Skip to main content
Ir a la página de inicio de la Comisión Europea (se abrirá en una nueva ventana)
español español
CORDIS - Resultados de investigaciones de la UE
CORDIS

VeriDevOps

CORDIS proporciona enlaces a los documentos públicos y las publicaciones de los proyectos de los programas marco HORIZONTE.

Los enlaces a los documentos y las publicaciones de los proyectos del Séptimo Programa Marco, así como los enlaces a algunos tipos de resultados específicos, como conjuntos de datos y «software», se obtienen dinámicamente de OpenAIRE .

Resultado final

Reactive protection at operations (se abrirá en una nueva ventana)

Description of the reactive protection methodology in VeriDevOps including different modules and resilience catalogue

VeriDevOps Framework - initial version (se abrirá en una nueva ventana)

Global public release of the VeriDevOps framework.

Patterns catalogue (se abrirá en una nueva ventana)

The project will deliver a catalogue of patterns for formal specification of security properties

Tools and language support for prevention at design level - final version (se abrirá en una nueva ventana)

This deliverable provides the final version of the technologies for prevention at design level, after the technologies developed in the initial version (D4.1) have been evaluated against the case studies. In addition, based on the feedback collected from the case studies, the deliverable will propose a domain specific language that will make the approach easy to adopt and use by domain experts.

Specification verification tool set - initial version (se abrirá en una nueva ventana)

The set of tools for checking errors, omissions and inconsistencies in a set of security requirements specified formally.

Requirements patterns matching tool chain (se abrirá en una nueva ventana)

The pattern matching tool chain will map the security requirements to patterns of security formal properties.

Tools for active prevention during development - Initial version (se abrirá en una nueva ventana)

The deliverable will report on technologies for test generation from formal specifications The main focus in this deliverable will be in technologies for verifying that the implementation satisfies the security properties specified in the design phase In addition it will report on the tools for measuring the quality of the tests at specification andcode level

Tools for prevention at design level - initial version (se abrirá en una nueva ventana)

Initial methods and tool chain for creating secure-by-design specifications. The deliverable will provide approaches to create the system design from case study requirements, including possible model transformations from non-formal specifications to formal ones, and for verifying the design against the security properties defined in WP2.

Methodology and tools for vulnerability localization, classification and prevention recommendations - final version (se abrirá en una nueva ventana)

Final description of the methodology and tool chain for the localization and classification of the vulnerabilities. The methodology is complemented by a catalogue of prevention measures based according to the type of vulnerability identified.

Tools for prevention during development - final version (se abrirá en una nueva ventana)

The deliverable will provide technologies for prevention during development, by providing updates to the technologies in D4.2 based on the feedback received from the case study evaluation. The deliverable will also report on technologies for detection of unknown vulnerabilities in implementation detected via mutation and fuzz testing. In addition, it will provide technologies that combine automated test generation and regression testing and their integration in CI pipelines.

Threat oracle engine specification, design and implementation final version (se abrirá en una nueva ventana)

Final design and last prototype of the threat oracle engine allowing the scanning and classification of vulnerabilities at runtime

Requirements automated generation tool chain (se abrirá en una nueva ventana)

This tool chain will combine the tools for extraction labeling training and classification of security requirements

VeriDevOps Framework - final version (se abrirá en una nueva ventana)

Final cut-off for the public release of the VeriDevOps framework.

Threat oracle engine specification, design and implementation initial version (se abrirá en una nueva ventana)

Initial design and first prototype of the threat oracle engine allowing the scanning and classification of vulnerabilities at runtime

Specification verification tool set (se abrirá en una nueva ventana)

Final version of D2.5

Methodology and tools for vulnerability localization, classification and prevention recommendations - initial version (se abrirá en una nueva ventana)

Initial description of the methodology and tool chain for the localization and classification of the vulnerabilities. The methodology is complemented by a catalogue of prevention measures based according to the type of vulnerability identified.

Security monitoring - security flaws detection mechanisms and tools initial version (se abrirá en una nueva ventana)

Initial design and first prototype of the security monitoring solutions including rulebased detection mechanisms and AIbased anomaly detection mechanisms

Security monitoring - security flaws detection mechanisms and tools final version (se abrirá en una nueva ventana)

Final design and last prototype of the security monitoring solutions including rule-based detection mechanisms and AI-based anomaly detection mechanisms.

Specification of security formal models (se abrirá en una nueva ventana)

The report defines the specifications of the formalism to be used for formal specification of security properties We will investigate mainly timed automata and TCTL but we will adapt and extend them to serve the needs of the project

Report on the architecture and implementation evaluation - initial version (se abrirá en una nueva ventana)

Evaluation of the software stacks components as well as of the VeriDevOps framework as a whole The deliverable is provided in two iterations the initial and refined The latter will also explore the integration of all components included in the architecture

Mitigation for vulnerabilities (se abrirá en una nueva ventana)

recommendations and tools to suggest as countermeasures for identified vulnerabilities

Report on evaluation of case studies - final version (se abrirá en una nueva ventana)

Final version of D5.5

State-of the Art Report (se abrirá en una nueva ventana)

This deliverable will update the stateofthe art wrt to new approaches and technologies that appeared since the project proposal was submitted

Report on the architecture and implementation evaluation - final version (se abrirá en una nueva ventana)

Final version of D5.1

Specification of patterns for security requirements (se abrirá en una nueva ventana)

Based on the body of knowledge for requirements patterns this deliverable will elaborate specifics of the patterns for security formal properties patterns

Report on evaluation of case studies - initial version (se abrirá en una nueva ventana)

Description of the implementation progress for all use cases (FAG and ABB). The report also evaluates the implementation of base components, which are provided by WP2, WP3, and WP4, from the perspective of the use cases. Furthermore, the report contains descriptions of the feature set of all use cases and potential problems.

Attack response - Root cause analysis and countermeasures initial version (se abrirá en una nueva ventana)

Initial design and implementation of the tool for root cause analysis and counter-measures recommendations

VeriDevOps Framework Architecture and Roadmap (se abrirá en una nueva ventana)

This report will define the initial vision of global architecture of the VeriDevOps tool sets tool chains interfaes and engineering artifacts The document will be accompanied with a roadmap for technology development The architecture and roadmap will be revised throughout the project duration at public release milestones

Attack response - Root cause analysis and countermeasures final version (se abrirá en una nueva ventana)

Final design and implementation of the tool for root cause analysis and counter-measures recommendations.

VeriDevOps Methodology (se abrirá en una nueva ventana)

The methodology will guide users for applying the security requirements automated generation and protection and prevention activities driven by formal specifications.

Dissemination and Communication plan (se abrirá en una nueva ventana)

This deliverable will include the plans for scientific dissemination, communication, collaboration and standardization. It will set up the methodology to follow, the instruments and mechanisms will be used for making the project awareness, the collaboration policy with other projects and related stakeholders and interested groups.It will identify the KPIs for assessing the progress and impact in the due formal reports. List of potential events, conferences, interest groups, open source communities, online press, journals, social networks, etc must be included. The plan will be assessed at the end of each reporting period and will be updated if needed.

Publicaciones

EARLY: A Tool for Real-Time Security Attack Detection

Autores: Tanwir Ahmad, Dragos Truscan, Jüri Vain
Publicado en: CyberSecurity in a DevOps Environment From Requirements to Monitoring, 2023, Página(s) Pages 225-251, ISBN 978-3-031-42212-6
Editor: Springer Cham

Toward Anomaly Detection Using Explainable AI

Autores: Manh-Dung Nguyen, Vinh-Hoa La, Wissam Mallouli, Ana Rosa Cavalli, Edgardo Montes de Oca
Publicado en: CyberSecurity in a DevOps Environment From Requirements to Monitoring, 2023, Página(s) Pages 293-324, ISBN 978-3-031-42212-6
Editor: Springer Cham

Vulnerability Detection and Response: Current Status and New Approaches

Autores: Ángel Longueira-Romero, Rosa Iglesias, Jose Luis Flores, Iñaki Garitano
Publicado en: CyberSecurity in a DevOps Environment From Requirements to Monitoring, 2023, Página(s) Pages 95-125, ISBN 978-3-031-42214-0
Editor: Springer Cham

Metamorphic Testing for Verification and Fault Localization in Industrial Control Systems

Autores: Gaadha Sudheerbabu, Tanwir Ahmad, Dragos Truscan, Jüri Vain
Publicado en: CyberSecurity in a DevOps Environment From Requirements to Monitoring, 2023, Página(s) 127-159, ISBN 978-3-031-42212-6
Editor: Springer Cham

Security Requirements Formalization with RQCODE

Autores: Andrey Sadovykh, Nan Messe, Ildar Nigmatullin, Sophie Ebersold, Maria Naumcheva, Jean-Michel Bruel
Publicado en: CyberSecurity in a DevOps Environment From Requirements to Monitoring, 2023, Página(s) 65-92
Editor: Springer Cham

A Taxonomy of Vulnerabilities, Attacks, and Security Solutions in Industrial PLCs

Autores: Eduard Paul Enoiu, Kejsi Biçoku, Cristina Seceleanu, Michael Felderer
Publicado en: CyberSecurity in a DevOps Environment From Requirements to Monitoring, 2023, ISBN 978-3-031-42214-0
Editor: Springer Cham

Ctam: A Tool for Continuous Threat Analysis and Management

Autores: Laurens Sion, Dimitri Van Landuyt, Koen Yskout, Stef Verreydt, Wouter Joosen
Publicado en: CyberSecurity in a DevOps Environment From Requirements to Monitoring, 2023, Página(s) Pages 195-223, ISBN 978-3-031-42212-6
Editor: Springer Cham

A Stream-Based Approach to Intrusion Detection

Autores: Sylvain Hallé
Publicado en: CyberSecurity in a DevOps Environment From Requirements to Monitoring, 2023, Página(s) Pages 253-291, ISBN 978-3-031-42212-6
Editor: Springer Cham

Natural Language Processing with Machine Learning for Security Requirements Analysis: Practical Approaches

Autores: Andrey Sadovykh, Kirill Yakovlev, Alexandr Naumchev, Vladimir Ivanov
Publicado en: CyberSecurity in a DevOps Environment From Requirements to Monitoring, 2023, Página(s) 35-63, ISBN 978-3-031-42214-0
Editor: Springer Cham

nteractive Application Security Testing with Hybrid Fuzzing and Statistical Estimators

Autores: Ramon Barakat, Jasper von Blanckenburg, Roman Kraus, Fabian Jezuita, Steffen Lüdtke, Martin A. Schneider
Publicado en: CyberSecurity in a DevOps Environment From Requirements to Monitoring, 2023, Página(s) Pages 161-191, ISBN 978-3-031-42212-6
Editor: Springer Cham

Early Detection of Network Attacks Using Deep Learning

Autores: Tanwir Ahmad, Dragos Truscan, Juri Vain, Ivan Porres
Publicado en: 2022
Editor: IEEE

Message from the ITEQS 2022 Workshop Chairs (se abrirá en una nueva ventana)

Autores: Mehrdad Saadatmand, Dragos Truscan, Eduard Paul Enoiu
Publicado en: 2022 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW), 2022
Editor: IEEE
DOI: 10.1109/icstw55395.2022.00006

Message from ITEQS 2023 Workshop Chairs (se abrirá en una nueva ventana)

Autores: Mehrdad Saadatmand,Dragos Truscan,Eduard Enoiu
Publicado en: 2023 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW), 2023
Editor: IEEE
DOI: 10.1109/icstw58534.2023.00011

Towards Human-Like Automated Test Generation: Perspectives from Cognition and Problem Solving

Autores: Eduard Paul Enoiu and Robert Feldt
Publicado en: International Conference on Cooperative and Human Aspects of Software Engineering 2021, Edición International Conference on Cooperative and Human Aspects of Software Engineering 2021, 2021
Editor: IEEE

A Two-phase Metamorphic Approach for Testing Industrial Control Systems (se abrirá en una nueva ventana)

Autores: Gaadha Sudheerbabu, Tanwir Ahmad, Filip Sebek, Dragos Truscan, Jüri Vain, and Ivan Porres
Publicado en: 2022
Editor: IEEE
DOI: 10.48550/arxiv.2208.09261

Human-based Test Design versus Automated Test Generation: A Literature Review and Meta-Analysis (se abrirá en una nueva ventana)

Autores: Ted Kurmaku, Eduard Paul Enoiu, Musa Kumrija
Publicado en: 15th Innovations in Software Engineering Conference ISEC 2022, Edición ISEC 2022, 2022
Editor: ACM
DOI: 10.1145/3511430.3511433

Preliminary Results in Using Attention for Increasing Attack Identification Efficiency (se abrirá en una nueva ventana)

Autores: Tanwir Ahmad, Dragos Truscan
Publicado en: 16th IEEE International Conference on Software Testing, Verification and Validation (ICST) 2023, 2023
Editor: IEEE
DOI: 10.1109/icstw58534.2023.00038

Specification of Passive Test Cases using anImproved T-EARS Language (se abrirá en una nueva ventana)

Autores: Daniel Flemström, Wasif Afzal, Eduard Paul Enoiu
Publicado en: Software Quality Days, Edición SQD 2022, 2021, ISBN 978-3-031-04115-0
Editor: Springer
DOI: 10.1007/978-3-031-04115-0_5

Security Testing and Resilience (se abrirá en una nueva ventana)

Autores: Ana Rosa Cavalli
Publicado en: 2021
Editor: IEEE
DOI: 10.1109/icstw52544.2021.00031

Security Requirements as Code: Example from VeriDevOps Project (se abrirá en una nueva ventana)

Autores: Khaled Ismaeel, Alexandr Naumchev, Andrey Sadovykh, Dragos Truscan, Eduard Paul Enoiu, Cristina Seceleanu
Publicado en: 2021 IEEE 29th International Requirements Engineering Conference Workshops (, 2021
Editor: IEEE
DOI: 10.1109/rew53955.2021.9714713

Security Requirements as Code:Example from VeriDevOps Project (se abrirá en una nueva ventana)

Autores: Vasily Varenov, Aydar Gabdrahmanov
Publicado en: 2021
Editor: IEEE
DOI: 10.1109/rew53955.2021.00063

PyLC: A Framework for Transforming and Validating PLC Software using Python and Pynguin Test Generator (se abrirá en una nueva ventana)

Autores: Mikael Ebrahimi Salari, Eduard Paul Enoiu, Wasif Afzal, Cristina Seceleanu
Publicado en: The 38th ACM/SIGAPP Symposium On Applied Computing SAC23, 2023
Editor: Association for Computing Machinery
DOI: 10.1145/3555776.3577698

A Model-Based Test Script Generation Framework for Embedded Software

Autores: Muhammad Nouman Zafar, Wasif Afzal, Eduard Paul Enoiu, Athanasios Stratis , Ola Sellin
Publicado en: The 17th Workshop on Advances in Model Based Testing, Edición A-MOST 2021, 2021
Editor: IEEE

VeriDevOps Software Methodology: Security Verification and Validation for DevOps Practices (se abrirá en una nueva ventana)

Autores: Eduard Paul Enoiu; Dragos Truscan; Andrey Sadovykh; Wissam Mallouli
Publicado en: The 18th International Conference on Availability, Reliability and Security (ARES 2023), 2023
Editor: ACM
DOI: 10.1145/3600160.3605054

Message from the ITEQS 2021 Workshop Chairs (se abrirá en una nueva ventana)

Autores: Saadatmand, M., Truscan, D. and Enoiu, E
Publicado en: 2021 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW), Edición ITEQS2021 workshop, 2021, Página(s) xii-xii
Editor: IEEE
DOI: 10.1109/icstw52544.2021.00007

VeriDevOps: Automated Protection and Prevention to Meet Security Requirements in DevOps (se abrirá en una nueva ventana)

Autores: Andrey Sadovykh; Gunnar Widforss; Dragos Truscan; Eduard Paul Enoiu; Wissam Mallouli; Rosa Iglesias; Alessandra Bagnto; Olga Hendel
Publicado en: Design, Automation and Test in Europe Conference DATE 2021, 2021, Página(s) p. 1330-1333
Editor: IEEE
DOI: 10.23919/date51398.2021.9474185

NLP-based Testing and Monitoring for Security Checking (Project Report)

Autores: Andrey Sadovykh, Zujany Salazar, Wissam Mallouli, Ana Rosa Cavalli, Dragos Truscan, Eduard Paul Enoiu, Rosa Iglesias and Olga Hendel
Publicado en: 2021
Editor: IFIP/Springer

A Framework for the Attack Tolerance of Cloud Applications Based on Web Services (se abrirá en una nueva ventana)

Autores: Georges Ouffoue,Fatiha Zaidi,Fatiha Zaidi,Ana Rosa Cavalli,Huu Nghia Nguyen
Publicado en: 2020
Editor: Electronics
DOI: 10.3390/electronics10010006

Towards a Workflow for Model-Based Testing of Embedded Systems (se abrirá en una nueva ventana)

Autores: Muhammad Nouman Zafar, Wasif Afzal, Eduard Paul Enoiu
Publicado en: International Workshop on Automating TEST Case Design, Selection, and Evaluation, Edición A-TEST 2021, 2021
Editor: ACM
DOI: 10.1145/3472672.3473956

Message from A-MOST 2023 Workshop Chairs (se abrirá en una nueva ventana)

Autores: Florian Lorber,Cristina Seceleanu,Uraz Cengiz Turker
Publicado en: 16th IEEE International Conference on Software Testing, Verification and Validation Workshops, ICSTW 2023, 2023
Editor: IEEE
DOI: 10.1109/icstw58534.2023.00005

Monitoring Approaches for Security and Safety Analysis: Application to a Load Position System (se abrirá en una nueva ventana)

Autores: Zujany Salazar, Ana Rosa Cavalli, Wissam Mallouli, Filip Sebek, Fatiha Zaidi, Monika Ewa Rakoczy
Publicado en: 2022
Editor: IEEE
DOI: 10.1109/icstw55395.2022.00021

Ethical AI-Powered Regression Test Selection (se abrirá en una nueva ventana)

Autores: Per Erik Strandberg, Mirgita Frasheri , Eduard Paul Enoiu
Publicado en: International Conference On Artificial Intelligence Testing, Edición AITEST 2021, 2021
Editor: IEEE
DOI: 10.1109/aitest52744.2021.00025

Industrial Scale Passive Testing with T-EARS (se abrirá en una nueva ventana)

Autores: Daniel Flemström, Henrik Jonsson, Eduard Paul Enoiu, Wasif Afzal
Publicado en: IEEE Conference on Software Testing, Validation and Verification 2021, Edición ICST 2021, 2021
Editor: IEEE
DOI: 10.1109/icst49551.2021.00047

Choosing a Test Automation Framework for Programmable Logic Controllers in CODESYS Development Environment (se abrirá en una nueva ventana)

Autores: Mikael Salari, Eduard Enoiu, Wasif Afzal, Cristina Seceleanu
Publicado en: 14th IEEE International Conference on Software Testing, Verification and Validation Workshops, ICSTW, 2022
Editor: Institute of Electrical and Electronics Engineers Inc
DOI: 10.1109/icstw55395.2022.00055

Applying Model-based Requirements Engineering in Three Large European Collaborative Projects: An Experience Report (se abrirá en una nueva ventana)

Autores: Andrey Sadovykh, Dragos Truscan, Hugo Bruneliere
Publicado en: 2021
Editor: IEEE
DOI: 10.1109/re51729.2021.00040

Application de l'Ingénierie des Exigences basée sur les Modèles dans Trois Grands Projets Collaboratifs Européens : Un Rapport d'Expérience

Autores: Andrey Sadovykh, Hugo Bruneliere, Dragos Truscan
Publicado en: INFORSID 2022 - 40ème Congrès INFormatique des ORganisations et Systèmes d'Information et de Décision, 2022
Editor: HAL

An iterative approach for model-based requirements engineering in large collaborative projects: A detailed experience report (se abrirá en una nueva ventana)

Autores: Andrey Sadovykh, Bilal Said, Dragos Truscan, Hugo Bruneliere
Publicado en: Science of Computer Programming, 2024, ISSN 0167-6423
Editor: Elsevier BV
DOI: 10.1016/j.scico.2023.103047

A Novel Model for Vulnerability Analysis through Enhanced Directed Graphs and Quantitative Metrics (se abrirá en una nueva ventana)

Autores: Ángel Longueira-Romero Rosa Iglesias Jose Luis Flores Iñaki Garitano
Publicado en: MDPI, 2022, ISSN 1424-8220
Editor: Multidisciplinary Digital Publishing Institute (MDPI)
DOI: 10.3390/s22062126

Machine Learning Techniques for Software Vulnerability Prediction: A comparative study (se abrirá en una nueva ventana)

Autores: Gul Jabeen, Sabit Rahim, Wasif Afzal, Dawar Khan, Aftab Ahmed Khan, Zahid Hussain, Tehmina Bibi
Publicado en: Applied Intelligence, Edición 0924669X, 2022, ISSN 0924-669X
Editor: Kluwer Academic Publishers
DOI: 10.1007/s10489-022-03350-5

CyberSecurity in a DevOps Environment From Requirements to Monitoring (se abrirá en una nueva ventana)

Autores: Andrey Sadovykh,Dragos Truscan,Wissam Mallouli,Ana Rosa Cavalli,Cristina Seceleanu,Alessandra Bagnato
Publicado en: 2023, ISBN 978-3-031-42212-6
Editor: Springer Cham
DOI: 10.1007/978-3-031-42212-6

Project Management in collaborative European research projects: analysis of H2020 VeriDevOps Management structure

Autores: Gunnar Widforss, Olga Hendel
Publicado en: EARMA Digital Conference 2021, Edición EARMA 2021, 2021
Editor: EARMA

Buscando datos de OpenAIRE...

Se ha producido un error en la búsqueda de datos de OpenAIRE

No hay resultados disponibles

Mi folleto 0 0