Profil

GADYATSKAYA Olga

Main Referenced Co-authors
Zhauniarovich, Yury (7)
MAUW, Sjouke  (6)
TRUJILLO RASUA, Rolando  (5)
DASHEVSKYI, Stanislav  (4)
PILGUN, Aleksandr  (4)
Main Referenced Keywords
Android (9); attack trees (3); automated testing (2); code coverage (2); dynamic analysis (2);
Main Referenced Unit & Research Centers
Interdisciplinary Centre for Security, Reliability and Trust (SnT) (4)
Interdisciplinary Centre for Security, Reliability and Trust (SnT) > Other (4)
Interdisciplinary Centre for Security, Reliability and Trust - SnT (4)
SnT - Interdisciplinary Centre for Security, Reliability and Trust (1)
Main Referenced Disciplines
Computer science (19)

Publications (total 19)

The most downloaded
644 downloads
Zhauniarovich, Y., Gadyatskaya, O., Crispo, B., La Spina, F., & Moser, E. (2014). FSquaDRA: Fast Detection of Repackaged Applications. In Data and Applications Security and Privacy XXVIII (pp. 130-145). Springer. https://hdl.handle.net/10993/19891

The most cited

77 citations (Scopus®)

Zhauniarovich, Y., Ahmad, M., Gadyatskaya, O., Crispo, B., & Massacci, F. (2015). StaDynA: Addressing the Problem of Dynamic Code Updates in the Security Analysis of Android Applications. In Proceedings of CODASPY '15. ACM. doi:10.1145/2699026.2699105 https://hdl.handle.net/10993/23812

Pilgun, A., Gadyatskaya, O., Zhauniarovich, Y., Dashevskyi, S., Kushniarou, A., & Mauw, S. (06 July 2020). Fine-grained Code Coverage Measurement in Automated Black-box Android Testing. ACM Transactions on Software Engineering and Methodology, 29 (4), 1-35. doi:10.1145/3395042
Peer Reviewed verified by ORBi

Dashevskyi, S., Zhauniarovich, Y., Gadyatskaya, O., Pilgun, A., & Ouhssain, H. (2020). Dissecting Android Cryptocurrency Miners. In CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, New Orleans LA USA, March 2020 (pp. 191–202). New York, United States - New York: ACM. doi:10.1145/3374664.3375724
Peer reviewed

Buldas, A., Gadyatskaya, O., Lenin, A., Mauw, S., & Trujillo Rasua, R. (2020). Attribute evaluation on attack trees with incomplete information. Computers and Security, 88 (101630). doi:10.1016/j.cose.2019.101630
Peer Reviewed verified by ORBi

Gadyatskaya, O., & Mauw, S. (2020). Attack-Tree Series: A Case for Dynamic Attack Tree Analysis. In Proc.\ 6th International Workshop on Graphical Models for Security (GraMSec'19) (pp. 7-19). Springer.
Peer reviewed

Pilgun, A., Gadyatskaya, O., Dashevskyi, S., Zhauniarovich, Y., & Kushniarou, A. (15 October 2018). DEMO: An Effective Android Code Coverage Tool [Poster presentation]. Conference on Computer and Communications Security. doi:10.1145/3243734.3278484

Dashevskyi, S., Gadyatskaya, O., Pilgun, A., & Yury, Z. (October 2018). The Influence of Code Coverage Metrics on Automated Testing Efficiency in Android [Poster presentation]. The 25th ACM Conference on Computer and Communications Security, Toronto, Canada. doi:10.1145/3243734.3278524

Gadyatskaya, O., & Trujillo Rasua, R. (2018). New Directions in Attack Tree Research: Catching up with Industrial Needs. In S. Mauw, Proceedings of the 4th International Workshop on Graphical Models for Security. Springer. doi:10.1007/978-3-319-74860-3_9
Peer reviewed

Gadyatskaya, O., Ravi, J., Mauw, S., Trujillo Rasua, R., & Tim, A. C. W. (2017). Refinement-Aware Generation of Attack Trees. In G. Livraga & C. J. Mitchell, Security and Trust Management - 13th International Workshop (pp. 164-179). Springer.
Peer reviewed

Zhauniarovich, Y., & Gadyatskaya, O. (2016). Small changes, big changes: an updated view on the Android permission system. In Research in Attacks, Intrusions, and Defenses - 19th International Symposium, RAID 2016, Paris, France, September 19-21, 2016, Proceedings (pp. 346-367). Springer. doi:10.1007/978-3-319-45719-2_16
Peer reviewed

Gadyatskaya, O., Lezza, A.-L., & Zhauniarovich, Y. (2016). Evaluation of Resource-based App Repackaging Detection in Android. In Proc. of NordSec. Springer. doi:10.1007/978-3-319-47560-8_9
Peer reviewed

Gadyatskaya, O., Labunets, K., & Paci, F. (2016). Towards Empirical Evaluation of Automated Risk Assessment Methods. In Risks and Security of Internet and Systems. Springer. doi:10.1007/978-3-319-54876
Peer reviewed

Gadyatskaya, O., Harpes, C., Mauw, S., Muller, C., & Muller, S. (2016). Bridging two worlds: Reconciling practical risk assessment methodologies with theory of attack trees. In Proc. of GraMSec. Springer. doi:10.1007/978-3-319-46263-9_5
Peer reviewed

Fraile, M., Ford, M., Gadyatskaya, O., Kumar, R., Stoelinga, M., & Trujillo Rasua, R. (2016). Using attack-defense trees to analyze threats and countermeasures in an ATM: a case study. In IFIP Working Conference on The Practice of Enterprise Modeling (pp. 326-334). doi:10.1007/978-3-319-48393-1_24
Peer reviewed

Gadyatskaya, O., Hansen, R. R., Larsen, K. G., Legay, A., Olesen, M. C., & Poulsen, D. B. (2016). Modelling Attack-defense Trees Using Timed Automata. In Proc. of FORMATS. Springer. doi:10.1007/978-3-319-44878-7_3
Peer reviewed

Gadyatskaya, O. (2016). How to Generate Security Cameras: Towards Defence Generation for Socio-Technical Systems. In Proc. of GraMSec 2015. Springer. doi:10.1007/978-3-319-29968-6_4
Peer reviewed

Gadyatskaya, O., Jhawar, R., Kordy, P., Lounis, K., Mauw, S., & Trujillo Rasua, R. (2016). Attack trees for practical security assessment: ranking of attack scenarios with ADTool 2.0. In Quantitative Evaluation of Systems - 13th International Conference (Lecture Notes in Computer Science, pp. 159--162). Quebec, Canada: Springer. doi:10.1007/978-3-319-43425-4_10
Peer reviewed

Zhauniarovich, Y., Philippov, A., Gadyatskaya, O., Crispo, B., & Massacci, F. (2015). Towards Black Box Testing of Android Apps. In Proc. of Software Assurance Workshop at the 10th International Conference on Availability, Reliability and Security (ARES). IEEE. doi:10.1109/ARES.2015.70
Peer reviewed

Zhauniarovich, Y., Ahmad, M., Gadyatskaya, O., Crispo, B., & Massacci, F. (2015). StaDynA: Addressing the Problem of Dynamic Code Updates in the Security Analysis of Android Applications. In Proceedings of CODASPY '15. ACM. doi:10.1145/2699026.2699105
Peer reviewed

Zhauniarovich, Y., Gadyatskaya, O., Crispo, B., La Spina, F., & Moser, E. (2014). FSquaDRA: Fast Detection of Repackaged Applications. In Data and Applications Security and Privacy XXVIII (pp. 130-145). Springer.
Peer reviewed

Contact ORBilu