User Tools

Site Tools


software

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
software [2014/08/18 21:23]
fabio.massacci@unitn.it [Click and Run]
software [2022/01/08 19:38]
Line 1: Line 1:
-====== Software from the Security Group in Trento ====== 
  
-The group has made available a number of software tools that can be also found in the individual [[research_activities|research activities]]. 
- 
-===== Click and Run ===== 
- 
-  * {{:​tissec-analysis-14.r.zip| R-code (zip file)}} to generate the case controlled [[vulnerability_discovery_models|study for vulnerability exploitation]] is available for sharing. the published paper is on ([[http://​dl.acm.org/​citation.cfm?​id=2630069|ACM TISSEC]]. The [[datasets|datasets]] are also available. 
- 
-  * TestREx (a Testbed for Repeatable Exploits) is available on [[https://​github.com/​standash/​TestREx|GitHub]] 
- 
- 
-===== Ask the Developer ===== 
- 
-  * As a result of our research on [[Securing Access to Cloud Storage]], we have developed a prototype for securing data, as well as access control policies in outsourced environments. To get the source code, please contact [[http://​disi.unitn.it/​~asghar/​|Muhammad Rizwan Asghar]]. 
-  * The web system for Autonomic Interactive Authorization is available as open source (http://​www.interactiveaccess.org). It is a result of our research on [[practical_enforcement_of_information_flow_properties|Practical Enforcement of Security Properties]]. 
-  * We released the binaries of the SxC verifier for Java Card (the developer version for PC). It is a result of our work on applying the Security-by-Contract paradigm to Java smart cards (check out [[security-by-contract_for_mobile_and_smart_card|Security-by-Contract for Mobiles and Smart Cards]] for more details). To get the binaries please contact Fabio Massacci or Olga Gadyatskaya[[name.surname@unitn.it]] ​ 
-  * UNICORN: modeling and reasoning on the uncertainty of requirements evolutions. It is a result of our research on [[security_requirements_engineering|Security Requirements Engineering]] 
software.txt ยท Last modified: 2022/01/08 19:38 (external edit)