BibTeX records: Martín Ochoa

download as .bib file

@article{DBLP:journals/ijsse/JimenezOR17,
  author    = {Lina M. Jimenez and
               Mart{\'{\i}}n Ochoa and
               Sandra Julieta Rueda},
  title     = {Jif-Based Verification of Information Flow Policies for Android Apps},
  journal   = {{IJSSE}},
  volume    = {8},
  number    = {1},
  pages     = {28--42},
  year      = {2017},
  url       = {https://doi.org/10.4018/IJSSE.2017010102},
  doi       = {10.4018/IJSSE.2017010102},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/ijsse/JimenezOR17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/acns/CastellanosATO17,
  author    = {John Henry Castellanos and
               Daniele Antonioli and
               Nils Ole Tippenhauer and
               Mart{\'{\i}}n Ochoa},
  title     = {Legacy-Compliant Data Authentication for Industrial Control System
               Traffic},
  booktitle = {Applied Cryptography and Network Security - 15th International Conference,
               {ACNS} 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings},
  pages     = {665--685},
  year      = {2017},
  crossref  = {DBLP:conf/acns/2017},
  url       = {https://doi.org/10.1007/978-3-319-61204-1_33},
  doi       = {10.1007/978-3-319-61204-1_33},
  timestamp = {Tue, 04 Jul 2017 13:27:06 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/acns/CastellanosATO17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GuarnizoTBOTSE17,
  author    = {Juan David Guarnizo and
               Amit Tambe and
               Suman Sankar Bhunia and
               Mart{\'{\i}}n Ochoa and
               Nils Ole Tippenhauer and
               Asaf Shabtai and
               Yuval Elovici},
  title     = {{SIPHON:} Towards Scalable High-Interaction Physical Honeypots},
  booktitle = {Proceedings of the 3rd {ACM} Workshop on Cyber-Physical System Security,
               CPSS@AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2, 2017},
  pages     = {57--68},
  year      = {2017},
  crossref  = {DBLP:conf/ccs/2017asiacpss},
  url       = {http://doi.acm.org/10.1145/3055186.3055192},
  doi       = {10.1145/3055186.3055192},
  timestamp = {Tue, 25 Apr 2017 14:47:37 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/ccs/GuarnizoTBOTSE17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/OchoaBDBG17,
  author    = {Mart{\'{\i}}n Ochoa and
               Sebastian Banescu and
               Cynthia Disenfeld and
               Gilles Barthe and
               Vijay Ganesh},
  title     = {Reasoning about Probabilistic Defense Mechanisms against Remote Attacks},
  booktitle = {2017 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
               2017, Paris, France, April 26-28, 2017},
  pages     = {499--513},
  year      = {2017},
  crossref  = {DBLP:conf/eurosp/2017},
  url       = {https://doi.org/10.1109/EuroSP.2017.30},
  doi       = {10.1109/EuroSP.2017.30},
  timestamp = {Wed, 12 Jul 2017 09:52:31 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/eurosp/OchoaBDBG17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/sac/MeidanBSGOTE17,
  author    = {Yair Meidan and
               Michael Bohadana and
               Asaf Shabtai and
               Juan David Guarnizo and
               Mart{\'{\i}}n Ochoa and
               Nils Ole Tippenhauer and
               Yuval Elovici},
  title     = {ProfilIoT: a machine learning approach for IoT device identification
               based on network traffic analysis},
  booktitle = {Proceedings of the Symposium on Applied Computing, {SAC} 2017, Marrakech,
               Morocco, April 3-7, 2017},
  pages     = {506--509},
  year      = {2017},
  crossref  = {DBLP:conf/sac/2017},
  url       = {http://doi.acm.org/10.1145/3019612.3019878},
  doi       = {10.1145/3019612.3019878},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/sac/MeidanBSGOTE17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/GuarnizoTBOTSE17,
  author    = {Juan Guarnizo and
               Amit Tambe and
               Suman Sankar Bhunia and
               Mart{\'{\i}}n Ochoa and
               Nils Ole Tippenhauer and
               Asaf Shabtai and
               Yuval Elovici},
  title     = {{SIPHON:} Towards Scalable High-Interaction Physical Honeypots},
  journal   = {CoRR},
  volume    = {abs/1701.02446},
  year      = {2017},
  url       = {http://arxiv.org/abs/1701.02446},
  archivePrefix = {arXiv},
  eprint    = {1701.02446},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/corr/GuarnizoTBOTSE17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/OchoaBDBG17,
  author    = {Mart{\'{\i}}n Ochoa and
               Sebastian Banescu and
               Cynthia Disenfeld and
               Gilles Barthe and
               Vijay Ganesh},
  title     = {Reasoning about Probabilistic Defense Mechanisms against Remote Attacks},
  journal   = {CoRR},
  volume    = {abs/1701.06743},
  year      = {2017},
  url       = {http://arxiv.org/abs/1701.06743},
  archivePrefix = {arXiv},
  eprint    = {1701.06743},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/corr/OchoaBDBG17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/AntonioliGAOT17,
  author    = {Daniele Antonioli and
               Hamid Reza Ghaeini and
               Sridhar Adepu and
               Mart{\'{\i}}n Ochoa and
               Nils Ole Tippenhauer},
  title     = {Gamifying Education and Research on {ICS} Security: Design, Implementation
               and Results of {S3}},
  journal   = {CoRR},
  volume    = {abs/1702.03067},
  year      = {2017},
  url       = {http://arxiv.org/abs/1702.03067},
  archivePrefix = {arXiv},
  eprint    = {1702.03067},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/corr/AntonioliGAOT17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/abs-1708-04798,
  author    = {Eric Rothstein Morris and
               Carlos G. Murguia and
               Mart{\'{\i}}n Ochoa},
  title     = {Design-Time Quantification of Integrity in Cyber-Physical-Systems},
  journal   = {CoRR},
  volume    = {abs/1708.04798},
  year      = {2017},
  url       = {http://arxiv.org/abs/1708.04798},
  archivePrefix = {arXiv},
  eprint    = {1708.04798},
  timestamp = {Tue, 05 Sep 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/corr/abs-1708-04798},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/abs-1709-04647,
  author    = {Yair Meidan and
               Michael Bohadana and
               Asaf Shabtai and
               Mart{\'{\i}}n Ochoa and
               Nils Ole Tippenhauer and
               Juan David Guarnizo and
               Yuval Elovici},
  title     = {Detection of Unauthorized IoT Devices Using Machine Learning Techniques},
  journal   = {CoRR},
  volume    = {abs/1709.04647},
  year      = {2017},
  url       = {http://arxiv.org/abs/1709.04647},
  archivePrefix = {arXiv},
  eprint    = {1709.04647},
  timestamp = {Thu, 05 Oct 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/corr/abs-1709-04647},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/cns/HallgrenOS16,
  author    = {Per A. Hallgren and
               Mart{\'{\i}}n Ochoa and
               Andrei Sabelfeld},
  title     = {MaxPace: Speed-constrained location queries},
  booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
               2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages     = {136--144},
  year      = {2016},
  crossref  = {DBLP:conf/cns/2016},
  url       = {https://doi.org/10.1109/CNS.2016.7860479},
  doi       = {10.1109/CNS.2016.7860479},
  timestamp = {Wed, 24 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/cns/HallgrenOS16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/essos/LovatOP16,
  author    = {Enrico Lovat and
               Mart{\'{\i}}n Ochoa and
               Alexander Pretschner},
  title     = {Sound and Precise Cross-Layer Data Flow Tracking},
  booktitle = {Engineering Secure Software and Systems - 8th International Symposium,
               ESSoS 2016, London, UK, April 6-8, 2016. Proceedings},
  pages     = {38--55},
  year      = {2016},
  crossref  = {DBLP:conf/essos/2016},
  url       = {https://doi.org/10.1007/978-3-319-30806-7_3},
  doi       = {10.1007/978-3-319-30806-7_3},
  timestamp = {Wed, 17 May 2017 14:24:40 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/essos/LovatOP16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/kbse/OgnawalaOPL16,
  author    = {Saahil Ognawala and
               Mart{\'{\i}}n Ochoa and
               Alexander Pretschner and
               Tobias Limmer},
  title     = {{MACKE:} compositional analysis of low-level vulnerabilities with
               symbolic execution},
  booktitle = {Proceedings of the 31st {IEEE/ACM} International Conference on Automated
               Software Engineering, {ASE} 2016, Singapore, September 3-7, 2016},
  pages     = {780--785},
  year      = {2016},
  crossref  = {DBLP:conf/kbse/2016},
  url       = {http://doi.acm.org/10.1145/2970276.2970281},
  doi       = {10.1145/2970276.2970281},
  timestamp = {Sun, 30 Apr 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/kbse/OgnawalaOPL16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/pst/WuchnerOLP16,
  author    = {Tobias W{\"{u}}chner and
               Mart{\'{\i}}n Ochoa and
               Enrico Lovat and
               Alexander Pretschner},
  title     = {Generating behavior-based malware detection models with genetic programming},
  booktitle = {14th Annual Conference on Privacy, Security and Trust, {PST} 2016,
               Auckland, New Zealand, December 12-14, 2016},
  pages     = {506--511},
  year      = {2016},
  crossref  = {DBLP:conf/pst/2016},
  url       = {https://doi.org/10.1109/PST.2016.7907008},
  doi       = {10.1109/PST.2016.7907008},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/pst/WuchnerOLP16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/sac/WuchnerOGSSP16,
  author    = {Tobias W{\"{u}}chner and
               Mart{\'{\i}}n Ochoa and
               Mojdeh Golagha and
               Gaurav Srivastava and
               Thomas Schreck and
               Alexander Pretschner},
  title     = {MalFlow: identification of C{\&}C servers through host-based data
               flow profiling},
  booktitle = {Proceedings of the 31st Annual {ACM} Symposium on Applied Computing,
               Pisa, Italy, April 4-8, 2016},
  pages     = {2087--2094},
  year      = {2016},
  crossref  = {DBLP:conf/sac/2016},
  url       = {http://doi.acm.org/10.1145/2851613.2851802},
  doi       = {10.1145/2851613.2851802},
  timestamp = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/sac/WuchnerOGSSP16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/se/WenzelPJO16,
  author    = {Sven Wenzel and
               Daniel Poggenpohl and
               Jan J{\"{u}}rjens and
               Mart{\'{\i}}n Ochoa},
  title     = {Umlchange - specifying model changes to support security verification
               of potential evolution},
  booktitle = {Software Engineering 2016, Fachtagung des GI-Fachbereichs Softwaretechnik,
               23.-26. Februar 2016, Wien, {\"{O}}sterreich},
  pages     = {91--92},
  year      = {2016},
  crossref  = {DBLP:conf/se/2016},
  url       = {http://subs.emis.de/LNI/Proceedings/Proceedings252/article5.html},
  timestamp = {Thu, 10 Mar 2016 14:37:54 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/se/WenzelPJO16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/AhmadvandSOP16,
  author    = {Mohsen Ahmadvand and
               Antoine Scemama and
               Mart{\'{\i}}n Ochoa and
               Alexander Pretschner},
  title     = {Enhancing Operation Security using Secret Sharing},
  booktitle = {Proceedings of the 13th International Joint Conference on e-Business
               and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon,
               Portugal, July 26-28, 2016.},
  pages     = {446--451},
  year      = {2016},
  crossref  = {DBLP:conf/secrypt/2016},
  url       = {https://doi.org/10.5220/0005992104460451},
  doi       = {10.5220/0005992104460451},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/secrypt/AhmadvandSOP16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/sgcrc/CastellanosWOR16,
  author    = {John Henry Castellanos and
               Tobias W{\"{u}}chner and
               Mart{\'{\i}}n Ochoa and
               Sandra Julieta Rueda},
  title     = {Q-Floid: Android Malware detection with Quantitative Data Flow Graphs},
  booktitle = {Proceedings of the Singapore Cyber-Security Conference {(SG-CRC)}
               2016 - Cyber-Security by Design, Singapore, January 14-15, 2016.},
  pages     = {13--25},
  year      = {2016},
  crossref  = {DBLP:conf/sgcrc/2016},
  url       = {https://doi.org/10.3233/978-1-61499-617-0-13},
  doi       = {10.3233/978-1-61499-617-0-13},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/sgcrc/CastellanosWOR16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/dimva/WuchnerOP15,
  author    = {Tobias W{\"{u}}chner and
               Mart{\'{\i}}n Ochoa and
               Alexander Pretschner},
  title     = {Robust and Effective Malware Detection Through Quantitative Data Flow
               Graph Metrics},
  booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment
               - 12th International Conference, {DIMVA} 2015, Milan, Italy, July
               9-10, 2015, Proceedings},
  pages     = {98--118},
  year      = {2015},
  crossref  = {DBLP:conf/dimva/2015},
  url       = {https://doi.org/10.1007/978-3-319-20550-2_6},
  doi       = {10.1007/978-3-319-20550-2_6},
  timestamp = {Fri, 02 Jun 2017 20:51:35 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/dimva/WuchnerOP15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ecoop/GaneshBO15,
  author    = {Vijay Ganesh and
               Sebastian Banescu and
               Mart{\'{\i}}n Ochoa},
  title     = {Short Paper: The Meaning of Attack-Resistant Systems},
  booktitle = {Proceedings of the 10th {ACM} Workshop on Programming Languages and
               Analysis for Security, PLAS@ECOOP 2015, Prague, Czech Republic, July
               4-10, 2015},
  pages     = {49--55},
  year      = {2015},
  crossref  = {DBLP:conf/ecoop/2015plas},
  url       = {http://doi.acm.org/10.1145/2786558.2786562},
  doi       = {10.1145/2786558.2786562},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/ecoop/GaneshBO15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/essos/OchoaCPH15,
  author    = {Mart{\'{\i}}n Ochoa and
               Jorge Cu{\'{e}}llar and
               Alexander Pretschner and
               Per A. Hallgren},
  title     = {Idea: Unwinding Based Model-Checking and Testing for Non-Interference
               on EFSMs},
  booktitle = {Engineering Secure Software and Systems - 7th International Symposium,
               ESSoS 2015, Milan, Italy, March 4-6, 2015. Proceedings},
  pages     = {34--42},
  year      = {2015},
  crossref  = {DBLP:conf/essos/2015},
  url       = {https://doi.org/10.1007/978-3-319-15618-7_3},
  doi       = {10.1007/978-3-319-15618-7_3},
  timestamp = {Wed, 17 May 2017 14:24:40 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/essos/OchoaCPH15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/essos/BanescuOKP15,
  author    = {Sebastian Banescu and
               Mart{\'{\i}}n Ochoa and
               Nils Kunze and
               Alexander Pretschner},
  title     = {Idea: Benchmarking Indistinguishability Obfuscation - {A} Candidate
               Implementation},
  booktitle = {Engineering Secure Software and Systems - 7th International Symposium,
               ESSoS 2015, Milan, Italy, March 4-6, 2015. Proceedings},
  pages     = {149--156},
  year      = {2015},
  crossref  = {DBLP:conf/essos/2015},
  url       = {https://doi.org/10.1007/978-3-319-15618-7_12},
  doi       = {10.1007/978-3-319-15618-7_12},
  timestamp = {Wed, 17 May 2017 14:24:40 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/essos/BanescuOKP15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/icse/BanescuOP15,
  author    = {Sebastian Banescu and
               Mart{\'{\i}}n Ochoa and
               Alexander Pretschner},
  title     = {A Framework for Measuring Software Obfuscation Resilience against
               Automated Attacks},
  booktitle = {1st {IEEE/ACM} International Workshop on Software Protection, {SPRO}
               2015, Florence, Italy, May 19, 2015},
  pages     = {45--51},
  year      = {2015},
  crossref  = {DBLP:conf/icse/2015spro},
  url       = {https://doi.org/10.1109/SPRO.2015.16},
  doi       = {10.1109/SPRO.2015.16},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/icse/BanescuOP15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/malware/BanescuWSGOP15,
  author    = {Sebastian Banescu and
               Tobias W{\"{u}}chner and
               Aleieldin Salem and
               Marius Guggenmos and
               Mart{\'{\i}}n Ochoa and
               Alexander Pretschner},
  title     = {A framework for empirical evaluation of malware detection resilience
               against behavior obfuscation},
  booktitle = {10th International Conference on Malicious and Unwanted Software,
               {MALWARE} 2015, Fajardo, PR, USA, October 20-22, 2015},
  pages     = {40--47},
  year      = {2015},
  crossref  = {DBLP:conf/malware/2015},
  url       = {https://doi.org/10.1109/MALWARE.2015.7413683},
  doi       = {10.1109/MALWARE.2015.7413683},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/malware/BanescuWSGOP15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/provsec/HallgrenOS15,
  author    = {Per A. Hallgren and
               Mart{\'{\i}}n Ochoa and
               Andrei Sabelfeld},
  title     = {BetterTimes - Privacy-Assured Outsourced Multiplications for Additively
               Homomorphic Encryption on Finite Fields},
  booktitle = {Provable Security - 9th International Conference, ProvSec 2015, Kanazawa,
               Japan, November 24-26, 2015, Proceedings},
  pages     = {291--309},
  year      = {2015},
  crossref  = {DBLP:conf/provsec/2015},
  url       = {https://doi.org/10.1007/978-3-319-26059-4_16},
  doi       = {10.1007/978-3-319-26059-4_16},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/provsec/HallgrenOS15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/pst/HallgrenOS15,
  author    = {Per A. Hallgren and
               Mart{\'{\i}}n Ochoa and
               Andrei Sabelfeld},
  title     = {InnerCircle: {A} parallelizable decentralized privacy-preserving location
               proximity protocol},
  booktitle = {13th Annual Conference on Privacy, Security and Trust, {PST} 2015,
               Izmir, Turkey, July 21-23, 2015},
  pages     = {1--6},
  year      = {2015},
  crossref  = {DBLP:conf/pst/2015},
  url       = {https://doi.org/10.1109/PST.2015.7232947},
  doi       = {10.1109/PST.2015.7232947},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/pst/HallgrenOS15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/WuchnerOP15,
  author    = {Tobias W{\"{u}}chner and
               Mart{\'{\i}}n Ochoa and
               Alexander Pretschner},
  title     = {Robust and Effective Malware Detection through Quantitative Data Flow
               Graph Metrics},
  journal   = {CoRR},
  volume    = {abs/1502.01609},
  year      = {2015},
  url       = {http://arxiv.org/abs/1502.01609},
  archivePrefix = {arXiv},
  eprint    = {1502.01609},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/corr/WuchnerOP15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/BanescuWGOP15,
  author    = {Sebastian Banescu and
               Tobias W{\"{u}}chner and
               Marius Guggenmos and
               Mart{\'{\i}}n Ochoa and
               Alexander Pretschner},
  title     = {{FEEBO:} An Empirical Evaluation Framework for Malware Behavior Obfuscation},
  journal   = {CoRR},
  volume    = {abs/1502.03245},
  year      = {2015},
  url       = {http://arxiv.org/abs/1502.03245},
  archivePrefix = {arXiv},
  eprint    = {1502.03245},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/corr/BanescuWGOP15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/GaneshBO15,
  author    = {Vijay Ganesh and
               Sebastian Banescu and
               Mart{\'{\i}}n Ochoa},
  title     = {The Meaning of Attack-Resistant Programs},
  journal   = {CoRR},
  volume    = {abs/1502.04023},
  year      = {2015},
  url       = {http://arxiv.org/abs/1502.04023},
  archivePrefix = {arXiv},
  eprint    = {1502.04023},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/corr/GaneshBO15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/csi/WenzelPJO14,
  author    = {Sven Wenzel and
               Daniel Poggenpohl and
               Jan J{\"{u}}rjens and
               Mart{\'{\i}}n Ochoa},
  title     = {Specifying model changes with UMLchange to support security verification
               of potential evolution},
  journal   = {Computer Standards {\&} Interfaces},
  volume    = {36},
  number    = {4},
  pages     = {776--791},
  year      = {2014},
  url       = {https://doi.org/10.1016/j.csi.2013.12.011},
  doi       = {10.1016/j.csi.2013.12.011},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/csi/WenzelPJO14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/ijsse/FeldererKKJOPTT14,
  author    = {Michael Felderer and
               Basel Katt and
               Philipp Kalb and
               Jan J{\"{u}}rjens and
               Mart{\'{\i}}n Ochoa and
               Federica Paci and
               Le Minh Sang Tran and
               Thein Than Tun and
               Koen Yskout and
               Riccardo Scandariato and
               Frank Piessens and
               Dries Vanoverberghe and
               Elizabeta Fourneret and
               Matthias Gander and
               Bj{\o}rnar Solhaug and
               Ruth Breu},
  title     = {Evolution of Security Engineering Artifacts: {A} State of the Art
               Survey},
  journal   = {{IJSSE}},
  volume    = {5},
  number    = {4},
  pages     = {48--98},
  year      = {2014},
  url       = {https://doi.org/10.4018/ijsse.2014100103},
  doi       = {10.4018/ijsse.2014100103},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/ijsse/FeldererKKJOPTT14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WuchnerOP14,
  author    = {Tobias W{\"{u}}chner and
               Mart{\'{\i}}n Ochoa and
               Alexander Pretschner},
  title     = {Malware detection with quantitative data flow graphs},
  booktitle = {9th {ACM} Symposium on Information, Computer and Communications Security,
               {ASIA} {CCS} '14, Kyoto, Japan - June 03 - 06, 2014},
  pages     = {271--282},
  year      = {2014},
  crossref  = {DBLP:conf/ccs/2014asia},
  url       = {http://doi.acm.org/10.1145/2590296.2590319},
  doi       = {10.1145/2590296.2590319},
  timestamp = {Tue, 21 Nov 2017 18:32:23 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/ccs/WuchnerOP14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/post/BartheKMO14,
  author    = {Gilles Barthe and
               Boris K{\"{o}}pf and
               Laurent Mauborgne and
               Mart{\'{\i}}n Ochoa},
  title     = {Leakage Resilience against Concurrent Cache Attacks},
  booktitle = {Principles of Security and Trust - Third International Conference,
               {POST} 2014, Held as Part of the European Joint Conferences on Theory
               and Practice of Software, {ETAPS} 2014, Grenoble, France, April 5-13,
               2014, Proceedings},
  pages     = {140--158},
  year      = {2014},
  crossref  = {DBLP:conf/post/2014},
  url       = {https://doi.org/10.1007/978-3-642-54792-8_8},
  doi       = {10.1007/978-3-642-54792-8_8},
  timestamp = {Wed, 24 May 2017 08:30:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/post/BartheKMO14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/sec/RocchettoOD14,
  author    = {Marco Rocchetto and
               Mart{\'{\i}}n Ochoa and
               Mohammad Torabi Dashti},
  title     = {Model-Based Detection of {CSRF}},
  booktitle = {{ICT} Systems Security and Privacy Protection - 29th {IFIP} {TC} 11
               International Conference, {SEC} 2014, Marrakech, Morocco, June 2-4,
               2014. Proceedings},
  pages     = {30--43},
  year      = {2014},
  crossref  = {DBLP:conf/sec/2014},
  url       = {https://doi.org/10.1007/978-3-642-55415-5_3},
  doi       = {10.1007/978-3-642-55415-5_3},
  timestamp = {Fri, 19 May 2017 01:25:10 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/sec/RocchettoOD14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/WuchnerPO14,
  author    = {Tobias W{\"{u}}chner and
               Alexander Pretschner and
               Mart{\'{\i}}n Ochoa},
  title     = {{DAVAST:} data-centric system level activity visualization},
  booktitle = {Proceedings of the Eleventh Workshop on Visualization for Cyber Security,
               Paris, France, November 10, 2014},
  pages     = {25--32},
  year      = {2014},
  crossref  = {DBLP:conf/vizsec/2014},
  url       = {http://doi.acm.org/10.1145/2671491.2671499},
  doi       = {10.1145/2671491.2671499},
  timestamp = {Fri, 16 Jan 2015 14:14:35 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/vizsec/WuchnerPO14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/icst/BlomeOLPD13,
  author    = {Abian Blome and
               Mart{\'{\i}}n Ochoa and
               Keqin Li and
               Michele Peroli and
               Mohammad Torabi Dashti},
  title     = {{VERA:} {A} Flexible Model-Based Vulnerability Testing Tool},
  booktitle = {Sixth {IEEE} International Conference on Software Testing, Verification
               and Validation, {ICST} 2013, Luxembourg, Luxembourg, March 18-22,
               2013},
  pages     = {471--478},
  year      = {2013},
  crossref  = {DBLP:conf/icst/2013},
  url       = {https://doi.org/10.1109/ICST.2013.65},
  doi       = {10.1109/ICST.2013.65},
  timestamp = {Wed, 24 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/icst/BlomeOLPD13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@phdthesis{DBLP:phd/dnb/Ronderos12,
  author    = {Mart{\'{\i}}n Ochoa Ronderos},
  title     = {Model based security guarantees and change},
  school    = {Dortmund University of Technology},
  year      = {2012},
  url       = {http://hdl.handle.net/2003/29594},
  urn       = {urn:nbn:de:101:1-201605033563},
  timestamp = {Wed, 04 May 2016 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/phd/dnb/Ronderos12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/cav/KopfMO12,
  author    = {Boris K{\"{o}}pf and
               Laurent Mauborgne and
               Mart{\'{\i}}n Ochoa},
  title     = {Automatic Quantification of Cache Side-Channels},
  booktitle = {Computer Aided Verification - 24th International Conference, {CAV}
               2012, Berkeley, CA, USA, July 7-13, 2012 Proceedings},
  pages     = {564--580},
  year      = {2012},
  crossref  = {DBLP:conf/cav/2012},
  url       = {https://doi.org/10.1007/978-3-642-31424-7_40},
  doi       = {10.1007/978-3-642-31424-7_40},
  timestamp = {Thu, 25 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/cav/KopfMO12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/essos/OchoaJW12,
  author    = {Mart{\'{\i}}n Ochoa and
               Jan J{\"{u}}rjens and
               Daniel Warzecha},
  title     = {A Sound Decision Procedure for the Compositionality of Secrecy},
  booktitle = {Engineering Secure Software and Systems - 4th International Symposium,
               ESSoS 2012, Eindhoven, The Netherlands, February, 16-17, 2012. Proceedings},
  pages     = {97--105},
  year      = {2012},
  crossref  = {DBLP:conf/essos/2012},
  url       = {https://doi.org/10.1007/978-3-642-28166-2_10},
  doi       = {10.1007/978-3-642-28166-2_10},
  timestamp = {Wed, 17 May 2017 14:24:40 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/essos/OchoaJW12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/sac/CuellarOR12,
  author    = {Jorge Cu{\'{e}}llar and
               Mart{\'{\i}}n Ochoa and
               Ruben Rios},
  title     = {Indistinguishable regions in geographic privacy},
  booktitle = {Proceedings of the {ACM} Symposium on Applied Computing, {SAC} 2012,
               Riva, Trento, Italy, March 26-30, 2012},
  pages     = {1463--1469},
  year      = {2012},
  crossref  = {DBLP:conf/sac/2012},
  url       = {http://doi.acm.org/10.1145/2245276.2232010},
  doi       = {10.1145/2245276.2232010},
  timestamp = {Fri, 08 Jun 2012 17:50:20 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/sac/CuellarOR12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/tools/OchoaJC12,
  author    = {Mart{\'{\i}}n Ochoa and
               Jan J{\"{u}}rjens and
               Jorge Cu{\'{e}}llar},
  title     = {Non-interference on {UML} State-Charts},
  booktitle = {Objects, Models, Components, Patterns - 50th International Conference,
               {TOOLS} 2012, Prague, Czech Republic, May 29-31, 2012. Proceedings},
  pages     = {219--235},
  year      = {2012},
  crossref  = {DBLP:conf/tools/50-2012},
  url       = {https://doi.org/10.1007/978-3-642-30561-0_16},
  doi       = {10.1007/978-3-642-30561-0_16},
  timestamp = {Tue, 23 May 2017 01:08:01 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/tools/OchoaJC12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/KopfMO12,
  author    = {Boris K{\"{o}}pf and
               Laurent Mauborgne and
               Mart{\'{\i}}n Ochoa},
  title     = {Automatic Quantification of Cache Side-Channels},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2012},
  pages     = {34},
  year      = {2012},
  url       = {http://eprint.iacr.org/2012/034},
  timestamp = {Wed, 19 Jul 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/KopfMO12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/FourneretOBBJY11,
  author    = {Elizabeta Fourneret and
               Mart{\'{\i}}n Ochoa and
               Fabrice Bouquet and
               Julien Botella and
               Jan J{\"{u}}rjens and
               Parvaneh Yousefi},
  title     = {Model-Based Security Verification and Testing for Smart-cards},
  booktitle = {Sixth International Conference on Availability, Reliability and Security,
               {ARES} 2011, Vienna, Austria, August 22-26, 2011},
  pages     = {272--279},
  year      = {2011},
  crossref  = {DBLP:conf/IEEEares/2011},
  url       = {https://doi.org/10.1109/ARES.2011.46},
  doi       = {10.1109/ARES.2011.46},
  timestamp = {Mon, 29 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/IEEEares/FourneretOBBJY11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ecmdafa/JurjensMOS11,
  author    = {Jan J{\"{u}}rjens and
               Lo{\"{\i}}c Marchal and
               Mart{\'{\i}}n Ochoa and
               Holger Schmidt},
  title     = {Incremental Security Verification for Evolving UMLsec models},
  booktitle = {Modelling Foundations and Applications - 7th European Conference,
               {ECMFA} 2011, Birmingham, UK, June 6 - 9, 2011 Proceedings},
  pages     = {52--68},
  year      = {2011},
  crossref  = {DBLP:conf/ecmdafa/2011},
  url       = {https://doi.org/10.1007/978-3-642-21470-7_5},
  doi       = {10.1007/978-3-642-21470-7_5},
  timestamp = {Mon, 22 May 2017 17:11:10 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/ecmdafa/JurjensMOS11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/sfm/JurjensOSMHI11,
  author    = {Jan J{\"{u}}rjens and
               Mart{\'{\i}}n Ochoa and
               Holger Schmidt and
               Lo{\"{\i}}c Marchal and
               Siv Hilde Houmb and
               Shareeful Islam},
  title     = {Modelling Secure Systems Evolution: Abstract and Concrete Change Specifications},
  booktitle = {Formal Methods for Eternal Networked Software Systems - 11th International
               School on Formal Methods for the Design of Computer, Communication
               and Software Systems, {SFM} 2011, Bertinoro, Italy, June 13-18, 2011.
               Advanced Lectures},
  pages     = {504--526},
  year      = {2011},
  crossref  = {DBLP:conf/sfm/2011},
  url       = {https://doi.org/10.1007/978-3-642-21455-4_15},
  doi       = {10.1007/978-3-642-21455-4_15},
  timestamp = {Wed, 24 May 2017 08:30:03 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/sfm/JurjensOSMHI11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/acns/2017,
  editor    = {Dieter Gollmann and
               Atsuko Miyaji and
               Hiroaki Kikuchi},
  title     = {Applied Cryptography and Network Security - 15th International Conference,
               {ACNS} 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10355},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-61204-1},
  doi       = {10.1007/978-3-319-61204-1},
  isbn      = {978-3-319-61203-4},
  timestamp = {Tue, 04 Jul 2017 13:27:06 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/acns/2017},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ccs/2017asiacpss,
  editor    = {Jianying Zhou and
               Ernesto Damiani},
  title     = {Proceedings of the 3rd {ACM} Workshop on Cyber-Physical System Security,
               CPSS@AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2, 2017},
  publisher = {{ACM}},
  year      = {2017},
  url       = {http://doi.acm.org/10.1145/3055186},
  doi       = {10.1145/3055186},
  isbn      = {978-1-4503-4956-7},
  timestamp = {Tue, 25 Apr 2017 14:47:37 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/ccs/2017asiacpss},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/eurosp/2017,
  title     = {2017 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
               2017, Paris, France, April 26-28, 2017},
  publisher = {{IEEE}},
  year      = {2017},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7961955},
  isbn      = {978-1-5090-5762-7},
  timestamp = {Wed, 12 Jul 2017 09:52:31 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/eurosp/2017},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/sac/2017,
  editor    = {Ahmed Seffah and
               Birgit Penzenstadler and
               Carina Alves and
               Xin Peng},
  title     = {Proceedings of the Symposium on Applied Computing, {SAC} 2017, Marrakech,
               Morocco, April 3-7, 2017},
  publisher = {{ACM}},
  year      = {2017},
  url       = {http://doi.acm.org/10.1145/3019612},
  doi       = {10.1145/3019612},
  isbn      = {978-1-4503-4486-9},
  timestamp = {Tue, 30 May 2017 13:26:11 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/sac/2017},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/cns/2016,
  title     = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
               2016, Philadelphia, PA, USA, October 17-19, 2016},
  publisher = {{IEEE}},
  year      = {2016},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7854080},
  isbn      = {978-1-5090-3065-1},
  timestamp = {Fri, 03 Mar 2017 14:28:48 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/cns/2016},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/essos/2016,
  editor    = {Juan Caballero and
               Eric Bodden and
               Elias Athanasopoulos},
  title     = {Engineering Secure Software and Systems - 8th International Symposium,
               ESSoS 2016, London, UK, April 6-8, 2016. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9639},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-30806-7},
  doi       = {10.1007/978-3-319-30806-7},
  isbn      = {978-3-319-30805-0},
  timestamp = {Wed, 17 May 2017 14:24:40 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/essos/2016},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/kbse/2016,
  editor    = {David Lo and
               Sven Apel and
               Sarfraz Khurshid},
  title     = {Proceedings of the 31st {IEEE/ACM} International Conference on Automated
               Software Engineering, {ASE} 2016, Singapore, September 3-7, 2016},
  publisher = {{ACM}},
  year      = {2016},
  url       = {http://doi.acm.org/10.1145/2970276},
  doi       = {10.1145/2970276},
  isbn      = {978-1-4503-3845-5},
  timestamp = {Mon, 10 Oct 2016 15:09:35 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/kbse/2016},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/pst/2016,
  title     = {14th Annual Conference on Privacy, Security and Trust, {PST} 2016,
               Auckland, New Zealand, December 12-14, 2016},
  publisher = {{IEEE}},
  year      = {2016},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7899233},
  isbn      = {978-1-5090-4379-8},
  timestamp = {Wed, 26 Apr 2017 09:10:24 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/pst/2016},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/sac/2016,
  editor    = {Sascha Ossowski},
  title     = {Proceedings of the 31st Annual {ACM} Symposium on Applied Computing,
               Pisa, Italy, April 4-8, 2016},
  publisher = {{ACM}},
  year      = {2016},
  url       = {http://doi.acm.org/10.1145/2851613},
  doi       = {10.1145/2851613},
  isbn      = {978-1-4503-3739-7},
  timestamp = {Mon, 06 Jun 2016 16:18:58 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/sac/2016},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/se/2016,
  editor    = {Jens Knoop and
               Uwe Zdun},
  title     = {Software Engineering 2016, Fachtagung des GI-Fachbereichs Softwaretechnik,
               23.-26. Februar 2016, Wien, {\"{O}}sterreich},
  series    = {{LNI}},
  volume    = {252},
  publisher = {{GI}},
  year      = {2016},
  url       = {http://subs.emis.de/LNI/Proceedings/Proceedings252.html},
  isbn      = {978-388579-646-6},
  timestamp = {Thu, 10 Mar 2016 14:37:54 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/se/2016},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/secrypt/2016,
  editor    = {Christian Callegari and
               Marten van Sinderen and
               Panagiotis G. Sarigiannidis and
               Pierangela Samarati and
               Enrique Cabello and
               Pascal Lorenz and
               Mohammad S. Obaidat},
  title     = {Proceedings of the 13th International Joint Conference on e-Business
               and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon,
               Portugal, July 26-28, 2016},
  publisher = {SciTePress},
  year      = {2016},
  isbn      = {978-989-758-196-0},
  timestamp = {Tue, 13 Sep 2016 14:32:10 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/secrypt/2016},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/sgcrc/2016,
  editor    = {Aditya Mathur and
               Abhik Roychoudhury},
  title     = {Proceedings of the Singapore Cyber-Security Conference {(SG-CRC)}
               2016 - Cyber-Security by Design, Singapore, January 14-15, 2016},
  series    = {Cryptology and Information Security Series},
  volume    = {14},
  publisher = {{IOS} Press},
  year      = {2016},
  isbn      = {978-1-61499-616-3},
  timestamp = {Wed, 22 Mar 2017 10:58:21 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/sgcrc/2016},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/dimva/2015,
  editor    = {Magnus Almgren and
               Vincenzo Gulisano and
               Federico Maggi},
  title     = {Detection of Intrusions and Malware, and Vulnerability Assessment
               - 12th International Conference, {DIMVA} 2015, Milan, Italy, July
               9-10, 2015, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9148},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-20550-2},
  doi       = {10.1007/978-3-319-20550-2},
  isbn      = {978-3-319-20549-6},
  timestamp = {Fri, 02 Jun 2017 20:51:35 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/dimva/2015},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ecoop/2015plas,
  editor    = {Michael Clarkson and
               Limin Jia},
  title     = {Proceedings of the 10th {ACM} Workshop on Programming Languages and
               Analysis for Security, PLAS@ECOOP 2015, Prague, Czech Republic, July
               4-10, 2015},
  publisher = {{ACM}},
  year      = {2015},
  url       = {http://doi.acm.org/10.1145/2786558},
  doi       = {10.1145/2786558},
  isbn      = {978-1-4503-3661-1},
  timestamp = {Tue, 08 Sep 2015 16:44:55 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/ecoop/2015plas},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/essos/2015,
  editor    = {Frank Piessens and
               Juan Caballero and
               Nataliia Bielova},
  title     = {Engineering Secure Software and Systems - 7th International Symposium,
               ESSoS 2015, Milan, Italy, March 4-6, 2015. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8978},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-15618-7},
  doi       = {10.1007/978-3-319-15618-7},
  isbn      = {978-3-319-15617-0},
  timestamp = {Wed, 17 May 2017 14:24:40 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/essos/2015},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/icse/2015spro,
  editor    = {Paolo Falcarin and
               Brecht Wyseur},
  title     = {1st {IEEE/ACM} International Workshop on Software Protection, {SPRO}
               2015, Florence, Italy, May 19, 2015},
  publisher = {{IEEE} Computer Society},
  year      = {2015},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7173494},
  isbn      = {978-1-4673-7094-3},
  timestamp = {Wed, 04 May 2016 09:36:29 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/icse/2015spro},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/malware/2015,
  title     = {10th International Conference on Malicious and Unwanted Software,
               {MALWARE} 2015, Fajardo, PR, USA, October 20-22, 2015},
  publisher = {{IEEE} Computer Society},
  year      = {2015},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7405773},
  isbn      = {978-1-5090-0317-4},
  timestamp = {Fri, 23 Dec 2016 12:48:28 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/malware/2015},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/provsec/2015,
  editor    = {Man Ho Au and
               Atsuko Miyaji},
  title     = {Provable Security - 9th International Conference, ProvSec 2015, Kanazawa,
               Japan, November 24-26, 2015, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9451},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-26059-4},
  doi       = {10.1007/978-3-319-26059-4},
  isbn      = {978-3-319-26058-7},
  timestamp = {Sun, 21 May 2017 00:20:53 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/provsec/2015},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/pst/2015,
  editor    = {Ali A. Ghorbani and
               Vicen{\c{c}} Torra and
               H{\"{u}}seyin Hisil and
               Ali Miri and
               Ahmet Koltuksuz and
               Jie Zhang and
               Murat Sensoy and
               Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
               Ibrahim Zincir},
  title     = {13th Annual Conference on Privacy, Security and Trust, {PST} 2015,
               Izmir, Turkey, July 21-23, 2015},
  publisher = {{IEEE} Computer Society},
  year      = {2015},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7193739},
  isbn      = {978-1-4673-7828-4},
  timestamp = {Fri, 23 Dec 2016 13:09:54 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/pst/2015},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ccs/2014asia,
  editor    = {Shiho Moriai and
               Trent Jaeger and
               Kouichi Sakurai},
  title     = {9th {ACM} Symposium on Information, Computer and Communications Security,
               {ASIA} {CCS} '14, Kyoto, Japan - June 03 - 06, 2014},
  publisher = {{ACM}},
  year      = {2014},
  url       = {http://dl.acm.org/citation.cfm?id=2590296},
  isbn      = {978-1-4503-2800-5},
  timestamp = {Tue, 21 Nov 2017 18:32:23 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/ccs/2014asia},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/post/2014,
  editor    = {Mart{\'{\i}}n Abadi and
               Steve Kremer},
  title     = {Principles of Security and Trust - Third International Conference,
               {POST} 2014, Held as Part of the European Joint Conferences on Theory
               and Practice of Software, {ETAPS} 2014, Grenoble, France, April 5-13,
               2014, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8414},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-642-54792-8},
  doi       = {10.1007/978-3-642-54792-8},
  isbn      = {978-3-642-54791-1},
  timestamp = {Wed, 24 May 2017 08:30:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/post/2014},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/sec/2014,
  editor    = {Nora Cuppens{-}Boulahia and
               Fr{\'{e}}d{\'{e}}ric Cuppens and
               Sushil Jajodia and
               Anas Abou El Kalam and
               Thierry Sans},
  title     = {{ICT} Systems Security and Privacy Protection - 29th {IFIP} {TC} 11
               International Conference, {SEC} 2014, Marrakech, Morocco, June 2-4,
               2014. Proceedings},
  series    = {{IFIP} Advances in Information and Communication Technology},
  volume    = {428},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-642-55415-5},
  doi       = {10.1007/978-3-642-55415-5},
  isbn      = {978-3-642-55414-8},
  timestamp = {Fri, 19 May 2017 01:25:10 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/sec/2014},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/vizsec/2014,
  editor    = {Kirsten Whitley and
               Sophie Engle and
               Lane Harrison and
               Fabian Fischer and
               Nicolas Prigent},
  title     = {Proceedings of the Eleventh Workshop on Visualization for Cyber Security,
               Paris, France, November 10, 2014},
  publisher = {{ACM}},
  year      = {2014},
  url       = {http://dl.acm.org/citation.cfm?id=2671491},
  isbn      = {978-1-4503-2826-5},
  timestamp = {Fri, 16 Jan 2015 14:14:35 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/vizsec/2014},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/icst/2013,
  title     = {Sixth {IEEE} International Conference on Software Testing, Verification
               and Validation, {ICST} 2013, Luxembourg, Luxembourg, March 18-22,
               2013},
  publisher = {{IEEE} Computer Society},
  year      = {2013},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6569023},
  isbn      = {978-1-4673-5961-0},
  timestamp = {Wed, 29 Mar 2017 16:45:26 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/icst/2013},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/cav/2012,
  editor    = {P. Madhusudan and
               Sanjit A. Seshia},
  title     = {Computer Aided Verification - 24th International Conference, {CAV}
               2012, Berkeley, CA, USA, July 7-13, 2012 Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7358},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-31424-7},
  doi       = {10.1007/978-3-642-31424-7},
  isbn      = {978-3-642-31423-0},
  timestamp = {Thu, 25 May 2017 00:39:07 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/cav/2012},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/essos/2012,
  editor    = {Gilles Barthe and
               Benjamin Livshits and
               Riccardo Scandariato},
  title     = {Engineering Secure Software and Systems - 4th International Symposium,
               ESSoS 2012, Eindhoven, The Netherlands, February, 16-17, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7159},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-28166-2},
  doi       = {10.1007/978-3-642-28166-2},
  isbn      = {978-3-642-28165-5},
  timestamp = {Wed, 17 May 2017 14:24:40 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/essos/2012},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/sac/2012,
  editor    = {Sascha Ossowski and
               Paola Lecca},
  title     = {Proceedings of the {ACM} Symposium on Applied Computing, {SAC} 2012,
               Riva, Trento, Italy, March 26-30, 2012},
  publisher = {{ACM}},
  year      = {2012},
  url       = {http://dl.acm.org/citation.cfm?id=2245276},
  isbn      = {978-1-4503-0857-1},
  timestamp = {Fri, 08 Jun 2012 17:50:20 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/sac/2012},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/tools/50-2012,
  editor    = {Carlo A. Furia and
               Sebastian Nanz},
  title     = {Objects, Models, Components, Patterns - 50th International Conference,
               {TOOLS} 2012, Prague, Czech Republic, May 29-31, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7304},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-30561-0},
  doi       = {10.1007/978-3-642-30561-0},
  isbn      = {978-3-642-30560-3},
  timestamp = {Tue, 23 May 2017 01:08:01 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/tools/50-2012},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/IEEEares/2011,
  title     = {Sixth International Conference on Availability, Reliability and Security,
               {ARES} 2011, Vienna, Austria, August 22-26, 2011},
  publisher = {{IEEE} Computer Society},
  year      = {2011},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6045375},
  isbn      = {978-1-4577-0979-1},
  timestamp = {Mon, 13 Apr 2015 17:11:04 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/IEEEares/2011},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ecmdafa/2011,
  editor    = {Robert B. France and
               Jochen Malte K{\"{u}}ster and
               Behzad Bordbar and
               Richard F. Paige},
  title     = {Modelling Foundations and Applications - 7th European Conference,
               {ECMFA} 2011, Birmingham, UK, June 6 - 9, 2011 Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6698},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-21470-7},
  doi       = {10.1007/978-3-642-21470-7},
  isbn      = {978-3-642-21469-1},
  timestamp = {Mon, 22 May 2017 17:11:10 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/ecmdafa/2011},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/sfm/2011,
  editor    = {Marco Bernardo and
               Val{\'{e}}rie Issarny},
  title     = {Formal Methods for Eternal Networked Software Systems - 11th International
               School on Formal Methods for the Design of Computer, Communication
               and Software Systems, {SFM} 2011, Bertinoro, Italy, June 13-18, 2011.
               Advanced Lectures},
  series    = {Lecture Notes in Computer Science},
  volume    = {6659},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-21455-4},
  doi       = {10.1007/978-3-642-21455-4},
  isbn      = {978-3-642-21454-7},
  timestamp = {Wed, 24 May 2017 08:30:03 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/sfm/2011},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
maintained by Schloss Dagstuhl LZI at University of Trier