Olga Gadyatskaya
Olga Gadyatskaya
Research Associate
Verified email at uni.lu - Homepage
TitleCited byYear
Stadyna: Addressing the problem of dynamic code updates in the security analysis of android applications
Y Zhauniarovich, M Ahmad, O Gadyatskaya, B Crispo, F Massacci
Proceedings of the 5th ACM Conference on Data and Application Security and …, 2015
662015
Fsquadra: fast detection of repackaged applications
Y Zhauniarovich, O Gadyatskaya, B Crispo, F La Spina, E Moser
IFIP Annual Conference on Data and Applications Security and Privacy, 130-145, 2014
522014
Towards black box testing of android apps
Y Zhauniarovich, A Philippov, O Gadyatskaya, B Crispo, F Massacci
2015 10th International Conference on Availability, Reliability and Security …, 2015
282015
Attack trees for practical security assessment: ranking of attack scenarios with ADTool 2.0
O Gadyatskaya, R Jhawar, P Kordy, K Lounis, S Mauw, R Trujillo-Rasua
International Conference on Quantitative Evaluation of Systems, 159-162, 2016
262016
Modelling attack-defense trees using timed automata
O Gadyatskaya, RR Hansen, KG Larsen, A Legay, MC Olesen, ...
International Conference on Formal Modeling and Analysis of Timed Systems, 35-50, 2016
192016
Using attack-defense trees to analyze threats and countermeasures in an ATM: a case study
M Fraile, M Ford, O Gadyatskaya, R Kumar, M Stoelinga, R Trujillo-Rasua
IFIP Working Conference on The Practice of Enterprise Modeling, 326-334, 2016
182016
Small changes, big changes: an updated view on the Android permission system
Y Zhauniarovich, O Gadyatskaya
International Symposium on Research in Attacks, Intrusions, and Defenses …, 2016
172016
Enabling trusted stores for android
Y Zhauniarovich, O Gadyatskaya, B Crispo
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
162013
Security in the Firefox OS and Tizen mobile platforms
O Gadyatskaya, F Massacci, Y Zhauniarovich
Computer 47 (6), 57-63, 2014
142014
Can We Support Applications’ Evolution in Multi-application Smart Cards by Security-by-Contract?
N Dragoni, O Gadyatskaya, F Massacci
IFIP International Workshop on Information Security Theory and Practices …, 2010
142010
How to generate security cameras: towards defence generation for socio-technical systems
O Gadyatskaya
International Workshop on Graphical Models for Security, 50-65, 2015
132015
Evaluation of resource-based app repackaging detection in android
O Gadyatskaya, AL Lezza, Y Zhauniarovich
Nordic Conference on Secure IT Systems, 135-151, 2016
112016
Bridging two worlds: reconciling practical risk assessment methodologies with theory of attack trees
O Gadyatskaya, C Harpes, S Mauw, C Muller, S Muller
International Workshop on Graphical Models for Security, 80-93, 2016
112016
A load time Policy Checker for open multi-application smart cards
N Dragoni, E Lostal, O Gadyatskaya, F Massacci, F Paci
2011 IEEE International Symposium on Policies for Distributed Systems and …, 2011
92011
Security-by-Contract for the OSGi platform
O Gadyatskaya, F Massacci, A Philippov
IFIP International Information Security Conference, 364-375, 2012
82012
Load time security verification
O Gadyatskaya, E Lostal, F Massacci
International Conference on Information Systems Security, 250-264, 2011
62011
Security-by-contract for applicationsevolution in multi-application smart cards
N Dragoni, O Gadyatskaya, F Massacci
Proc. of NODES, DTU Technical Report, 297-312, 2010
62010
Refinement-aware generation of attack trees
O Gadyatskaya, R Jhawar, S Mauw, R Trujillo-Rasua, TAC Willemse
International Workshop on Security and Trust Management, 164-179, 2017
52017
New directions in attack tree research: Catching up with industrial needs
O Gadyatskaya, R Trujillo-Rasua
International Workshop on Graphical Models for Security, 115-126, 2017
52017
Using EDP-polynomials for network structure optimization
O Gadyatskaya, A Rodionov, O Rodionova
International Conference on Computational Science and Its Applications, 1061 …, 2008
52008
The system can't perform the operation now. Try again later.
Articles 1–20