Follow
Olga Gadyatskaya
Olga Gadyatskaya
Associate professor at LIACS, Leiden University
Verified email at liacs.leidenuniv.nl - Homepage
Title
Cited by
Cited by
Year
Stadyna: Addressing the problem of dynamic code updates in the security analysis of android applications
Y Zhauniarovich, M Ahmad, O Gadyatskaya, B Crispo, F Massacci
Proceedings of the 5th ACM Conference on Data and Application Security and …, 2015
1292015
FSquaDRA: Fast detection of repackaged applications
Y Zhauniarovich, O Gadyatskaya, B Crispo, F La Spina, E Moser
Data and Applications Security and Privacy XXVIII: 28th Annual IFIP WG 11.3 …, 2014
862014
Using attack-defense trees to analyze threats and countermeasures in an ATM: a case study
M Fraile, M Ford, O Gadyatskaya, R Kumar, M Stoelinga, R Trujillo-Rasua
The Practice of Enterprise Modeling: 9th IFIP WG 8.1. Working Conference …, 2016
712016
Modelling attack-defense trees using timed automata
O Gadyatskaya, RR Hansen, KG Larsen, A Legay, MC Olesen, ...
Formal Modeling and Analysis of Timed Systems: 14th International Conference …, 2016
672016
Attack trees for practical security assessment: ranking of attack scenarios with ADTool 2.0
O Gadyatskaya, R Jhawar, P Kordy, K Lounis, S Mauw, R Trujillo-Rasua
International Conference on Quantitative Evaluation of Systems, 159-162, 2016
622016
Towards black box testing of android apps
Y Zhauniarovich, A Philippov, O Gadyatskaya, B Crispo, F Massacci
2015 10th International Conference on Availability, Reliability and Security …, 2015
502015
Small changes, big changes: an updated view on the android permission system
Y Zhauniarovich, O Gadyatskaya
Research in Attacks, Intrusions, and Defenses: 19th International Symposium …, 2016
492016
Attribute evaluation on attack trees with incomplete information
A Buldas, O Gadyatskaya, A Lenin, S Mauw, R Trujillo-Rasua
Computers & Security 88, 101630, 2020
402020
Fine-grained code coverage measurement in automated black-box android testing
A Pilgun, O Gadyatskaya, Y Zhauniarovich, S Dashevskyi, A Kushniarou, ...
ACM Transactions on Software Engineering and Methodology (TOSEM) 29 (4), 1-35, 2020
362020
Refinement-aware generation of attack trees
O Gadyatskaya, R Jhawar, S Mauw, R Trujillo-Rasua, TAC Willemse
Security and Trust Management: 13th International Workshop, STM 2017, Oslo …, 2017
312017
Evaluation of resource-based app repackaging detection in android
O Gadyatskaya, AL Lezza, Y Zhauniarovich
Secure IT Systems: 21st Nordic Conference, NordSec 2016, Oulu, Finland …, 2016
272016
Security in the Firefox OS and Tizen mobile platforms
O Gadyatskaya, F Massacci, Y Zhauniarovich
Computer 47 (6), 57-63, 2014
272014
Bridging two worlds: reconciling practical risk assessment methodologies with theory of attack trees
O Gadyatskaya, C Harpes, S Mauw, C Muller, S Muller
Graphical Models for Security: Third International Workshop, GraMSec 2016 …, 2016
232016
How to generate security cameras: towards defence generation for socio-technical systems
O Gadyatskaya
Graphical Models for Security: Second International Workshop, GraMSec 2015 …, 2016
222016
Dissecting android cryptocurrency miners
S Dashevskyi, Y Zhauniarovich, O Gadyatskaya, A Pilgun, H Ouhssain
Proceedings of the Tenth ACM Conference on Data and Application Security and …, 2020
212020
New directions in attack tree research: catching up with industrial needs
O Gadyatskaya, R Trujillo-Rasua
Graphical Models for Security: 4th International Workshop, GraMSec 2017 …, 2018
212018
Enabling trusted stores for android
Y Zhauniarovich, O Gadyatskaya, B Crispo
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
192013
Can We Support Applications’ Evolution in Multi-Application Smart Cards by Security-by-Contract?
N Dragoni, O Gadyatskaya, F Massacci
Information Security Theory and Practices. Security and Privacy of Pervasive …, 2010
182010
An effective android code coverage tool
A Pilgun, O Gadyatskaya, S Dashevskyi, Y Zhauniarovich, A Kushniarou
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
172018
Security-by-Contract for the OSGi platform
O Gadyatskaya, F Massacci, A Philippov
IFIP International Information Security Conference, 364-375, 2012
132012
The system can't perform the operation now. Try again later.
Articles 1–20