
The ARIANA tool, short for "Assistance for Reporting on Information system Audits with Normative Assessment", is designed as an add-on to Microsoft Word and Excel applications and provides a simple and reliable process for creating policies, creating or updating audit reports, managing Excel- and Word-based records of processing activities compliant with GDPR, and providing additional Word and Excel utilities useful to consultants in their day-to-day work.
The tool was developed by itrust consulting as a VBA application to provide standardised documentation in the ATENA project. The tool has been released as open source as part of the CyFORT project initiative, making its main features available for use and inviting further contributions.
C5-DEC, short for "Common Criteria for Cybersecurity, Cryptography, Clouds – Design, Evaluation and Certification", is a sub-project of the CyFORT project, which in turn stands for "Cloud Cybersecurity Fortress of Open Resources and Tools for Resilience".
C5-DEC CAD, the software component of C5-DEC, is a suite of tools for computer-aided design and development (CAD), mainly dealing with: the creation and evaluation of secure IT systems according to the Common Criteria standards, secure software development life cycle (SSDLC), and what we refer to as cyber-physical system security assessment (CPSSA).
This repository contains the source code and full documentation (requirements, technical specifications, user manual, test case specifications and test reports) of C5-DEC CAD, exemplifying the C5-DEC method, which relies on storing, interlinking and processing all software development life cycle (SDLC) artifacts in a unified manner.
Vazquez Sandoval I., Atashpendar A., Lenzini G., Ryan P.Y.A. (2021) PakeMail: Authentication and Key Management in Decentralized Secure Email and Messaging via PAKE. In: Obaidat M.S., Ben-Othman J. (eds) E-Business and Telecommunications. ICETE 2020. Communications in Computer and Information Science, vol 1484. Springer, Cham.
Maxime Cordy, Steve Muller, Mike Papadakis, and Yves Le Traon 2019. Search-based test and improvement of machine-learning-based anomaly detection systems. Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis. Association for Computing Machinery, New York, NY, USA, 158–168.
Arash Atashpendar, From Information Theory Puzzles in Deletion Channels to Deniability in Quantum Cryptography Doctoral thesis, University of Luxembourg, 2019.
Steve Muller, Jean Lancrenon, Carlo Harpes, Yves Le Traon, Sylvain Gombault, Jean-Marie Bonnin A training-resistant anomaly detection system
F. Adamsky, M. Aubigny, F. Battisti, M. Carli, F. Cimorelli, T. Cruz, A. Di Giorgio, C. Foglietta, A. Galli, A. Giuseppi, F. Liberati, A. Neri, S. Panzieri, F. Pascucci, J. Proenca, P. Pucci, L. Rosa, R. Soua,
Integrated protection of industrial control systems from cyber-attacks: the ATENA approach,
International Journal of Critical Infrastructure Protection, Volume 21, 2018, Pages 72-82, ISSN 1874-5482
Steve Muller, Risk Monitoring and Intrusion Detection for Industrial Control Systems, Doctoral thesis, University of Luxembourg, 2018.
M. Skrobot and J. Lancrenon, "On Composability of Game-Based Password Authenticated Key Exchange," 2018 IEEE European Symposium on Security and Privacy (EuroS&P), 2018, pp. 443-457.
S. Muller, C. Harpes and C. Muller, ‘Fast and optimal countermeasureselection for attack defence trees’, in Risk Assessment and Risk-Driven Quality Assurance: 4th International Workshop, RISK 2016, Held in Conjunction with ICTSS 2016, Graz, Austria, October 18, 2016, Revised Selected Papers, J. Großmann, M. Felderer and F. Seehusen, Eds. Cham: Springer International Publishing, 2017, pp. 53–65, ISBN: 978-3-319-57858-3. DOI: 10.1007/978- 3- 319- 57858- 3_5. [Online]. Available: http://dx.doi.org/10.1007/978-3-319-57858-3_5.