Software protection is an essential aspect of information security to withstand malicious activities on software, and preserving software assets. However, software developers still lacks a methodology for the assessment of the deployed protections. To solve these issues, we present a novel attack simulation based software protection assessment method to assess and compare various protection solutions. Our solution relies on Petri Nets to specify and visualize attack models, and we developed a Monte Carlo based approach to simulate attacking processes and to deal with uncertainty. Then, based on this simulation and estimation, a novel protection comparison model is proposed to compare different protection solutions. Lastly, our attack simula...
This report documents the program and the outcomes of Dagstuhl Seminar 19331 ``Software Protection D...
This work concentrates on the cyber security of enterprise and Industrial Control Systems (ICS). Ent...
Ekelhart A, Kiesling E, Grill B, Strauss C, Stummer C. Integrating attacker behavior in IT security ...
Software protection is an essential aspect of information security to withstand malicious activities...
Designing secure and reliable systems is a difficult task. Threat modeling is a process that support...
Article describes the most common methods for evaluation of physical protection systems. It analyze...
The use of insecure programming practices has led to a large number of vulnerable programs that can ...
This paper develops an analytic technique for quanti-fying the risk of computer network operations (...
This paper reports an analysis of the software (SW) safety testing techniques, as well as the models...
This paper reports an analysis of the software (SW) safety testing techniques, as well as the models...
Objectives. At present, conducting a computational experiment on a system for protecting information...
Cyber attacks on IT and OT systems can have severe consequences for individuals and organizations, f...
To evaluate and predict component-based software security, a two-dimensional model of software secur...
The aim of this article is to present an approach to develop and verify a method of formal modeling ...
Attackers can tamper with programs to break usage conditions. Different software protection techniqu...
This report documents the program and the outcomes of Dagstuhl Seminar 19331 ``Software Protection D...
This work concentrates on the cyber security of enterprise and Industrial Control Systems (ICS). Ent...
Ekelhart A, Kiesling E, Grill B, Strauss C, Stummer C. Integrating attacker behavior in IT security ...
Software protection is an essential aspect of information security to withstand malicious activities...
Designing secure and reliable systems is a difficult task. Threat modeling is a process that support...
Article describes the most common methods for evaluation of physical protection systems. It analyze...
The use of insecure programming practices has led to a large number of vulnerable programs that can ...
This paper develops an analytic technique for quanti-fying the risk of computer network operations (...
This paper reports an analysis of the software (SW) safety testing techniques, as well as the models...
This paper reports an analysis of the software (SW) safety testing techniques, as well as the models...
Objectives. At present, conducting a computational experiment on a system for protecting information...
Cyber attacks on IT and OT systems can have severe consequences for individuals and organizations, f...
To evaluate and predict component-based software security, a two-dimensional model of software secur...
The aim of this article is to present an approach to develop and verify a method of formal modeling ...
Attackers can tamper with programs to break usage conditions. Different software protection techniqu...
This report documents the program and the outcomes of Dagstuhl Seminar 19331 ``Software Protection D...
This work concentrates on the cyber security of enterprise and Industrial Control Systems (ICS). Ent...
Ekelhart A, Kiesling E, Grill B, Strauss C, Stummer C. Integrating attacker behavior in IT security ...