PILGUN, A., GADYATSKAYA, O., Zhauniarovich, Y., DASHEVSKYI, S., KUSHNIAROU, A., & MAUW, S. (06 July 2020). Fine-grained Code Coverage Measurement in Automated Black-box Android Testing. ACM Transactions on Software Engineering and Methodology, 29 (4), 1-35. doi:10.1145/3395042 Peer Reviewed verified by ORBi |
DASHEVSKYI, S., Zhauniarovich, Y., GADYATSKAYA, O., PILGUN, A., & OUHSSAIN, H. (2020). Dissecting Android Cryptocurrency Miners. In CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, New Orleans LA USA, March 2020 (pp. 191–202). New York, United States - New York: ACM. doi:10.1145/3374664.3375724 Peer reviewed |
GADYATSKAYA, O., & MAUW, S. (2020). Attack-Tree Series: A Case for Dynamic Attack Tree Analysis. In Proc.\ 6th International Workshop on Graphical Models for Security (GraMSec'19) (pp. 7-19). Springer. Peer reviewed |
Buldas, A., GADYATSKAYA, O., Lenin, A., MAUW, S., & TRUJILLO RASUA, R. (2020). Attribute evaluation on attack trees with incomplete information. Computers and Security, 88 (101630). doi:10.1016/j.cose.2019.101630 Peer Reviewed verified by ORBi |
PILGUN, A., GADYATSKAYA, O., DASHEVSKYI, S., Zhauniarovich, Y., & Kushniarou, A. (15 October 2018). DEMO: An Effective Android Code Coverage Tool [Poster presentation]. Conference on Computer and Communications Security. doi:10.1145/3243734.3278484 |
DASHEVSKYI, S., GADYATSKAYA, O., PILGUN, A., & Yury, Z. (October 2018). The Influence of Code Coverage Metrics on Automated Testing Efficiency in Android [Poster presentation]. The 25th ACM Conference on Computer and Communications Security, Toronto, Canada. doi:10.1145/3243734.3278524 |
GADYATSKAYA, O., & TRUJILLO RASUA, R. (2018). New Directions in Attack Tree Research: Catching up with Industrial Needs. In S. MAUW, Proceedings of the 4th International Workshop on Graphical Models for Security. Springer. doi:10.1007/978-3-319-74860-3_9 Peer reviewed |
GADYATSKAYA, O., Ravi, J., MAUW, S., TRUJILLO RASUA, R., & Tim, A. C. W. (2017). Refinement-Aware Generation of Attack Trees. In G. Livraga & C. J. Mitchell, Security and Trust Management - 13th International Workshop (pp. 164-179). Springer. Peer reviewed |
Zhauniarovich, Y., & GADYATSKAYA, O. (2016). Small changes, big changes: an updated view on the Android permission system. In Research in Attacks, Intrusions, and Defenses - 19th International Symposium, RAID 2016, Paris, France, September 19-21, 2016, Proceedings (pp. 346-367). Springer. doi:10.1007/978-3-319-45719-2_16 Peer reviewed |
GADYATSKAYA, O., Lezza, A.-L., & Zhauniarovich, Y. (2016). Evaluation of Resource-based App Repackaging Detection in Android. In Proc. of NordSec. Springer. doi:10.1007/978-3-319-47560-8_9 Peer reviewed |
GADYATSKAYA, O. (2016). How to Generate Security Cameras: Towards Defence Generation for Socio-Technical Systems. In Proc. of GraMSec 2015. Springer. doi:10.1007/978-3-319-29968-6_4 Peer reviewed |
GADYATSKAYA, O., JHAWAR, R., KORDY, P., LOUNIS, K., MAUW, S., & TRUJILLO RASUA, R. (2016). Attack trees for practical security assessment: ranking of attack scenarios with ADTool 2.0. In Quantitative Evaluation of Systems - 13th International Conference (Lecture Notes in Computer Science, pp. 159--162). Quebec, Canada: Springer. doi:10.1007/978-3-319-43425-4_10 Peer reviewed |
GADYATSKAYA, O., Labunets, K., & Paci, F. (2016). Towards Empirical Evaluation of Automated Risk Assessment Methods. In Risks and Security of Internet and Systems. Springer. doi:10.1007/978-3-319-54876 Peer reviewed |
Fraile, M., Ford, M., GADYATSKAYA, O., Kumar, R., Stoelinga, M., & TRUJILLO RASUA, R. (2016). Using attack-defense trees to analyze threats and countermeasures in an ATM: a case study. In IFIP Working Conference on The Practice of Enterprise Modeling (pp. 326-334). doi:10.1007/978-3-319-48393-1_24 Peer reviewed |
GADYATSKAYA, O., Hansen, R. R., Larsen, K. G., Legay, A., Olesen, M. C., & Poulsen, D. B. (2016). Modelling Attack-defense Trees Using Timed Automata. In Proc. of FORMATS. Springer. doi:10.1007/978-3-319-44878-7_3 Peer reviewed |
GADYATSKAYA, O., Harpes, C., MAUW, S., Muller, C., & Muller, S. (2016). Bridging two worlds: Reconciling practical risk assessment methodologies with theory of attack trees. In Proc. of GraMSec. Springer. doi:10.1007/978-3-319-46263-9_5 Peer reviewed |
Zhauniarovich, Y., Philippov, A., GADYATSKAYA, O., Crispo, B., & Massacci, F. (2015). Towards Black Box Testing of Android Apps. In Proc. of Software Assurance Workshop at the 10th International Conference on Availability, Reliability and Security (ARES). IEEE. doi:10.1109/ARES.2015.70 Peer reviewed |
Zhauniarovich, Y., Ahmad, M., GADYATSKAYA, O., Crispo, B., & Massacci, F. (2015). StaDynA: Addressing the Problem of Dynamic Code Updates in the Security Analysis of Android Applications. In Proceedings of CODASPY '15. ACM. doi:10.1145/2699026.2699105 Peer reviewed |
Zhauniarovich, Y., GADYATSKAYA, O., Crispo, B., La Spina, F., & Moser, E. (2014). FSquaDRA: Fast Detection of Repackaged Applications. In Data and Applications Security and Privacy XXVIII (pp. 130-145). Springer. Peer reviewed |