This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
software [2014/08/18 21:23] fabio.massacci@unitn.it [Click and Run] |
software [2022/01/08 19:38] |
||
---|---|---|---|
Line 1: | Line 1: | ||
- | ====== Software from the Security Group in Trento ====== | ||
- | The group has made available a number of software tools that can be also found in the individual [[research_activities|research activities]]. | ||
- | |||
- | ===== Click and Run ===== | ||
- | |||
- | * {{:tissec-analysis-14.r.zip| R-code (zip file)}} to generate the case controlled [[vulnerability_discovery_models|study for vulnerability exploitation]] is available for sharing. the published paper is on ([[http://dl.acm.org/citation.cfm?id=2630069|ACM TISSEC]]. The [[datasets|datasets]] are also available. | ||
- | |||
- | * TestREx (a Testbed for Repeatable Exploits) is available on [[https://github.com/standash/TestREx|GitHub]] | ||
- | |||
- | |||
- | ===== Ask the Developer ===== | ||
- | |||
- | * As a result of our research on [[Securing Access to Cloud Storage]], we have developed a prototype for securing data, as well as access control policies in outsourced environments. To get the source code, please contact [[http://disi.unitn.it/~asghar/|Muhammad Rizwan Asghar]]. | ||
- | * The web system for Autonomic Interactive Authorization is available as open source (http://www.interactiveaccess.org). It is a result of our research on [[practical_enforcement_of_information_flow_properties|Practical Enforcement of Security Properties]]. | ||
- | * We released the binaries of the SxC verifier for Java Card (the developer version for PC). It is a result of our work on applying the Security-by-Contract paradigm to Java smart cards (check out [[security-by-contract_for_mobile_and_smart_card|Security-by-Contract for Mobiles and Smart Cards]] for more details). To get the binaries please contact Fabio Massacci or Olga Gadyatskaya[[name.surname@unitn.it]] | ||
- | * UNICORN: modeling and reasoning on the uncertainty of requirements evolutions. It is a result of our research on [[security_requirements_engineering|Security Requirements Engineering]] |