software
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| software [2014/08/18 21:24] – [Click and Run] fabio.massacci@unitn.it | software [Unknown date] (current) – external edit (Unknown date) 127.0.0.1 | ||
|---|---|---|---|
| Line 3: | Line 3: | ||
| The group has made available a number of software tools that can be also found in the individual [[research_activities|research activities]]. | The group has made available a number of software tools that can be also found in the individual [[research_activities|research activities]]. | ||
| - | ===== Click and Run ===== | + | ===== Download |
| - | + | * **LastPyMie** (A tool for identifying the differences between build artifacts of PyPI packages and the respective source code repository) is available on [[https:// | |
| - | * {{: | + | * {{: |
| - | * TestREx (a Testbed for Repeatable Exploits) is available on [[https:// | + | |
| + | * **MalwareLab** scripts for experimenting with exploit kits described in our [[malware_analysis]] are available for download {{: | ||
| + | * The // | ||
| Line 12: | Line 14: | ||
| * As a result of our research on [[Securing Access to Cloud Storage]], we have developed a prototype for securing data, as well as access control policies in outsourced environments. To get the source code, please contact [[http:// | * As a result of our research on [[Securing Access to Cloud Storage]], we have developed a prototype for securing data, as well as access control policies in outsourced environments. To get the source code, please contact [[http:// | ||
| - | * The web system for Autonomic Interactive Authorization is available as open source (http:// | ||
| * We released the binaries of the SxC verifier for Java Card (the developer version for PC). It is a result of our work on applying the Security-by-Contract paradigm to Java smart cards (check out [[security-by-contract_for_mobile_and_smart_card|Security-by-Contract for Mobiles and Smart Cards]] for more details). To get the binaries please contact Fabio Massacci or Olga Gadyatskaya[[name.surname@unitn.it]] | * We released the binaries of the SxC verifier for Java Card (the developer version for PC). It is a result of our work on applying the Security-by-Contract paradigm to Java smart cards (check out [[security-by-contract_for_mobile_and_smart_card|Security-by-Contract for Mobiles and Smart Cards]] for more details). To get the binaries please contact Fabio Massacci or Olga Gadyatskaya[[name.surname@unitn.it]] | ||
| * UNICORN: modeling and reasoning on the uncertainty of requirements evolutions. It is a result of our research on [[security_requirements_engineering|Security Requirements Engineering]] | * UNICORN: modeling and reasoning on the uncertainty of requirements evolutions. It is a result of our research on [[security_requirements_engineering|Security Requirements Engineering]] | ||
software.1408389855.txt.gz · Last modified: (external edit)
