{"id":231,"date":"2022-11-20T20:02:51","date_gmt":"2022-11-20T20:02:51","guid":{"rendered":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/?p=231"},"modified":"2022-12-11T21:49:22","modified_gmt":"2022-12-11T21:49:22","slug":"software-security","status":"publish","type":"post","link":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/2022\/11\/20\/software-security\/","title":{"rendered":"Software security"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.18.0&#8243; text_font=&#8221;|600|||||||&#8221; text_text_color=&#8221;#000000&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<\/p>\n<ul>\n<li><span style=\"font-size: medium\">B. Sayed, I. Traore, A. Abdelhalim, \u201c<a href=\"https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0167404818300397\">If-transpiler: Inlining of hybrid flow sensitive security monitor for JavaScript<\/a>\u201d, Journal of Computers &amp; Security, Elsevier, 75 (2018) 92\u2013117.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">A. Hoole, I. Traore, A. Delaitre, C. de Oliveira, &#8220;<a href=\"https:\/\/www.uvic.ca\/ecs\/ece\/isot\/assets\/docs\/EASE_2016_Improving%20Vulnerability%20Detection%20Measurement.pdf\">Improving Vulnerabilities Detection Measurement<\/a>\u00a0\u2013 Test Suites and Software Security Assurance&#8221;, 20<sup>th<\/sup>\u00a0ACM International Conference on Evaluation and Assessment in Software Engineering (EASE \u201916), June 01 &#8211; 03, 2016, Limerick, Ireland.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">B. Sayed, I. Traore, A. Abdelhalim, &#8220;<a href=\"https:\/\/www.uvic.ca\/ecs\/ece\/isot\/assets\/docs\/PST2014_Detection%20and%20Mitigation%20of%20Malicious%20JavaScript%20Using%20Information%20Flow%20Contro.pdf\">Detection and Mitigation of Malicious JavaScript Using Information Flow Control<\/a>&#8220;, 12<sup>th<\/sup>\u00a0Annual Conference on Privacy, Security and Trust (PST2014), Toronto, Ontario, Canada, July 22-24, 2014.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">I. Traore, I. Woungang, &#8220;Software Security Engineering: Part II&#8221; in Software Development Techniques for Constructive Information Systems Design, Khalid A Buragga and Noor Zaman (Eds.), IGI Global, pages 256-284 (35 pages), March 2013.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">I. Traore, I. Woungang, &#8220;Software Security Engineering: Part I\u201d in Software Development Techniques for Constructive Information Systems Design, Khalid A Buragga and Noor Zaman (Eds.), IGI Global, pages 221-255 (35 pages), March 2013.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">A. Hoole, I. Traore, I. Simplot-Ryl,\u00a0<a class=\"pdf\" href=\"http:\/\/www.isot.ece.uvic.ca\/publications\/software-securityx\/Liu_Traore_Hoole_2008_APSCC.pdf\" target=\"_blank\" rel=\"noopener\">&#8220;Application of contract-based security assertion monitoring framework for telecommunications software engineering&#8221;<\/a>, Mathematical and Computer Modeling Journal, Elsevier, Vol. 53, No.3-4, pp. 522-537, February 2011.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">M. L. Yanguo, I. Traore, A.M. Hoole,\u00a0<a class=\"pdf\" href=\"http:\/\/www.isot.ece.uvic.ca\/publications\/software-securityx\/Liu_Traore_Hoole_2008_APSCC.pdf\" target=\"_blank\" rel=\"noopener\">&#8220;A service-oriented framework for quantitative security analysis of software architectures&#8221;<\/a>, in the Proceedings of IEEE International Workshop on Dependable and Secure Service Computing 2008 (DSSC2008), Dec. 9-12, Jioasi, Yilan, Taiwan, in conjunction with IEEE APSCC 2008.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">M. Hoole, I. Traore,\u00a0<a class=\"pdf\" href=\"http:\/\/www.isot.ece.uvic.ca\/publications\/software-securityx\/Hoole_Traore_2008_APSCC.pdf\" target=\"_blank\" rel=\"noopener\">&#8220;Contract-based security monitors for service-oriented software architecture&#8221;<\/a>, in the Proceedings of IEEE International Workshop on Dependable and Secure Service Computing 2008 (DSSC2008), Dec. 9-12, Jioasi, Yilan, Taiwan, in conjunction with IEEE APSCC 2008.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">A. Hoole, I. Simplot-Ryl, I. Traore,\u00a0<a class=\"pdf\" href=\"http:\/\/www.isot.ece.uvic.ca\/publications\/software-securityx\/FLACOS_2008.pdf\" target=\"_blank\" rel=\"noopener\">&#8220;Integrating contract-based security monitors in the software development life cycle&#8221;<\/a>, in the Proceedings of 2nd Workshop on Formal Languages and Analysis of Contract-Oriented Software (FLACOS 2008), Malta, November 27-28, 2008, (6 pages).<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">M. Y. Liu, I. Traore,\u00a0<a class=\"pdf\" href=\"http:\/\/www.isot.ece.uvic.ca\/publications\/software-security\/SOSE07-24.pdf\" target=\"_blank\" rel=\"noopener\">&#8220;Systematic security analysis for service-oriented software architectures&#8221;<\/a>, in the Proceedings of 3rd IEEE International Workshop on Service-Oriented System Engineering (SOSE07), Hong-Kong, China, on Oct. 24-26, 2007 (10 pages).<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">M. Y. Liu, I. Traore,\u00a0<a class=\"pdf\" href=\"http:\/\/www.isot.ece.uvic.ca\/publications\/software-security\/PROMISE07-25.pdf\" target=\"_blank\" rel=\"noopener\">&#8220;Complexity measures for secure service-oriented software architecture&#8221;<\/a>, in the Proceedings of the 3rd IEEE International Predictor Models in Software Engineering (PROMISE) Workshop, May 20, 2007, Minneapolis, Minnesota, USA, in conjunction with 29th International Conference on Software Engineering (ICSE); (10 pages).<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">M. Y. Liu, I. Traore,\u00a0<a class=\"pdf\" href=\"http:\/\/www.isot.ece.uvic.ca\/publications\/software-security\/AMIS-26.pdf\" target=\"_blank\" rel=\"noopener\">&#8220;Properties for security measures of software products&#8221;<\/a>, Applied Mathematics &amp; Information Science (AMIS) Journal, 1 (2), pp.129-156 (28 pages), May 2007.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">D. Ghindici, G. Grimaud, I. Ryl, Y. Liu, I. Traore,\u00a0<a class=\"pdf\" href=\"http:\/\/www.isot.ece.uvic.ca\/publications\/software-security\/SOSE07-24.pdf\" target=\"_blank\" rel=\"noopener\">&#8220;Integrated security verification and validation: case study&#8221;<\/a>, Proceedings of 2nd IEEE LCN Workshop on Network Security, Tampa, Florida, U.S.A., 14 November 2006.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">M. Y. Liu, I. Traore,\u00a0<a class=\"pdf\" href=\"http:\/\/www.isot.ece.uvic.ca\/publications\/software-security\/PLAS06-28.pdf\" target=\"_blank\" rel=\"noopener\">&#8220;Empirical relations between attackability and coupling: a case study on DoS&#8221;<\/a>, Proc. of ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS), P. 57-64, Ottawa, Canada, June 2006.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">M. Y. Liu, Issa Traore,\u00a0<a class=\"pdf\" href=\"http:\/\/www.isot.ece.uvic.ca\/publications\/journals\/liu-ISSM05.pdf\" target=\"_blank\" rel=\"noopener\">&#8220;Measurement framework for software privilege protection based on user interaction analysis&#8221;<\/a>, 11th IEEE International Software Metrics Symposium, 19-22 September 2005, Como, Italy.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">M. Y. Liu, I. Traore,\u00a0<a class=\"pdf\" href=\"http:\/\/www.isot.ece.uvic.ca\/publications\/conferences\/MOMPES-2004.pdf\" target=\"_blank\" rel=\"noopener\">&#8220;UML-based security measures of software products&#8221;<\/a>, International Workshop on Methodologies for Pervasive and Embedded Software (MOMPES\u201904), 4th International Conference on Application of Concurrency to System Design (ACSD-04), Hamilton, Ontario, Canada, June 2004<\/span><\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>B. Sayed, I. Traore, A. Abdelhalim, \u201cIf-transpiler: Inlining of hybrid flow sensitive security monitor for JavaScript\u201d, Journal of Computers &amp; Security, Elsevier, 75 (2018) 92\u2013117. A. Hoole, I. Traore, A. Delaitre, C. de Oliveira, &#8220;Improving Vulnerabilities Detection Measurement\u00a0\u2013 Test Suites and Software Security Assurance&#8221;, 20th\u00a0ACM International Conference on Evaluation and Assessment in Software Engineering (EASE [&hellip;]<\/p>\n","protected":false},"author":17669,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"<h1 id=\"PageTopHeading\">\u00a0<\/h1><ol><li>B. Sayed, I. Traore, A. Abdelhalim, \u201c<a href=\"https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0167404818300397\">If-transpiler: Inlining of hybrid flow sensitive security monitor for JavaScript<\/a>\u201d, Journal of Computers & Security, Elsevier, 75 (2018) 92\u2013117.<\/li><li>A. Hoole, I. Traore, A. Delaitre, C. de Oliveira, \"<a href=\"https:\/\/www.uvic.ca\/ecs\/ece\/isot\/assets\/docs\/EASE_2016_Improving%20Vulnerability%20Detection%20Measurement.pdf\">Improving Vulnerabilities Detection Measurement<\/a>\u00a0\u2013 Test Suites and Software Security Assurance\", 20<sup>th<\/sup>\u00a0ACM International Conference on Evaluation and Assessment in Software Engineering (EASE \u201916), June 01 - 03, 2016, Limerick, Ireland.<\/li><li>B. Sayed, I. Traore, A. Abdelhalim, \"<a href=\"https:\/\/www.uvic.ca\/ecs\/ece\/isot\/assets\/docs\/PST2014_Detection%20and%20Mitigation%20of%20Malicious%20JavaScript%20Using%20Information%20Flow%20Contro.pdf\">Detection and Mitigation of Malicious JavaScript Using Information Flow Control<\/a>\", 12<sup>th<\/sup>\u00a0Annual Conference on Privacy, Security and Trust (PST2014), Toronto, Ontario, Canada, July 22-24, 2014.<\/li><li>I. Traore, I. Woungang, \"Software Security Engineering: Part II\" in Software Development Techniques for Constructive Information Systems Design, Khalid A Buragga and Noor Zaman (Eds.), IGI Global, pages 256-284 (35 pages), March 2013.<\/li><li>I. Traore, I. Woungang, \"Software Security Engineering: Part I\u201d in Software Development Techniques for Constructive Information Systems Design, Khalid A Buragga and Noor Zaman (Eds.), IGI Global, pages 221-255 (35 pages), March 2013.<\/li><li>A. Hoole, I. Traore, I. Simplot-Ryl,\u00a0<a class=\"pdf\" href=\"http:\/\/www.isot.ece.uvic.ca\/publications\/software-securityx\/Liu_Traore_Hoole_2008_APSCC.pdf\" target=\"_blank\" rel=\"noopener\">\"Application of contract-based security assertion monitoring framework for telecommunications software engineering\"<\/a>, Mathematical and Computer Modeling Journal, Elsevier, Vol. 53, No.3-4, pp. 522-537, February 2011.<\/li><li>M. L. Yanguo, I. Traore, A.M. Hoole,\u00a0<a class=\"pdf\" href=\"http:\/\/www.isot.ece.uvic.ca\/publications\/software-securityx\/Liu_Traore_Hoole_2008_APSCC.pdf\" target=\"_blank\" rel=\"noopener\">\"A service-oriented framework for quantitative security analysis of software architectures\"<\/a>, in the Proceedings of IEEE International Workshop on Dependable and Secure Service Computing 2008 (DSSC2008), Dec. 9-12, Jioasi, Yilan, Taiwan, in conjunction with IEEE APSCC 2008.<\/li><li>M. Hoole, I. Traore,\u00a0<a class=\"pdf\" href=\"http:\/\/www.isot.ece.uvic.ca\/publications\/software-securityx\/Hoole_Traore_2008_APSCC.pdf\" target=\"_blank\" rel=\"noopener\">\"Contract-based security monitors for service-oriented software architecture\"<\/a>, in the Proceedings of IEEE International Workshop on Dependable and Secure Service Computing 2008 (DSSC2008), Dec. 9-12, Jioasi, Yilan, Taiwan, in conjunction with IEEE APSCC 2008.<\/li><li>A. Hoole, I. Simplot-Ryl, I. Traore,\u00a0<a class=\"pdf\" href=\"http:\/\/www.isot.ece.uvic.ca\/publications\/software-securityx\/FLACOS_2008.pdf\" target=\"_blank\" rel=\"noopener\">\"Integrating contract-based security monitors in the software development life cycle\"<\/a>, in the Proceedings of 2nd Workshop on Formal Languages and Analysis of Contract-Oriented Software (FLACOS 2008), Malta, November 27-28, 2008, (6 pages).<\/li><li>M. Y. Liu, I. Traore,\u00a0<a class=\"pdf\" href=\"http:\/\/www.isot.ece.uvic.ca\/publications\/software-security\/SOSE07-24.pdf\" target=\"_blank\" rel=\"noopener\">\"Systematic security analysis for service-oriented software architectures\"<\/a>, in the Proceedings of 3rd IEEE International Workshop on Service-Oriented System Engineering (SOSE07), Hong-Kong, China, on Oct. 24-26, 2007 (10 pages).<\/li><li>M. Y. Liu, I. Traore,\u00a0<a class=\"pdf\" href=\"http:\/\/www.isot.ece.uvic.ca\/publications\/software-security\/PROMISE07-25.pdf\" target=\"_blank\" rel=\"noopener\">\"Complexity measures for secure service-oriented software architecture\"<\/a>, in the Proceedings of the 3rd IEEE International Predictor Models in Software Engineering (PROMISE) Workshop, May 20, 2007, Minneapolis, Minnesota, USA, in conjunction with 29th International Conference on Software Engineering (ICSE); (10 pages).<\/li><li>M. Y. Liu, I. Traore,\u00a0<a class=\"pdf\" href=\"http:\/\/www.isot.ece.uvic.ca\/publications\/software-security\/AMIS-26.pdf\" target=\"_blank\" rel=\"noopener\">\"Properties for security measures of software products\"<\/a>, Applied Mathematics & Information Science (AMIS) Journal, 1 (2), pp.129-156 (28 pages), May 2007.<\/li><li>D. Ghindici, G. Grimaud, I. Ryl, Y. Liu, I. Traore,\u00a0<a class=\"pdf\" href=\"http:\/\/www.isot.ece.uvic.ca\/publications\/software-security\/SOSE07-24.pdf\" target=\"_blank\" rel=\"noopener\">\"Integrated security verification and validation: case study\"<\/a>, Proceedings of 2nd IEEE LCN Workshop on Network Security, Tampa, Florida, U.S.A., 14 November 2006.<\/li><li>M. Y. Liu, I. Traore,\u00a0<a class=\"pdf\" href=\"http:\/\/www.isot.ece.uvic.ca\/publications\/software-security\/PLAS06-28.pdf\" target=\"_blank\" rel=\"noopener\">\"Empirical relations between attackability and coupling: a case study on DoS\"<\/a>, Proc. of ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS), P. 57-64, Ottawa, Canada, June 2006.<\/li><li>M. Y. Liu, Issa Traore,\u00a0<a class=\"pdf\" href=\"http:\/\/www.isot.ece.uvic.ca\/publications\/journals\/liu-ISSM05.pdf\" target=\"_blank\" rel=\"noopener\">\"Measurement framework for software privilege protection based on user interaction analysis\"<\/a>, 11th IEEE International Software Metrics Symposium, 19-22 September 2005, Como, Italy.<\/li><li>M. Y. Liu, I. Traore,\u00a0<a class=\"pdf\" href=\"http:\/\/www.isot.ece.uvic.ca\/publications\/conferences\/MOMPES-2004.pdf\" target=\"_blank\" rel=\"noopener\">\"UML-based security measures of software products\"<\/a>, International Workshop on Methodologies for Pervasive and Embedded Software (MOMPES\u201904), 4th International Conference on Application of Concurrency to System Design (ACSD-04), Hamilton, Ontario, Canada, June 2004<\/li><\/ol>","_et_gb_content_width":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[5,4],"tags":[],"class_list":["post-231","post","type-post","status-publish","format-standard","hentry","category-by-area","category-publications"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/posts\/231","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/users\/17669"}],"replies":[{"embeddable":true,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/comments?post=231"}],"version-history":[{"count":6,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/posts\/231\/revisions"}],"predecessor-version":[{"id":1165,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/posts\/231\/revisions\/1165"}],"wp:attachment":[{"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/media?parent=231"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/categories?post=231"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/tags?post=231"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}