Despite the acknowledged importance of quantitative security assessment in secure software development, current literature still lacks an efficient model for measuring internal …
N Medeiros, N Ivaki, P Costa, M Vieira - Journal of Systems and Software, 2023 - Elsevier
The exploitation of software security vulnerabilities can have severe consequences. Thus, it is crucial to devise new processes, techniques, and tools to support teams in the …
Vulnerability detection is an important challenge in the security community. Many different techniques have been proposed, ranging from symbolic execution to fuzzing in order to help …
JDA Pereira, M Vieira - 2023 IEEE 34th International …, 2023 - ieeexplore.ieee.org
The malicious exploitation of security flaws by attackers can lead to a range of problems. While several techniques and tools allow detecting vulnerabilities during the Software …
H Tao, L Fu, Y Chen, L Han, X Wang - Symmetry, 2022 - mdpi.com
Software trustworthiness allocation and reallocation are the symmetry of software trustworthiness measure. They can provide the optimization scheme for trustworthiness …
Developing embedded software applications is a challenging task, chiefly due to the limitations that are imposed by the hardware devices or platforms on which they operate, as …
I Medeiros, N Neves - 2020 16th European Dependable …, 2020 - ieeexplore.ieee.org
Web application security has become paramount for the organisation's operation, and therefore, static analysis tools (SAT) for vulnerability detection have been widely researched …
N Medeiros, N Ivaki, P Costa… - 2021 17th European …, 2021 - ieeexplore.ieee.org
The increasingly intensive use of software systems in diverse sectors, especially in business, government, healthcare, and critical infrastructures, makes it essential to deliver …
CI Lemes, V Naessens, M Vieira - 2019 IEEE 30th International …, 2019 - ieeexplore.ieee.org
The popularity of web applications and their world-wide use to support business critical operations raised the interest of hackers on exploiting security vulnerabilities to perform …