CORDIS provides links to public deliverables and publications of HORIZON projects.
Links to deliverables and publications from FP7 projects, as well as links to some specific result types such as dataset and software, are dynamically retrieved from OpenAIRE .
Deliverables
Description of the reactive protection methodology in VeriDevOps including different modules and resilience catalogue
VeriDevOps Framework - initial version (opens in new window)Global public release of the VeriDevOps framework.
Patterns catalogue (opens in new window)The project will deliver a catalogue of patterns for formal specification of security properties
Tools and language support for prevention at design level - final version (opens in new window)This deliverable provides the final version of the technologies for prevention at design level, after the technologies developed in the initial version (D4.1) have been evaluated against the case studies. In addition, based on the feedback collected from the case studies, the deliverable will propose a domain specific language that will make the approach easy to adopt and use by domain experts.
Specification verification tool set - initial version (opens in new window)The set of tools for checking errors, omissions and inconsistencies in a set of security requirements specified formally.
Requirements patterns matching tool chain (opens in new window)The pattern matching tool chain will map the security requirements to patterns of security formal properties.
Tools for active prevention during development - Initial version (opens in new window)The deliverable will report on technologies for test generation from formal specifications The main focus in this deliverable will be in technologies for verifying that the implementation satisfies the security properties specified in the design phase In addition it will report on the tools for measuring the quality of the tests at specification andcode level
Tools for prevention at design level - initial version (opens in new window)Initial methods and tool chain for creating secure-by-design specifications. The deliverable will provide approaches to create the system design from case study requirements, including possible model transformations from non-formal specifications to formal ones, and for verifying the design against the security properties defined in WP2.
Methodology and tools for vulnerability localization, classification and prevention recommendations - final version (opens in new window)Final description of the methodology and tool chain for the localization and classification of the vulnerabilities. The methodology is complemented by a catalogue of prevention measures based according to the type of vulnerability identified.
Tools for prevention during development - final version (opens in new window)The deliverable will provide technologies for prevention during development, by providing updates to the technologies in D4.2 based on the feedback received from the case study evaluation. The deliverable will also report on technologies for detection of unknown vulnerabilities in implementation detected via mutation and fuzz testing. In addition, it will provide technologies that combine automated test generation and regression testing and their integration in CI pipelines.
Threat oracle engine specification, design and implementation final version (opens in new window)Final design and last prototype of the threat oracle engine allowing the scanning and classification of vulnerabilities at runtime
Requirements automated generation tool chain (opens in new window)This tool chain will combine the tools for extraction labeling training and classification of security requirements
VeriDevOps Framework - final version (opens in new window)Final cut-off for the public release of the VeriDevOps framework.
Threat oracle engine specification, design and implementation initial version (opens in new window)Initial design and first prototype of the threat oracle engine allowing the scanning and classification of vulnerabilities at runtime
Specification verification tool set (opens in new window)Final version of D2.5
Methodology and tools for vulnerability localization, classification and prevention recommendations - initial version (opens in new window)Initial description of the methodology and tool chain for the localization and classification of the vulnerabilities. The methodology is complemented by a catalogue of prevention measures based according to the type of vulnerability identified.
Security monitoring - security flaws detection mechanisms and tools initial version (opens in new window)Initial design and first prototype of the security monitoring solutions including rulebased detection mechanisms and AIbased anomaly detection mechanisms
Security monitoring - security flaws detection mechanisms and tools final version (opens in new window)Final design and last prototype of the security monitoring solutions including rule-based detection mechanisms and AI-based anomaly detection mechanisms.
The report defines the specifications of the formalism to be used for formal specification of security properties We will investigate mainly timed automata and TCTL but we will adapt and extend them to serve the needs of the project
Report on the architecture and implementation evaluation - initial version (opens in new window)Evaluation of the software stacks components as well as of the VeriDevOps framework as a whole The deliverable is provided in two iterations the initial and refined The latter will also explore the integration of all components included in the architecture
Mitigation for vulnerabilities (opens in new window)recommendations and tools to suggest as countermeasures for identified vulnerabilities
Report on evaluation of case studies - final version (opens in new window)Final version of D5.5
State-of the Art Report (opens in new window)This deliverable will update the stateofthe art wrt to new approaches and technologies that appeared since the project proposal was submitted
Report on the architecture and implementation evaluation - final version (opens in new window)Final version of D5.1
Specification of patterns for security requirements (opens in new window)Based on the body of knowledge for requirements patterns this deliverable will elaborate specifics of the patterns for security formal properties patterns
Report on evaluation of case studies - initial version (opens in new window)Description of the implementation progress for all use cases (FAG and ABB). The report also evaluates the implementation of base components, which are provided by WP2, WP3, and WP4, from the perspective of the use cases. Furthermore, the report contains descriptions of the feature set of all use cases and potential problems.
Attack response - Root cause analysis and countermeasures initial version (opens in new window)Initial design and implementation of the tool for root cause analysis and counter-measures recommendations
VeriDevOps Framework Architecture and Roadmap (opens in new window)This report will define the initial vision of global architecture of the VeriDevOps tool sets tool chains interfaes and engineering artifacts The document will be accompanied with a roadmap for technology development The architecture and roadmap will be revised throughout the project duration at public release milestones
Attack response - Root cause analysis and countermeasures final version (opens in new window)Final design and implementation of the tool for root cause analysis and counter-measures recommendations.
VeriDevOps Methodology (opens in new window)The methodology will guide users for applying the security requirements automated generation and protection and prevention activities driven by formal specifications.
Dissemination and Communication plan (opens in new window)This deliverable will include the plans for scientific dissemination, communication, collaboration and standardization. It will set up the methodology to follow, the instruments and mechanisms will be used for making the project awareness, the collaboration policy with other projects and related stakeholders and interested groups.It will identify the KPIs for assessing the progress and impact in the due formal reports. List of potential events, conferences, interest groups, open source communities, online press, journals, social networks, etc must be included. The plan will be assessed at the end of each reporting period and will be updated if needed.
Publications
Author(s):
Tanwir Ahmad, Dragos Truscan, Jüri Vain
Published in:
CyberSecurity in a DevOps Environment From Requirements to Monitoring, 2023, Page(s) Pages 225-251, ISBN 978-3-031-42212-6
Publisher:
Springer Cham
Author(s):
Manh-Dung Nguyen, Vinh-Hoa La, Wissam Mallouli, Ana Rosa Cavalli, Edgardo Montes de Oca
Published in:
CyberSecurity in a DevOps Environment From Requirements to Monitoring, 2023, Page(s) Pages 293-324, ISBN 978-3-031-42212-6
Publisher:
Springer Cham
Author(s):
Ángel Longueira-Romero, Rosa Iglesias, Jose Luis Flores, Iñaki Garitano
Published in:
CyberSecurity in a DevOps Environment From Requirements to Monitoring, 2023, Page(s) Pages 95-125, ISBN 978-3-031-42214-0
Publisher:
Springer Cham
Author(s):
Gaadha Sudheerbabu, Tanwir Ahmad, Dragos Truscan, Jüri Vain
Published in:
CyberSecurity in a DevOps Environment From Requirements to Monitoring, 2023, Page(s) 127-159, ISBN 978-3-031-42212-6
Publisher:
Springer Cham
Author(s):
Andrey Sadovykh, Nan Messe, Ildar Nigmatullin, Sophie Ebersold, Maria Naumcheva, Jean-Michel Bruel
Published in:
CyberSecurity in a DevOps Environment From Requirements to Monitoring, 2023, Page(s) 65-92
Publisher:
Springer Cham
Author(s):
Eduard Paul Enoiu, Kejsi Biçoku, Cristina Seceleanu, Michael Felderer
Published in:
CyberSecurity in a DevOps Environment From Requirements to Monitoring, 2023, ISBN 978-3-031-42214-0
Publisher:
Springer Cham
Author(s):
Laurens Sion, Dimitri Van Landuyt, Koen Yskout, Stef Verreydt, Wouter Joosen
Published in:
CyberSecurity in a DevOps Environment From Requirements to Monitoring, 2023, Page(s) Pages 195-223, ISBN 978-3-031-42212-6
Publisher:
Springer Cham
Author(s):
Sylvain Hallé
Published in:
CyberSecurity in a DevOps Environment From Requirements to Monitoring, 2023, Page(s) Pages 253-291, ISBN 978-3-031-42212-6
Publisher:
Springer Cham
Author(s):
Andrey Sadovykh, Kirill Yakovlev, Alexandr Naumchev, Vladimir Ivanov
Published in:
CyberSecurity in a DevOps Environment From Requirements to Monitoring, 2023, Page(s) 35-63, ISBN 978-3-031-42214-0
Publisher:
Springer Cham
Author(s):
Ramon Barakat, Jasper von Blanckenburg, Roman Kraus, Fabian Jezuita, Steffen Lüdtke, Martin A. Schneider
Published in:
CyberSecurity in a DevOps Environment From Requirements to Monitoring, 2023, Page(s) Pages 161-191, ISBN 978-3-031-42212-6
Publisher:
Springer Cham
Author(s):
Tanwir Ahmad, Dragos Truscan, Juri Vain, Ivan Porres
Published in:
2022
Publisher:
IEEE
Author(s):
Mehrdad Saadatmand, Dragos Truscan, Eduard Paul Enoiu
Published in:
2022 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW), 2022
Publisher:
IEEE
DOI:
10.1109/icstw55395.2022.00006
Author(s):
Mehrdad Saadatmand,Dragos Truscan,Eduard Enoiu
Published in:
2023 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW), 2023
Publisher:
IEEE
DOI:
10.1109/icstw58534.2023.00011
Author(s):
Eduard Paul Enoiu and Robert Feldt
Published in:
International Conference on Cooperative and Human Aspects of Software Engineering 2021, Issue International Conference on Cooperative and Human Aspects of Software Engineering 2021, 2021
Publisher:
IEEE
Author(s):
Gaadha Sudheerbabu, Tanwir Ahmad, Filip Sebek, Dragos Truscan, Jüri Vain, and Ivan Porres
Published in:
2022
Publisher:
IEEE
DOI:
10.48550/arxiv.2208.09261
Author(s):
Ted Kurmaku, Eduard Paul Enoiu, Musa Kumrija
Published in:
15th Innovations in Software Engineering Conference ISEC 2022, Issue ISEC 2022, 2022
Publisher:
ACM
DOI:
10.1145/3511430.3511433
Author(s):
Tanwir Ahmad, Dragos Truscan
Published in:
16th IEEE International Conference on Software Testing, Verification and Validation (ICST) 2023, 2023
Publisher:
IEEE
DOI:
10.1109/icstw58534.2023.00038
Author(s):
Daniel Flemström, Wasif Afzal, Eduard Paul Enoiu
Published in:
Software Quality Days, Issue SQD 2022, 2021, ISBN 978-3-031-04115-0
Publisher:
Springer
DOI:
10.1007/978-3-031-04115-0_5
Author(s):
Ana Rosa Cavalli
Published in:
2021
Publisher:
IEEE
DOI:
10.1109/icstw52544.2021.00031
Author(s):
Khaled Ismaeel, Alexandr Naumchev, Andrey Sadovykh, Dragos Truscan, Eduard Paul Enoiu, Cristina Seceleanu
Published in:
2021 IEEE 29th International Requirements Engineering Conference Workshops (, 2021
Publisher:
IEEE
DOI:
10.1109/rew53955.2021.9714713
Author(s):
Vasily Varenov, Aydar Gabdrahmanov
Published in:
2021
Publisher:
IEEE
DOI:
10.1109/rew53955.2021.00063
Author(s):
Mikael Ebrahimi Salari, Eduard Paul Enoiu, Wasif Afzal, Cristina Seceleanu
Published in:
The 38th ACM/SIGAPP Symposium On Applied Computing SAC23, 2023
Publisher:
Association for Computing Machinery
DOI:
10.1145/3555776.3577698
Author(s):
Muhammad Nouman Zafar, Wasif Afzal, Eduard Paul Enoiu, Athanasios Stratis , Ola Sellin
Published in:
The 17th Workshop on Advances in Model Based Testing, Issue A-MOST 2021, 2021
Publisher:
IEEE
Author(s):
Eduard Paul Enoiu; Dragos Truscan; Andrey Sadovykh; Wissam Mallouli
Published in:
The 18th International Conference on Availability, Reliability and Security (ARES 2023), 2023
Publisher:
ACM
DOI:
10.1145/3600160.3605054
Author(s):
Saadatmand, M., Truscan, D. and Enoiu, E
Published in:
2021 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW), Issue ITEQS2021 workshop, 2021, Page(s) xii-xii
Publisher:
IEEE
DOI:
10.1109/icstw52544.2021.00007
Author(s):
Andrey Sadovykh; Gunnar Widforss; Dragos Truscan; Eduard Paul Enoiu; Wissam Mallouli; Rosa Iglesias; Alessandra Bagnto; Olga Hendel
Published in:
Design, Automation and Test in Europe Conference DATE 2021, 2021, Page(s) p. 1330-1333
Publisher:
IEEE
DOI:
10.23919/date51398.2021.9474185
Author(s):
Andrey Sadovykh, Zujany Salazar, Wissam Mallouli, Ana Rosa Cavalli, Dragos Truscan, Eduard Paul Enoiu, Rosa Iglesias and Olga Hendel
Published in:
2021
Publisher:
IFIP/Springer
Author(s):
Georges Ouffoue,Fatiha Zaidi,Fatiha Zaidi,Ana Rosa Cavalli,Huu Nghia Nguyen
Published in:
2020
Publisher:
Electronics
DOI:
10.3390/electronics10010006
Author(s):
Muhammad Nouman Zafar, Wasif Afzal, Eduard Paul Enoiu
Published in:
International Workshop on Automating TEST Case Design, Selection, and Evaluation, Issue A-TEST 2021, 2021
Publisher:
ACM
DOI:
10.1145/3472672.3473956
Author(s):
Florian Lorber,Cristina Seceleanu,Uraz Cengiz Turker
Published in:
16th IEEE International Conference on Software Testing, Verification and Validation Workshops, ICSTW 2023, 2023
Publisher:
IEEE
DOI:
10.1109/icstw58534.2023.00005
Author(s):
Zujany Salazar, Ana Rosa Cavalli, Wissam Mallouli, Filip Sebek, Fatiha Zaidi, Monika Ewa Rakoczy
Published in:
2022
Publisher:
IEEE
DOI:
10.1109/icstw55395.2022.00021
Author(s):
Per Erik Strandberg, Mirgita Frasheri , Eduard Paul Enoiu
Published in:
International Conference On Artificial Intelligence Testing, Issue AITEST 2021, 2021
Publisher:
IEEE
DOI:
10.1109/aitest52744.2021.00025
Author(s):
Daniel Flemström, Henrik Jonsson, Eduard Paul Enoiu, Wasif Afzal
Published in:
IEEE Conference on Software Testing, Validation and Verification 2021, Issue ICST 2021, 2021
Publisher:
IEEE
DOI:
10.1109/icst49551.2021.00047
Author(s):
Mikael Salari, Eduard Enoiu, Wasif Afzal, Cristina Seceleanu
Published in:
14th IEEE International Conference on Software Testing, Verification and Validation Workshops, ICSTW, 2022
Publisher:
Institute of Electrical and Electronics Engineers Inc
DOI:
10.1109/icstw55395.2022.00055
Author(s):
Andrey Sadovykh, Dragos Truscan, Hugo Bruneliere
Published in:
2021
Publisher:
IEEE
DOI:
10.1109/re51729.2021.00040
Author(s):
Andrey Sadovykh, Hugo Bruneliere, Dragos Truscan
Published in:
INFORSID 2022 - 40ème Congrès INFormatique des ORganisations et Systèmes d'Information et de Décision, 2022
Publisher:
HAL
Author(s):
Andrey Sadovykh, Bilal Said, Dragos Truscan, Hugo Bruneliere
Published in:
Science of Computer Programming, 2024, ISSN 0167-6423
Publisher:
Elsevier BV
DOI:
10.1016/j.scico.2023.103047
Author(s):
Ángel Longueira-Romero
Rosa Iglesias
Jose Luis Flores
Iñaki Garitano
Published in:
MDPI, 2022, ISSN 1424-8220
Publisher:
Multidisciplinary Digital Publishing Institute (MDPI)
DOI:
10.3390/s22062126
Author(s):
Gul Jabeen, Sabit Rahim, Wasif Afzal, Dawar Khan, Aftab Ahmed Khan, Zahid Hussain, Tehmina Bibi
Published in:
Applied Intelligence, Issue 0924669X, 2022, ISSN 0924-669X
Publisher:
Kluwer Academic Publishers
DOI:
10.1007/s10489-022-03350-5
Author(s):
Andrey Sadovykh,Dragos Truscan,Wissam Mallouli,Ana Rosa Cavalli,Cristina Seceleanu,Alessandra Bagnato
Published in:
2023, ISBN 978-3-031-42212-6
Publisher:
Springer Cham
DOI:
10.1007/978-3-031-42212-6
Author(s):
Gunnar Widforss, Olga Hendel
Published in:
EARMA Digital Conference 2021, Issue EARMA 2021, 2021
Publisher:
EARMA
Searching for OpenAIRE data...
There was an error trying to search data from OpenAIRE
No results available