security

LR Vanciu - 2014 - search.proquest.com
The cost of security vulnerabilities in widely-deployed code such as mobile applications is
high. As a result, many companies are using Architectural Risk Analysis (ARA) to find …

An architecture style for android security analysis: Poster

B Schmerl, J Gennari, D Garlan - … of the 2015 Symposium and Bootcamp …, 2015 - dl.acm.org
Modern frameworks are required to be extendable as well as secure. However, these two
qualities are often at odds. In this poster we describe an approach that uses a combination …