[PDF][PDF] What Do We Know about Software Security Evaluation? A Preliminary Study.

S Sentilles, E Papatheocharous… - QuASoQ@ APSEC, 2018 - swc.rwth-aachen.de
In software development, software quality is nowadays acknowledged to be as important as
software functionality and there exists an extensive body-of-knowledge on the topic. Yet …

Resolving least privilege violations in software architectures

K Buyens, B De Win, W Joosen - 2009 ICSE Workshop on …, 2009 - ieeexplore.ieee.org
Supporting a security principle, such as least privilege, in a software architecture is difficult.
Systematic rules are lacking, no guidance explains how to apply the principle in practice. As …

Measuring the interplay of security principles in software architectures

K Buyens, R Scandariato… - 2009 3rd International …, 2009 - ieeexplore.ieee.org
Security principles like least privilege and attack surface reduction play an important role in
the architectural phase of security engineering processes. However, the interplay between …

Costs of security in the PFS file system

K Walsh, F Schneider - 2012 - ecommons.cornell.edu
Various principles have been proposed for the design of trustworthy systems. But there is
little data about their impact on system performance. A filesystem that pervasively …

[PDF][PDF] Authorization and trust in software systems

K Walsh - 2012 - ecommons.cornell.edu
Nexus Authorization Logic (NAL) provides a principled basis for specifying and reasoning
about credentials and authorization policies. It extends prior access control logics that are …

[PDF][PDF] Measuring Attack Surface in Software Architecture (CMU-ISR-11-121)

J Gennari, D Garlan - 2012 - reports-archive.adm.cs.cmu.edu
In this report we show how to adapt the notion of “attack surface” to formally evaluate
security properties at the architectural level of design and to identify vulnerabilities in …

[PDF][PDF] Adaptive PoLP: Tailoring Least Privilege Access Controls for Dynamic IoT Environments

M Bibi, M Zadi, H Mehar, A Razzaq, M Shaikh - researchgate.net
As the Internet of Things (IoT) becomes more interconnected, it is critical to make sure
security measures are strong. Because of the dynamic nature of IoT contexts, traditional …

[PDF][PDF] Automated detection and resolution of least privilege violations in software architectures

K Buyens, R Scandariato, W Joosen - CW Reports, 2010 - lirias.kuleuven.be
Supporting security principles, like least privilege, in a software architecture is difficult due to
the lack of both a sound theory and effective secure software engineering practices. As a …

[PDF][PDF] Trust in a Principled Filesystem

K Walsh, FB Schneider - Citeseer
Users typically have little reason to trust that systems will protect user data against
unauthorized access. A prototype filesystem stack was implemented with a structure …

[HTML][HTML] Publications DISTRINET

DNRD Bites, DN Seminars - cs.kuleuven.be
Gupta, Sandeep; Buriro, Attaullah; Crispo, Bruno: A chimerical dataset combining
physiological and behavioral biometric traits for reliable user authentication on smart …