Skip to main content
Vai all'homepage della Commissione europea (si apre in una nuova finestra)
italiano italiano
CORDIS - Risultati della ricerca dell’UE
CORDIS

VeriDevOps

CORDIS fornisce collegamenti ai risultati finali pubblici e alle pubblicazioni dei progetti ORIZZONTE.

I link ai risultati e alle pubblicazioni dei progetti del 7° PQ, così come i link ad alcuni tipi di risultati specifici come dataset e software, sono recuperati dinamicamente da .OpenAIRE .

Risultati finali

Reactive protection at operations (si apre in una nuova finestra)

Description of the reactive protection methodology in VeriDevOps including different modules and resilience catalogue

VeriDevOps Framework - initial version (si apre in una nuova finestra)

Global public release of the VeriDevOps framework.

Patterns catalogue (si apre in una nuova finestra)

The project will deliver a catalogue of patterns for formal specification of security properties

Tools and language support for prevention at design level - final version (si apre in una nuova finestra)

This deliverable provides the final version of the technologies for prevention at design level, after the technologies developed in the initial version (D4.1) have been evaluated against the case studies. In addition, based on the feedback collected from the case studies, the deliverable will propose a domain specific language that will make the approach easy to adopt and use by domain experts.

Specification verification tool set - initial version (si apre in una nuova finestra)

The set of tools for checking errors, omissions and inconsistencies in a set of security requirements specified formally.

Requirements patterns matching tool chain (si apre in una nuova finestra)

The pattern matching tool chain will map the security requirements to patterns of security formal properties.

Tools for active prevention during development - Initial version (si apre in una nuova finestra)

The deliverable will report on technologies for test generation from formal specifications The main focus in this deliverable will be in technologies for verifying that the implementation satisfies the security properties specified in the design phase In addition it will report on the tools for measuring the quality of the tests at specification andcode level

Tools for prevention at design level - initial version (si apre in una nuova finestra)

Initial methods and tool chain for creating secure-by-design specifications. The deliverable will provide approaches to create the system design from case study requirements, including possible model transformations from non-formal specifications to formal ones, and for verifying the design against the security properties defined in WP2.

Methodology and tools for vulnerability localization, classification and prevention recommendations - final version (si apre in una nuova finestra)

Final description of the methodology and tool chain for the localization and classification of the vulnerabilities. The methodology is complemented by a catalogue of prevention measures based according to the type of vulnerability identified.

Tools for prevention during development - final version (si apre in una nuova finestra)

The deliverable will provide technologies for prevention during development, by providing updates to the technologies in D4.2 based on the feedback received from the case study evaluation. The deliverable will also report on technologies for detection of unknown vulnerabilities in implementation detected via mutation and fuzz testing. In addition, it will provide technologies that combine automated test generation and regression testing and their integration in CI pipelines.

Threat oracle engine specification, design and implementation final version (si apre in una nuova finestra)

Final design and last prototype of the threat oracle engine allowing the scanning and classification of vulnerabilities at runtime

Requirements automated generation tool chain (si apre in una nuova finestra)

This tool chain will combine the tools for extraction labeling training and classification of security requirements

VeriDevOps Framework - final version (si apre in una nuova finestra)

Final cut-off for the public release of the VeriDevOps framework.

Threat oracle engine specification, design and implementation initial version (si apre in una nuova finestra)

Initial design and first prototype of the threat oracle engine allowing the scanning and classification of vulnerabilities at runtime

Specification verification tool set (si apre in una nuova finestra)

Final version of D2.5

Methodology and tools for vulnerability localization, classification and prevention recommendations - initial version (si apre in una nuova finestra)

Initial description of the methodology and tool chain for the localization and classification of the vulnerabilities. The methodology is complemented by a catalogue of prevention measures based according to the type of vulnerability identified.

Security monitoring - security flaws detection mechanisms and tools initial version (si apre in una nuova finestra)

Initial design and first prototype of the security monitoring solutions including rulebased detection mechanisms and AIbased anomaly detection mechanisms

Security monitoring - security flaws detection mechanisms and tools final version (si apre in una nuova finestra)

Final design and last prototype of the security monitoring solutions including rule-based detection mechanisms and AI-based anomaly detection mechanisms.

Specification of security formal models (si apre in una nuova finestra)

The report defines the specifications of the formalism to be used for formal specification of security properties We will investigate mainly timed automata and TCTL but we will adapt and extend them to serve the needs of the project

Report on the architecture and implementation evaluation - initial version (si apre in una nuova finestra)

Evaluation of the software stacks components as well as of the VeriDevOps framework as a whole The deliverable is provided in two iterations the initial and refined The latter will also explore the integration of all components included in the architecture

Mitigation for vulnerabilities (si apre in una nuova finestra)

recommendations and tools to suggest as countermeasures for identified vulnerabilities

Report on evaluation of case studies - final version (si apre in una nuova finestra)

Final version of D5.5

State-of the Art Report (si apre in una nuova finestra)

This deliverable will update the stateofthe art wrt to new approaches and technologies that appeared since the project proposal was submitted

Report on the architecture and implementation evaluation - final version (si apre in una nuova finestra)

Final version of D5.1

Specification of patterns for security requirements (si apre in una nuova finestra)

Based on the body of knowledge for requirements patterns this deliverable will elaborate specifics of the patterns for security formal properties patterns

Report on evaluation of case studies - initial version (si apre in una nuova finestra)

Description of the implementation progress for all use cases (FAG and ABB). The report also evaluates the implementation of base components, which are provided by WP2, WP3, and WP4, from the perspective of the use cases. Furthermore, the report contains descriptions of the feature set of all use cases and potential problems.

Attack response - Root cause analysis and countermeasures initial version (si apre in una nuova finestra)

Initial design and implementation of the tool for root cause analysis and counter-measures recommendations

VeriDevOps Framework Architecture and Roadmap (si apre in una nuova finestra)

This report will define the initial vision of global architecture of the VeriDevOps tool sets tool chains interfaes and engineering artifacts The document will be accompanied with a roadmap for technology development The architecture and roadmap will be revised throughout the project duration at public release milestones

Attack response - Root cause analysis and countermeasures final version (si apre in una nuova finestra)

Final design and implementation of the tool for root cause analysis and counter-measures recommendations.

VeriDevOps Methodology (si apre in una nuova finestra)

The methodology will guide users for applying the security requirements automated generation and protection and prevention activities driven by formal specifications.

Dissemination and Communication plan (si apre in una nuova finestra)

This deliverable will include the plans for scientific dissemination, communication, collaboration and standardization. It will set up the methodology to follow, the instruments and mechanisms will be used for making the project awareness, the collaboration policy with other projects and related stakeholders and interested groups.It will identify the KPIs for assessing the progress and impact in the due formal reports. List of potential events, conferences, interest groups, open source communities, online press, journals, social networks, etc must be included. The plan will be assessed at the end of each reporting period and will be updated if needed.

Pubblicazioni

EARLY: A Tool for Real-Time Security Attack Detection

Autori: Tanwir Ahmad, Dragos Truscan, Jüri Vain
Pubblicato in: CyberSecurity in a DevOps Environment From Requirements to Monitoring, 2023, Pagina/e Pages 225-251, ISBN 978-3-031-42212-6
Editore: Springer Cham

Toward Anomaly Detection Using Explainable AI

Autori: Manh-Dung Nguyen, Vinh-Hoa La, Wissam Mallouli, Ana Rosa Cavalli, Edgardo Montes de Oca
Pubblicato in: CyberSecurity in a DevOps Environment From Requirements to Monitoring, 2023, Pagina/e Pages 293-324, ISBN 978-3-031-42212-6
Editore: Springer Cham

Vulnerability Detection and Response: Current Status and New Approaches

Autori: Ángel Longueira-Romero, Rosa Iglesias, Jose Luis Flores, Iñaki Garitano
Pubblicato in: CyberSecurity in a DevOps Environment From Requirements to Monitoring, 2023, Pagina/e Pages 95-125, ISBN 978-3-031-42214-0
Editore: Springer Cham

Metamorphic Testing for Verification and Fault Localization in Industrial Control Systems

Autori: Gaadha Sudheerbabu, Tanwir Ahmad, Dragos Truscan, Jüri Vain
Pubblicato in: CyberSecurity in a DevOps Environment From Requirements to Monitoring, 2023, Pagina/e 127-159, ISBN 978-3-031-42212-6
Editore: Springer Cham

Security Requirements Formalization with RQCODE

Autori: Andrey Sadovykh, Nan Messe, Ildar Nigmatullin, Sophie Ebersold, Maria Naumcheva, Jean-Michel Bruel
Pubblicato in: CyberSecurity in a DevOps Environment From Requirements to Monitoring, 2023, Pagina/e 65-92
Editore: Springer Cham

A Taxonomy of Vulnerabilities, Attacks, and Security Solutions in Industrial PLCs

Autori: Eduard Paul Enoiu, Kejsi Biçoku, Cristina Seceleanu, Michael Felderer
Pubblicato in: CyberSecurity in a DevOps Environment From Requirements to Monitoring, 2023, ISBN 978-3-031-42214-0
Editore: Springer Cham

Ctam: A Tool for Continuous Threat Analysis and Management

Autori: Laurens Sion, Dimitri Van Landuyt, Koen Yskout, Stef Verreydt, Wouter Joosen
Pubblicato in: CyberSecurity in a DevOps Environment From Requirements to Monitoring, 2023, Pagina/e Pages 195-223, ISBN 978-3-031-42212-6
Editore: Springer Cham

A Stream-Based Approach to Intrusion Detection

Autori: Sylvain Hallé
Pubblicato in: CyberSecurity in a DevOps Environment From Requirements to Monitoring, 2023, Pagina/e Pages 253-291, ISBN 978-3-031-42212-6
Editore: Springer Cham

Natural Language Processing with Machine Learning for Security Requirements Analysis: Practical Approaches

Autori: Andrey Sadovykh, Kirill Yakovlev, Alexandr Naumchev, Vladimir Ivanov
Pubblicato in: CyberSecurity in a DevOps Environment From Requirements to Monitoring, 2023, Pagina/e 35-63, ISBN 978-3-031-42214-0
Editore: Springer Cham

nteractive Application Security Testing with Hybrid Fuzzing and Statistical Estimators

Autori: Ramon Barakat, Jasper von Blanckenburg, Roman Kraus, Fabian Jezuita, Steffen Lüdtke, Martin A. Schneider
Pubblicato in: CyberSecurity in a DevOps Environment From Requirements to Monitoring, 2023, Pagina/e Pages 161-191, ISBN 978-3-031-42212-6
Editore: Springer Cham

Early Detection of Network Attacks Using Deep Learning

Autori: Tanwir Ahmad, Dragos Truscan, Juri Vain, Ivan Porres
Pubblicato in: 2022
Editore: IEEE

Message from the ITEQS 2022 Workshop Chairs (si apre in una nuova finestra)

Autori: Mehrdad Saadatmand, Dragos Truscan, Eduard Paul Enoiu
Pubblicato in: 2022 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW), 2022
Editore: IEEE
DOI: 10.1109/icstw55395.2022.00006

Message from ITEQS 2023 Workshop Chairs (si apre in una nuova finestra)

Autori: Mehrdad Saadatmand,Dragos Truscan,Eduard Enoiu
Pubblicato in: 2023 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW), 2023
Editore: IEEE
DOI: 10.1109/icstw58534.2023.00011

Towards Human-Like Automated Test Generation: Perspectives from Cognition and Problem Solving

Autori: Eduard Paul Enoiu and Robert Feldt
Pubblicato in: International Conference on Cooperative and Human Aspects of Software Engineering 2021, Numero International Conference on Cooperative and Human Aspects of Software Engineering 2021, 2021
Editore: IEEE

A Two-phase Metamorphic Approach for Testing Industrial Control Systems (si apre in una nuova finestra)

Autori: Gaadha Sudheerbabu, Tanwir Ahmad, Filip Sebek, Dragos Truscan, Jüri Vain, and Ivan Porres
Pubblicato in: 2022
Editore: IEEE
DOI: 10.48550/arxiv.2208.09261

Human-based Test Design versus Automated Test Generation: A Literature Review and Meta-Analysis (si apre in una nuova finestra)

Autori: Ted Kurmaku, Eduard Paul Enoiu, Musa Kumrija
Pubblicato in: 15th Innovations in Software Engineering Conference ISEC 2022, Numero ISEC 2022, 2022
Editore: ACM
DOI: 10.1145/3511430.3511433

Preliminary Results in Using Attention for Increasing Attack Identification Efficiency (si apre in una nuova finestra)

Autori: Tanwir Ahmad, Dragos Truscan
Pubblicato in: 16th IEEE International Conference on Software Testing, Verification and Validation (ICST) 2023, 2023
Editore: IEEE
DOI: 10.1109/icstw58534.2023.00038

Specification of Passive Test Cases using anImproved T-EARS Language (si apre in una nuova finestra)

Autori: Daniel Flemström, Wasif Afzal, Eduard Paul Enoiu
Pubblicato in: Software Quality Days, Numero SQD 2022, 2021, ISBN 978-3-031-04115-0
Editore: Springer
DOI: 10.1007/978-3-031-04115-0_5

Security Testing and Resilience (si apre in una nuova finestra)

Autori: Ana Rosa Cavalli
Pubblicato in: 2021
Editore: IEEE
DOI: 10.1109/icstw52544.2021.00031

Security Requirements as Code: Example from VeriDevOps Project (si apre in una nuova finestra)

Autori: Khaled Ismaeel, Alexandr Naumchev, Andrey Sadovykh, Dragos Truscan, Eduard Paul Enoiu, Cristina Seceleanu
Pubblicato in: 2021 IEEE 29th International Requirements Engineering Conference Workshops (, 2021
Editore: IEEE
DOI: 10.1109/rew53955.2021.9714713

Security Requirements as Code:Example from VeriDevOps Project (si apre in una nuova finestra)

Autori: Vasily Varenov, Aydar Gabdrahmanov
Pubblicato in: 2021
Editore: IEEE
DOI: 10.1109/rew53955.2021.00063

PyLC: A Framework for Transforming and Validating PLC Software using Python and Pynguin Test Generator (si apre in una nuova finestra)

Autori: Mikael Ebrahimi Salari, Eduard Paul Enoiu, Wasif Afzal, Cristina Seceleanu
Pubblicato in: The 38th ACM/SIGAPP Symposium On Applied Computing SAC23, 2023
Editore: Association for Computing Machinery
DOI: 10.1145/3555776.3577698

A Model-Based Test Script Generation Framework for Embedded Software

Autori: Muhammad Nouman Zafar, Wasif Afzal, Eduard Paul Enoiu, Athanasios Stratis , Ola Sellin
Pubblicato in: The 17th Workshop on Advances in Model Based Testing, Numero A-MOST 2021, 2021
Editore: IEEE

VeriDevOps Software Methodology: Security Verification and Validation for DevOps Practices (si apre in una nuova finestra)

Autori: Eduard Paul Enoiu; Dragos Truscan; Andrey Sadovykh; Wissam Mallouli
Pubblicato in: The 18th International Conference on Availability, Reliability and Security (ARES 2023), 2023
Editore: ACM
DOI: 10.1145/3600160.3605054

Message from the ITEQS 2021 Workshop Chairs (si apre in una nuova finestra)

Autori: Saadatmand, M., Truscan, D. and Enoiu, E
Pubblicato in: 2021 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW), Numero ITEQS2021 workshop, 2021, Pagina/e xii-xii
Editore: IEEE
DOI: 10.1109/icstw52544.2021.00007

VeriDevOps: Automated Protection and Prevention to Meet Security Requirements in DevOps (si apre in una nuova finestra)

Autori: Andrey Sadovykh; Gunnar Widforss; Dragos Truscan; Eduard Paul Enoiu; Wissam Mallouli; Rosa Iglesias; Alessandra Bagnto; Olga Hendel
Pubblicato in: Design, Automation and Test in Europe Conference DATE 2021, 2021, Pagina/e p. 1330-1333
Editore: IEEE
DOI: 10.23919/date51398.2021.9474185

NLP-based Testing and Monitoring for Security Checking (Project Report)

Autori: Andrey Sadovykh, Zujany Salazar, Wissam Mallouli, Ana Rosa Cavalli, Dragos Truscan, Eduard Paul Enoiu, Rosa Iglesias and Olga Hendel
Pubblicato in: 2021
Editore: IFIP/Springer

A Framework for the Attack Tolerance of Cloud Applications Based on Web Services (si apre in una nuova finestra)

Autori: Georges Ouffoue,Fatiha Zaidi,Fatiha Zaidi,Ana Rosa Cavalli,Huu Nghia Nguyen
Pubblicato in: 2020
Editore: Electronics
DOI: 10.3390/electronics10010006

Towards a Workflow for Model-Based Testing of Embedded Systems (si apre in una nuova finestra)

Autori: Muhammad Nouman Zafar, Wasif Afzal, Eduard Paul Enoiu
Pubblicato in: International Workshop on Automating TEST Case Design, Selection, and Evaluation, Numero A-TEST 2021, 2021
Editore: ACM
DOI: 10.1145/3472672.3473956

Message from A-MOST 2023 Workshop Chairs (si apre in una nuova finestra)

Autori: Florian Lorber,Cristina Seceleanu,Uraz Cengiz Turker
Pubblicato in: 16th IEEE International Conference on Software Testing, Verification and Validation Workshops, ICSTW 2023, 2023
Editore: IEEE
DOI: 10.1109/icstw58534.2023.00005

Monitoring Approaches for Security and Safety Analysis: Application to a Load Position System (si apre in una nuova finestra)

Autori: Zujany Salazar, Ana Rosa Cavalli, Wissam Mallouli, Filip Sebek, Fatiha Zaidi, Monika Ewa Rakoczy
Pubblicato in: 2022
Editore: IEEE
DOI: 10.1109/icstw55395.2022.00021

Ethical AI-Powered Regression Test Selection (si apre in una nuova finestra)

Autori: Per Erik Strandberg, Mirgita Frasheri , Eduard Paul Enoiu
Pubblicato in: International Conference On Artificial Intelligence Testing, Numero AITEST 2021, 2021
Editore: IEEE
DOI: 10.1109/aitest52744.2021.00025

Industrial Scale Passive Testing with T-EARS (si apre in una nuova finestra)

Autori: Daniel Flemström, Henrik Jonsson, Eduard Paul Enoiu, Wasif Afzal
Pubblicato in: IEEE Conference on Software Testing, Validation and Verification 2021, Numero ICST 2021, 2021
Editore: IEEE
DOI: 10.1109/icst49551.2021.00047

Choosing a Test Automation Framework for Programmable Logic Controllers in CODESYS Development Environment (si apre in una nuova finestra)

Autori: Mikael Salari, Eduard Enoiu, Wasif Afzal, Cristina Seceleanu
Pubblicato in: 14th IEEE International Conference on Software Testing, Verification and Validation Workshops, ICSTW, 2022
Editore: Institute of Electrical and Electronics Engineers Inc
DOI: 10.1109/icstw55395.2022.00055

Applying Model-based Requirements Engineering in Three Large European Collaborative Projects: An Experience Report (si apre in una nuova finestra)

Autori: Andrey Sadovykh, Dragos Truscan, Hugo Bruneliere
Pubblicato in: 2021
Editore: IEEE
DOI: 10.1109/re51729.2021.00040

Application de l'Ingénierie des Exigences basée sur les Modèles dans Trois Grands Projets Collaboratifs Européens : Un Rapport d'Expérience

Autori: Andrey Sadovykh, Hugo Bruneliere, Dragos Truscan
Pubblicato in: INFORSID 2022 - 40ème Congrès INFormatique des ORganisations et Systèmes d'Information et de Décision, 2022
Editore: HAL

An iterative approach for model-based requirements engineering in large collaborative projects: A detailed experience report (si apre in una nuova finestra)

Autori: Andrey Sadovykh, Bilal Said, Dragos Truscan, Hugo Bruneliere
Pubblicato in: Science of Computer Programming, 2024, ISSN 0167-6423
Editore: Elsevier BV
DOI: 10.1016/j.scico.2023.103047

A Novel Model for Vulnerability Analysis through Enhanced Directed Graphs and Quantitative Metrics (si apre in una nuova finestra)

Autori: Ángel Longueira-Romero Rosa Iglesias Jose Luis Flores Iñaki Garitano
Pubblicato in: MDPI, 2022, ISSN 1424-8220
Editore: Multidisciplinary Digital Publishing Institute (MDPI)
DOI: 10.3390/s22062126

Machine Learning Techniques for Software Vulnerability Prediction: A comparative study (si apre in una nuova finestra)

Autori: Gul Jabeen, Sabit Rahim, Wasif Afzal, Dawar Khan, Aftab Ahmed Khan, Zahid Hussain, Tehmina Bibi
Pubblicato in: Applied Intelligence, Numero 0924669X, 2022, ISSN 0924-669X
Editore: Kluwer Academic Publishers
DOI: 10.1007/s10489-022-03350-5

CyberSecurity in a DevOps Environment From Requirements to Monitoring (si apre in una nuova finestra)

Autori: Andrey Sadovykh,Dragos Truscan,Wissam Mallouli,Ana Rosa Cavalli,Cristina Seceleanu,Alessandra Bagnato
Pubblicato in: 2023, ISBN 978-3-031-42212-6
Editore: Springer Cham
DOI: 10.1007/978-3-031-42212-6

Project Management in collaborative European research projects: analysis of H2020 VeriDevOps Management structure

Autori: Gunnar Widforss, Olga Hendel
Pubblicato in: EARMA Digital Conference 2021, Numero EARMA 2021, 2021
Editore: EARMA

È in corso la ricerca di dati su OpenAIRE...

Si è verificato un errore durante la ricerca dei dati su OpenAIRE

Nessun risultato disponibile

Il mio fascicolo 0 0