@inproceedings(ttool, author = "L. Apvrille", year = "2013", title = "{TTool website}", booktitle = "http://ttool.telecom-paristech.fr/", ) @inproceedings(LA:ERTSS-12, author = "L. {Apvrille} and A. {Becoulet}", year = "2012", title = "{P}rototyping an {E}mbedded {A}utomotive {S}ystem from its {UML}/{SysML} {M}odels", booktitle = "ERTSS'2012", address = "Toulouse, France", ) @article(LA-WI13, author = "L. {Apvrille} and P. {De Saqui-Sannes}", year = "2013", title = "Requirements Analysis", journal = "Embedded Systems: Analysis and Modeling with SysML, UML and AADL", ) @inproceedings(LA-ICECS06, author = "L. Apvrille and W. Muhammad and R. Ameur-Boulifa and S. Coudert and R. Pacalet", year = "2006", title = "{A} {UML}-{B}ased {E}nvironment for {S}ystem {D}esign {S}pace {E}xploration", booktitle = "Electronics, Circuits and Systems, 2006. ICECS '06. 13th IEEE International Conference on", pages = "1272 --1275", doi = "10.1109/ICECS.2006.379694", ) @incollection(AVISPAtool, author = "A. Armando and D. Basin and Y. Boichut and Y. Chevalier and L. Compagna and J. Cuellar and P.Hankes Drielsma and P.C. Heám and O. Kouchnarenko and J. Mantovani and S. Mödersheim and D. Oheimb and M. Rusinowitch and J. Santiago and M. Turuani and L. Viganò and L. Vigneron", year = "2005", title = "The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications", editor = "Kousha Etessami and SriramK. Rajamani", booktitle = "Computer Aided Verification", series = "Lecture Notes in Computer Science", volume = "3576", publisher = "Springer Berlin Heidelberg", pages = "281--285", doi = "10.1007/11513988\_27", ) @misc(Assolini12, author = "F. Assolini", year = "2012", title = "The {T}ale of {O}ne {T}housand and {O}ne {DSL} {M}odems, Kaspersky Lab", url = "http://www.securelist.com/en/blog/208193852/The_tale_of_one_thousand_and_one_DSL_modems", ) @article(FB-POLIS-03, author = "F. Balarin and Y. Watanabe and H. Hsieh and L. Lavagno and C. Passerone and A. Sangiovanni-Vincentelli", year = "2003", title = "{M}etropolis: {A}n {I}ntegrated {E}lectronic {S}ystem {D}esign {E}nvironment", journal = "Computer", volume = "36", number = "4", pages = "45--52", doi = "10.1109/MC.2003.1193228", ) @inproceedings(uppaal-paper, author = "J. Bengtsson and W. Yi.", year = "2004", title = "Timed Automata: Semantics, Algorithms and Tools", booktitle = "Lecture Notes on Concurrency and Petri Nets", publisher = "W. Reisig and G. Rozenberg (eds.), LNCS 3098, Springer-Verlag", pages = "87--124", doi = "10.1007/978-3-540-27755-2", ) @article(BlanchetJCS08, author = "B. Blanchet", year = "2009", title = "{A}utomatic {V}erification of {C}orrespondences for {S}ecurity {P}rotocols", journal = "Journal of Computer Security", volume = "17", number = "4", pages = "363--434", doi = "10.3233/JCS-2009-0339", ) @inproceedings(QSIC2004, author = "M. Drouineaud and M. Bortin and P. Torrini and K. Sohr", title = "A First Step Towards Formal Verification of Security Policy Properties for RBAC", booktitle = "QSIC'04", address = "Washington, DC, USA", pages = "60--67", doi = "10.1109/QSIC.2004.1357945", ) @inproceedings(DBLP:conf/safecomp/EamesM99, author = "D. P. Eames and J. D. Moffett", year = "1999", title = "The Integration of Safety and Security Requirements", booktitle = "SAFECOMP", pages = "468--480", doi = "10.1007/3-540-48249-0\_40", ) @inproceedings(Esser11, author = "S. Esser", year = "2011", title = "Exploiting the i{OS} {K}ernel", booktitle = "BlackHat 2011", ) @inproceedings(EVITA-req-risk, author = "O. Henniger and L. Apvrille and A. Fuchs and Y. Roudier and A. Ruddle and B. Weyl", title = "{S}ecurity {R}equirements for {A}utomotive {O}n-{B}oard {N}etworks", booktitle = "ITST 2009, Lille, France", doi = "10.1109/ITST.2009.5399279", ) @article(Hoppe08, author = "T. Hoppe and S. Kiltz and J. Dittmann", year = "2011", title = "{S}ecurity {T}hreats to {A}utomotive {CAN} {N}etworks - {P}ractical {E}xamples and {S}elected {S}hort-{T}erm {C}ountermeasures", journal = "Rel. Eng. {\&} Sys. Safety", volume = "96", number = "1", pages = "11--25", url = "http://dx.doi.org/10.1016/j.ress.2010.06.026", ) @techreport(Huang02, author = "A. Huang", year = "2002", title = "{K}eeping {S}ecrets in {H}ardware: the {M}icrosoft {XB}ox {C}ase {S}tudy, {AI} {M}emo 2002-008, {M}assachusetts {I}nstitute of {T}echnology, {A}rtificial {I}ntelligence {L}aboratory", type = "Technical Report", ) @phdthesis(these-Sabir, author = "M. S. Idrees", year = "2012", title = "{A} {R}equirements {E}ngineering {D}riven {A}pproach to {S}ecurity {A}rchitecture {D}esign for {D}istributed {E}mbedded {S}ystems", school = "Telecom ParisTech", ) @inproceedings(uusgtssd02, author = "J. {J}{\"u}{r}jens", year = "2002", title = "Using {UMLsec} and Goal-Trees for Secure Systems Development", editor = "{G. B.} Lamont and H. Haddad and G. Papadopoulos and B. Panda", booktitle = "Proceedings of the 2002 Symposium of Applied Computing (SAC)", publisher = "ACM", address = "Madrid, Spain", pages = "1026--1031", doi = "10.1145/508791.508990", note = "Proceedings of the 2002 ACM Symposium of Applied Computing", ) @inproceedings(dses07, author = "J. {J}{\"u}{r}jens", year = "2007", title = "Developing Secure Embedded Systems: Pitfalls and How to Avoid Them", booktitle = "29th International Conference on Software Engineering (ICSE 2007)", organization = "ACM", pages = "182--183", ) @techreport(EvitaD2.1, author = "E. Kelling and M. Friedewald and T. Leimbach and M. Menzel and P. S\"{a}ger and H. Seudi\'{e} and B. Weyl", year = "2009", title = "{S}pecification and {E}valuation of e-{S}ecurity {R}elevant {U}se cases", type = "Technical Report", number = "Deliverable D2.1", institution = "EVITA Project", ) @inproceedings(phd_knorreck, author = "D. Knorreck", year = "2011", title = "{U}{M}{L}-based Design Space Exploration, Fast Simulation and Static Analysis", booktitle = "Ph.D. of Ecole doctorale informatique, t\'el\'ecommunications et \'electronique of Paris", ) @article(DK-SIGSOFT-11, author = "D. {Knorreck} and L. {Apvrille} and P. {De Saqui-Sannes}", year = "2011", title = "{TEPE}: {A} {S}ys{ML} {L}anguage for {T}ime-{C}onstrained {P}roperty {M}odeling and {F}ormal {V}erification", journal = "ACM SIGSOFT Software Engineering Notes", volume = "36", number = "1", pages = "1--8", doi = "10.1145.1921532.1921556", ) @incollection(Kordy, author = "Barbara Kordy and Piotr Kordy and Sjouke Mauw and Patrick Schweitzer", year = "2013", title = "ADTool: Security Analysis with Attack–Defense Trees", editor = "Kaustubh Joshi and Markus Siegle and Mariëlle Stoelinga and PedroR. D’Argenio", booktitle = "Quantitative Evaluation of Systems", series = "Lecture Notes in Computer Science", volume = "8054", publisher = "Springer Berlin Heidelberg", pages = "173--176", doi = "10.1007/978-3-642-40196-1\_15", ) @inproceedings(Amana.GPujol, author = "A. Ma{\~n}a and G. Pujol", year = "2008", title = "Towards Formal Specification of Abstract Security Properties", booktitle = "The Third International Conference on Availability, Reliability and Security", volume = "0-7695-3102-4/08", publisher = "IEEE", ) @techreport(Nhlabatsi2010, author = "A. Nhlabatsi and B. Nuseibeh and Y. Yu", year = "2010", title = "{{S}ecurity {R}equirements {E}ngineering for {E}volving {S}oftware {S}ystems: a survey}", type = "Technical Report", number = "1", institution = "The Open University", ) @article(Nuseibeh, author = "B. Nuseibeh", year = "2001", title = "{W}eaving {T}ogether {R}equirements and {A}rchitectures", journal = "IEEE Computer", volume = "34", number = "3", pages = "115--117", doi = "10.1109/2.910904", ) @inproceedings(phd_pedroza, author = "G. Pedroza", year = "2013", title = "Assisting the Design of Secured Applications for Mobile Vehicles", booktitle = "Ph.D. of Ecole doctorale informatique, t\'el\'ecommunications et \'electronique of Paris", ) @inproceedings(EURECOM+3484, author = "G. {P}edroza and M. S. {I}drees and L. {A}pvrille and Y. {R}oudier", year = "2011", title = "{A} {F}ormal {M}ethodology {A}pplied to {S}ecure {O}ver-{T}he-{A}ir {A}utomotive {A}pplications", booktitle = "{VTC}-{F}all2011, {IEEE} 74th {V}ehicular {T}echnology {C}onference, 5-8 {S}eptember 2011, {S}an {F}rancisco, {USA}", address = "{S}an {F}rancisco, USA", doi = "10.1109/VETECF.2011.6093061", ) @article(DBLP:journals/ress/Pietre-CambacedesB13, author = "L. Pietre-Cambacedes and M. Bouissou", year = "2013", title = "Cross-fertilization between safety and security engineering", journal = "Rel. Eng. {\&} Sys. Safety", volume = "110", pages = "110--126", doi = "10.1016/j.ress.2012.09.011", ) @article(DBLP:journals/jss/RaspotnigO13, author = "C. Raspotnig and A. L. Opdahl", year = "2013", title = "Comparing risk identification techniques for safety and security requirements", journal = "Journal of Systems and Software", volume = "86", number = "4", pages = "1124--1151", doi = "10.1016/j.jss.2012.12.002", ) @inproceedings(MoDRE13, author = "Y. Roudier and M. S. Idrees and L. Apvrille", year = "2013", title = "Towards the Model-Driven Engineering of Security Requirements for Embedded Systems", booktitle = "proceedings of MoDRE'13, Rio de Janeiro, Brazil", doi = "10.1109/MoDRE.2013.6597264", ) @techreport(EvitaD2.3, author = "A. Ruddle and et al", year = "2009", title = "{S}ecurity {R}equirements for {A}utomotive {O}n-board {N}etworks {B}ased on {D}ark-side {S}cenarios", type = "Technical Report", number = "Deliverable D2.3", institution = "EVITA Project", ) @(schneier, author = "B. Schneier", year = "1999", title = "{A}ttack {T}rees: {M}odeling {S}ecurity {T}hreats", ) @inproceedings(HS-WIV-11, author = "H. {Schweppe} and Y. {Roudier} and B. {Weyl} and L. {Apvrille} and D. {Scheuermann}", year = "2011", title = "C2X Communication: Securing the Last Meter", booktitle = "The 4th IEEE International Symposium on Wireless Vehicular Communications: WIVEC2011", address = "San Francisco, USA", ) @inproceedings(Teso13, author = "H. Teso", year = "2013", title = "{A}ircraft {H}acking", booktitle = "HITB Security Conference", address = "Amsterdam, The Netherlands", ) @inproceedings(MJToussaint, author = "M. J. Toussaint", year = "1993", title = "{A} {N}ew {M}ethod for {A}nalyzing the {S}ecurity of {C}ryptographic {P}rotocols", booktitle = "Journal on Selected Areas in Communications", volume = "11, No. 5", publisher = "IEEE", ) @article(VanLamsweerde2007, author = "A. {Van Lamsweerde}", year = "2007", title = "{E}ngineering {R}equirements for {S}ystem {R}eliability and {S}ecurity", journal = "Software System Reliability and Security", volume = "9", pages = "196--238", )