Archive

Archive: Publications

Publication of C5-DEC CAD

C5-DEC, short for "Common Criteria for Cybersecurity, Cryptography, Clouds – Design, Evaluation and Certification", is a sub-project of the CyFORT project, which in turn stands for "Cloud Cybersecurity Fortress of Open Resources and Tools for Resilience".

 

C5-DEC CAD, the software component of C5-DEC, is a suite of tools for computer-aided design and development (CAD), mainly dealing with: the creation and evaluation of secure IT systems according to the Common Criteria standards, secure software development life cycle (SSDLC), and what we refer to as cyber-physical system security assessment (CPSSA).

This repository contains the source code and full documentation (requirements, technical specifications, user manual, test case specifications and test reports) of C5-DEC CAD, exemplifying the C5-DEC method, which relies on storing, interlinking and processing all software development life cycle (SDLC) artifacts in a unified manner.


Link to itrust Abstractions Lab

International Conference on E-Business and Telecommunications (ICETE 2020).

Vazquez Sandoval I., Atashpendar A., Lenzini G., Ryan P.Y.A. (2021) PakeMail: Authentication and Key Management in Decentralized Secure Email and Messaging via PAKE. In: Obaidat M.S., Ben-Othman J. (eds) E-Business and Telecommunications. ICETE 2020. Communications in Computer and Information Science, vol 1484. Springer, Cham.

Links: Published article

Search-based test and improvement of machine-learning-based anomaly detection systems

Maxime Cordy, Steve Muller, Mike Papadakis, and Yves Le Traon 2019. Search-based test and improvement of machine-learning-based anomaly detection systems. Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis. Association for Computing Machinery, New York, NY, USA, 158–168.

Links: Published article

From Information Theory Puzzles in Deletion Channels to Deniability in Quantum Cryptography

Arash Atashpendar, From Information Theory Puzzles in Deletion Channels to Deniability in Quantum Cryptography Doctoral thesis, University of Luxembourg, 2019.

Links: Published article

Elsevier, Computers & Security, Volume 76

Steve Muller, Jean Lancrenon, Carlo Harpes, Yves Le Traon, Sylvain Gombault, Jean-Marie Bonnin

A training-resistant anomaly detection system

Links: Published article Article

Archive

Categories