CORDIS bietet Links zu öffentlichen Ergebnissen und Veröffentlichungen von HORIZONT-Projekten.
Links zu Ergebnissen und Veröffentlichungen von RP7-Projekten sowie Links zu einigen Typen spezifischer Ergebnisse wie Datensätzen und Software werden dynamisch von OpenAIRE abgerufen.
Leistungen
Description of the reactive protection methodology in VeriDevOps including different modules and resilience catalogue
VeriDevOps Framework - initial version (öffnet in neuem Fenster)Global public release of the VeriDevOps framework.
Patterns catalogue (öffnet in neuem Fenster)The project will deliver a catalogue of patterns for formal specification of security properties
Tools and language support for prevention at design level - final version (öffnet in neuem Fenster)This deliverable provides the final version of the technologies for prevention at design level, after the technologies developed in the initial version (D4.1) have been evaluated against the case studies. In addition, based on the feedback collected from the case studies, the deliverable will propose a domain specific language that will make the approach easy to adopt and use by domain experts.
Specification verification tool set - initial version (öffnet in neuem Fenster)The set of tools for checking errors, omissions and inconsistencies in a set of security requirements specified formally.
Requirements patterns matching tool chain (öffnet in neuem Fenster)The pattern matching tool chain will map the security requirements to patterns of security formal properties.
Tools for active prevention during development - Initial version (öffnet in neuem Fenster)The deliverable will report on technologies for test generation from formal specifications The main focus in this deliverable will be in technologies for verifying that the implementation satisfies the security properties specified in the design phase In addition it will report on the tools for measuring the quality of the tests at specification andcode level
Tools for prevention at design level - initial version (öffnet in neuem Fenster)Initial methods and tool chain for creating secure-by-design specifications. The deliverable will provide approaches to create the system design from case study requirements, including possible model transformations from non-formal specifications to formal ones, and for verifying the design against the security properties defined in WP2.
Methodology and tools for vulnerability localization, classification and prevention recommendations - final version (öffnet in neuem Fenster)Final description of the methodology and tool chain for the localization and classification of the vulnerabilities. The methodology is complemented by a catalogue of prevention measures based according to the type of vulnerability identified.
Tools for prevention during development - final version (öffnet in neuem Fenster)The deliverable will provide technologies for prevention during development, by providing updates to the technologies in D4.2 based on the feedback received from the case study evaluation. The deliverable will also report on technologies for detection of unknown vulnerabilities in implementation detected via mutation and fuzz testing. In addition, it will provide technologies that combine automated test generation and regression testing and their integration in CI pipelines.
Threat oracle engine specification, design and implementation final version (öffnet in neuem Fenster)Final design and last prototype of the threat oracle engine allowing the scanning and classification of vulnerabilities at runtime
Requirements automated generation tool chain (öffnet in neuem Fenster)This tool chain will combine the tools for extraction labeling training and classification of security requirements
VeriDevOps Framework - final version (öffnet in neuem Fenster)Final cut-off for the public release of the VeriDevOps framework.
Threat oracle engine specification, design and implementation initial version (öffnet in neuem Fenster)Initial design and first prototype of the threat oracle engine allowing the scanning and classification of vulnerabilities at runtime
Specification verification tool set (öffnet in neuem Fenster)Final version of D2.5
Methodology and tools for vulnerability localization, classification and prevention recommendations - initial version (öffnet in neuem Fenster)Initial description of the methodology and tool chain for the localization and classification of the vulnerabilities. The methodology is complemented by a catalogue of prevention measures based according to the type of vulnerability identified.
Security monitoring - security flaws detection mechanisms and tools initial version (öffnet in neuem Fenster)Initial design and first prototype of the security monitoring solutions including rulebased detection mechanisms and AIbased anomaly detection mechanisms
Security monitoring - security flaws detection mechanisms and tools final version (öffnet in neuem Fenster)Final design and last prototype of the security monitoring solutions including rule-based detection mechanisms and AI-based anomaly detection mechanisms.
The report defines the specifications of the formalism to be used for formal specification of security properties We will investigate mainly timed automata and TCTL but we will adapt and extend them to serve the needs of the project
Report on the architecture and implementation evaluation - initial version (öffnet in neuem Fenster)Evaluation of the software stacks components as well as of the VeriDevOps framework as a whole The deliverable is provided in two iterations the initial and refined The latter will also explore the integration of all components included in the architecture
Mitigation for vulnerabilities (öffnet in neuem Fenster)recommendations and tools to suggest as countermeasures for identified vulnerabilities
Report on evaluation of case studies - final version (öffnet in neuem Fenster)Final version of D5.5
State-of the Art Report (öffnet in neuem Fenster)This deliverable will update the stateofthe art wrt to new approaches and technologies that appeared since the project proposal was submitted
Report on the architecture and implementation evaluation - final version (öffnet in neuem Fenster)Final version of D5.1
Specification of patterns for security requirements (öffnet in neuem Fenster)Based on the body of knowledge for requirements patterns this deliverable will elaborate specifics of the patterns for security formal properties patterns
Report on evaluation of case studies - initial version (öffnet in neuem Fenster)Description of the implementation progress for all use cases (FAG and ABB). The report also evaluates the implementation of base components, which are provided by WP2, WP3, and WP4, from the perspective of the use cases. Furthermore, the report contains descriptions of the feature set of all use cases and potential problems.
Attack response - Root cause analysis and countermeasures initial version (öffnet in neuem Fenster)Initial design and implementation of the tool for root cause analysis and counter-measures recommendations
VeriDevOps Framework Architecture and Roadmap (öffnet in neuem Fenster)This report will define the initial vision of global architecture of the VeriDevOps tool sets tool chains interfaes and engineering artifacts The document will be accompanied with a roadmap for technology development The architecture and roadmap will be revised throughout the project duration at public release milestones
Attack response - Root cause analysis and countermeasures final version (öffnet in neuem Fenster)Final design and implementation of the tool for root cause analysis and counter-measures recommendations.
VeriDevOps Methodology (öffnet in neuem Fenster)The methodology will guide users for applying the security requirements automated generation and protection and prevention activities driven by formal specifications.
Dissemination and Communication plan (öffnet in neuem Fenster)This deliverable will include the plans for scientific dissemination, communication, collaboration and standardization. It will set up the methodology to follow, the instruments and mechanisms will be used for making the project awareness, the collaboration policy with other projects and related stakeholders and interested groups.It will identify the KPIs for assessing the progress and impact in the due formal reports. List of potential events, conferences, interest groups, open source communities, online press, journals, social networks, etc must be included. The plan will be assessed at the end of each reporting period and will be updated if needed.
Veröffentlichungen
Autoren:
Tanwir Ahmad, Dragos Truscan, Jüri Vain
Veröffentlicht in:
CyberSecurity in a DevOps Environment From Requirements to Monitoring, 2023, Seite(n) Pages 225-251, ISBN 978-3-031-42212-6
Herausgeber:
Springer Cham
Autoren:
Manh-Dung Nguyen, Vinh-Hoa La, Wissam Mallouli, Ana Rosa Cavalli, Edgardo Montes de Oca
Veröffentlicht in:
CyberSecurity in a DevOps Environment From Requirements to Monitoring, 2023, Seite(n) Pages 293-324, ISBN 978-3-031-42212-6
Herausgeber:
Springer Cham
Autoren:
Ángel Longueira-Romero, Rosa Iglesias, Jose Luis Flores, Iñaki Garitano
Veröffentlicht in:
CyberSecurity in a DevOps Environment From Requirements to Monitoring, 2023, Seite(n) Pages 95-125, ISBN 978-3-031-42214-0
Herausgeber:
Springer Cham
Autoren:
Gaadha Sudheerbabu, Tanwir Ahmad, Dragos Truscan, Jüri Vain
Veröffentlicht in:
CyberSecurity in a DevOps Environment From Requirements to Monitoring, 2023, Seite(n) 127-159, ISBN 978-3-031-42212-6
Herausgeber:
Springer Cham
Autoren:
Andrey Sadovykh, Nan Messe, Ildar Nigmatullin, Sophie Ebersold, Maria Naumcheva, Jean-Michel Bruel
Veröffentlicht in:
CyberSecurity in a DevOps Environment From Requirements to Monitoring, 2023, Seite(n) 65-92
Herausgeber:
Springer Cham
Autoren:
Eduard Paul Enoiu, Kejsi Biçoku, Cristina Seceleanu, Michael Felderer
Veröffentlicht in:
CyberSecurity in a DevOps Environment From Requirements to Monitoring, 2023, ISBN 978-3-031-42214-0
Herausgeber:
Springer Cham
Autoren:
Laurens Sion, Dimitri Van Landuyt, Koen Yskout, Stef Verreydt, Wouter Joosen
Veröffentlicht in:
CyberSecurity in a DevOps Environment From Requirements to Monitoring, 2023, Seite(n) Pages 195-223, ISBN 978-3-031-42212-6
Herausgeber:
Springer Cham
Autoren:
Sylvain Hallé
Veröffentlicht in:
CyberSecurity in a DevOps Environment From Requirements to Monitoring, 2023, Seite(n) Pages 253-291, ISBN 978-3-031-42212-6
Herausgeber:
Springer Cham
Autoren:
Andrey Sadovykh, Kirill Yakovlev, Alexandr Naumchev, Vladimir Ivanov
Veröffentlicht in:
CyberSecurity in a DevOps Environment From Requirements to Monitoring, 2023, Seite(n) 35-63, ISBN 978-3-031-42214-0
Herausgeber:
Springer Cham
Autoren:
Ramon Barakat, Jasper von Blanckenburg, Roman Kraus, Fabian Jezuita, Steffen Lüdtke, Martin A. Schneider
Veröffentlicht in:
CyberSecurity in a DevOps Environment From Requirements to Monitoring, 2023, Seite(n) Pages 161-191, ISBN 978-3-031-42212-6
Herausgeber:
Springer Cham
Autoren:
Tanwir Ahmad, Dragos Truscan, Juri Vain, Ivan Porres
Veröffentlicht in:
2022
Herausgeber:
IEEE
Autoren:
Mehrdad Saadatmand, Dragos Truscan, Eduard Paul Enoiu
Veröffentlicht in:
2022 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW), 2022
Herausgeber:
IEEE
DOI:
10.1109/icstw55395.2022.00006
Autoren:
Mehrdad Saadatmand,Dragos Truscan,Eduard Enoiu
Veröffentlicht in:
2023 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW), 2023
Herausgeber:
IEEE
DOI:
10.1109/icstw58534.2023.00011
Autoren:
Eduard Paul Enoiu and Robert Feldt
Veröffentlicht in:
International Conference on Cooperative and Human Aspects of Software Engineering 2021, Ausgabe International Conference on Cooperative and Human Aspects of Software Engineering 2021, 2021
Herausgeber:
IEEE
Autoren:
Gaadha Sudheerbabu, Tanwir Ahmad, Filip Sebek, Dragos Truscan, Jüri Vain, and Ivan Porres
Veröffentlicht in:
2022
Herausgeber:
IEEE
DOI:
10.48550/arxiv.2208.09261
Autoren:
Ted Kurmaku, Eduard Paul Enoiu, Musa Kumrija
Veröffentlicht in:
15th Innovations in Software Engineering Conference ISEC 2022, Ausgabe ISEC 2022, 2022
Herausgeber:
ACM
DOI:
10.1145/3511430.3511433
Autoren:
Tanwir Ahmad, Dragos Truscan
Veröffentlicht in:
16th IEEE International Conference on Software Testing, Verification and Validation (ICST) 2023, 2023
Herausgeber:
IEEE
DOI:
10.1109/icstw58534.2023.00038
Autoren:
Daniel Flemström, Wasif Afzal, Eduard Paul Enoiu
Veröffentlicht in:
Software Quality Days, Ausgabe SQD 2022, 2021, ISBN 978-3-031-04115-0
Herausgeber:
Springer
DOI:
10.1007/978-3-031-04115-0_5
Autoren:
Ana Rosa Cavalli
Veröffentlicht in:
2021
Herausgeber:
IEEE
DOI:
10.1109/icstw52544.2021.00031
Autoren:
Khaled Ismaeel, Alexandr Naumchev, Andrey Sadovykh, Dragos Truscan, Eduard Paul Enoiu, Cristina Seceleanu
Veröffentlicht in:
2021 IEEE 29th International Requirements Engineering Conference Workshops (, 2021
Herausgeber:
IEEE
DOI:
10.1109/rew53955.2021.9714713
Autoren:
Vasily Varenov, Aydar Gabdrahmanov
Veröffentlicht in:
2021
Herausgeber:
IEEE
DOI:
10.1109/rew53955.2021.00063
Autoren:
Mikael Ebrahimi Salari, Eduard Paul Enoiu, Wasif Afzal, Cristina Seceleanu
Veröffentlicht in:
The 38th ACM/SIGAPP Symposium On Applied Computing SAC23, 2023
Herausgeber:
Association for Computing Machinery
DOI:
10.1145/3555776.3577698
Autoren:
Muhammad Nouman Zafar, Wasif Afzal, Eduard Paul Enoiu, Athanasios Stratis , Ola Sellin
Veröffentlicht in:
The 17th Workshop on Advances in Model Based Testing, Ausgabe A-MOST 2021, 2021
Herausgeber:
IEEE
Autoren:
Eduard Paul Enoiu; Dragos Truscan; Andrey Sadovykh; Wissam Mallouli
Veröffentlicht in:
The 18th International Conference on Availability, Reliability and Security (ARES 2023), 2023
Herausgeber:
ACM
DOI:
10.1145/3600160.3605054
Autoren:
Saadatmand, M., Truscan, D. and Enoiu, E
Veröffentlicht in:
2021 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW), Ausgabe ITEQS2021 workshop, 2021, Seite(n) xii-xii
Herausgeber:
IEEE
DOI:
10.1109/icstw52544.2021.00007
Autoren:
Andrey Sadovykh; Gunnar Widforss; Dragos Truscan; Eduard Paul Enoiu; Wissam Mallouli; Rosa Iglesias; Alessandra Bagnto; Olga Hendel
Veröffentlicht in:
Design, Automation and Test in Europe Conference DATE 2021, 2021, Seite(n) p. 1330-1333
Herausgeber:
IEEE
DOI:
10.23919/date51398.2021.9474185
Autoren:
Andrey Sadovykh, Zujany Salazar, Wissam Mallouli, Ana Rosa Cavalli, Dragos Truscan, Eduard Paul Enoiu, Rosa Iglesias and Olga Hendel
Veröffentlicht in:
2021
Herausgeber:
IFIP/Springer
Autoren:
Georges Ouffoue,Fatiha Zaidi,Fatiha Zaidi,Ana Rosa Cavalli,Huu Nghia Nguyen
Veröffentlicht in:
2020
Herausgeber:
Electronics
DOI:
10.3390/electronics10010006
Autoren:
Muhammad Nouman Zafar, Wasif Afzal, Eduard Paul Enoiu
Veröffentlicht in:
International Workshop on Automating TEST Case Design, Selection, and Evaluation, Ausgabe A-TEST 2021, 2021
Herausgeber:
ACM
DOI:
10.1145/3472672.3473956
Autoren:
Florian Lorber,Cristina Seceleanu,Uraz Cengiz Turker
Veröffentlicht in:
16th IEEE International Conference on Software Testing, Verification and Validation Workshops, ICSTW 2023, 2023
Herausgeber:
IEEE
DOI:
10.1109/icstw58534.2023.00005
Autoren:
Zujany Salazar, Ana Rosa Cavalli, Wissam Mallouli, Filip Sebek, Fatiha Zaidi, Monika Ewa Rakoczy
Veröffentlicht in:
2022
Herausgeber:
IEEE
DOI:
10.1109/icstw55395.2022.00021
Autoren:
Per Erik Strandberg, Mirgita Frasheri , Eduard Paul Enoiu
Veröffentlicht in:
International Conference On Artificial Intelligence Testing, Ausgabe AITEST 2021, 2021
Herausgeber:
IEEE
DOI:
10.1109/aitest52744.2021.00025
Autoren:
Daniel Flemström, Henrik Jonsson, Eduard Paul Enoiu, Wasif Afzal
Veröffentlicht in:
IEEE Conference on Software Testing, Validation and Verification 2021, Ausgabe ICST 2021, 2021
Herausgeber:
IEEE
DOI:
10.1109/icst49551.2021.00047
Autoren:
Mikael Salari, Eduard Enoiu, Wasif Afzal, Cristina Seceleanu
Veröffentlicht in:
14th IEEE International Conference on Software Testing, Verification and Validation Workshops, ICSTW, 2022
Herausgeber:
Institute of Electrical and Electronics Engineers Inc
DOI:
10.1109/icstw55395.2022.00055
Autoren:
Andrey Sadovykh, Dragos Truscan, Hugo Bruneliere
Veröffentlicht in:
2021
Herausgeber:
IEEE
DOI:
10.1109/re51729.2021.00040
Autoren:
Andrey Sadovykh, Hugo Bruneliere, Dragos Truscan
Veröffentlicht in:
INFORSID 2022 - 40ème Congrès INFormatique des ORganisations et Systèmes d'Information et de Décision, 2022
Herausgeber:
HAL
Autoren:
Andrey Sadovykh, Bilal Said, Dragos Truscan, Hugo Bruneliere
Veröffentlicht in:
Science of Computer Programming, 2024, ISSN 0167-6423
Herausgeber:
Elsevier BV
DOI:
10.1016/j.scico.2023.103047
Autoren:
Ángel Longueira-Romero
Rosa Iglesias
Jose Luis Flores
Iñaki Garitano
Veröffentlicht in:
MDPI, 2022, ISSN 1424-8220
Herausgeber:
Multidisciplinary Digital Publishing Institute (MDPI)
DOI:
10.3390/s22062126
Autoren:
Gul Jabeen, Sabit Rahim, Wasif Afzal, Dawar Khan, Aftab Ahmed Khan, Zahid Hussain, Tehmina Bibi
Veröffentlicht in:
Applied Intelligence, Ausgabe 0924669X, 2022, ISSN 0924-669X
Herausgeber:
Kluwer Academic Publishers
DOI:
10.1007/s10489-022-03350-5
Autoren:
Andrey Sadovykh,Dragos Truscan,Wissam Mallouli,Ana Rosa Cavalli,Cristina Seceleanu,Alessandra Bagnato
Veröffentlicht in:
2023, ISBN 978-3-031-42212-6
Herausgeber:
Springer Cham
DOI:
10.1007/978-3-031-42212-6
Autoren:
Gunnar Widforss, Olga Hendel
Veröffentlicht in:
EARMA Digital Conference 2021, Ausgabe EARMA 2021, 2021
Herausgeber:
EARMA
Suche nach OpenAIRE-Daten ...
Bei der Suche nach OpenAIRE-Daten ist ein Fehler aufgetreten
Es liegen keine Ergebnisse vor