User Tools

Site Tools


software

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
software [2014/08/18 21:23]
fabio.massacci@unitn.it [Click and Run]
software [2022/01/08 19:38] (current)
Line 3: Line 3:
 The group has made available a number of software tools that can be also found in the individual [[research_activities|research activities]]. The group has made available a number of software tools that can be also found in the individual [[research_activities|research activities]].
  
-===== Click and Run ===== +===== Download ​and Run ===== 
- +  * **LastPyMie** (A tool for identifying the differences between build artifacts of PyPI packages and the respective source code repository) is available on [[https://​github.com/​assuremoss/​lastpymile|Github]]. The paper appears on [[https://​securitylab.disi.unitn.it/​lib/​exe/​fetch.php?​media=research_activities:​experiments:​esecfse2021.pdf|ESEC/​FSE'​21]]. 
-  * {{:​tissec-analysis-14.r.zip| R-code (zip file)}} to generate the case controlled [[vulnerability_discovery_models|study for vulnerability exploitation]] is available for sharing. ​the published ​paper is on ([[http://​dl.acm.org/​citation.cfm?​id=2630069|ACM TISSEC]]. The [[datasets|datasets]] are also available. +  * {{:​tissec-analysis-14.r.zip| R-code (zip file)}} to generate the case controlled [[vulnerability_discovery_models|study for vulnerability exploitation]] is available for sharing. ​The paper appears in [[http://​dl.acm.org/​citation.cfm?​id=2630069|ACM TISSEC]]. The [[datasets|datasets]] are also available. 
- +  ​* **TestREx** (a Testbed for Repeatable Exploits) is available on [[https://​github.com/​standash/​TestREx|GitHub]]. Instructions on how to use are available on our [[testrex|wiki]]. The paper appears on [[https://​www.usenix.org/​system/​files/​conference/​cset14/​cset14-paper-dashevskyi.pdf|USENIX CSET'​14]]. 
-  * TestREx (a Testbed for Repeatable Exploits) is available on [[https://​github.com/​standash/​TestREx|GitHub]]+  * **MalwareLab** scripts for experimenting with exploit kits described in our [[malware_analysis]] are available for download {{:​malwarelab-experiment-unitn.zip|(ZIP)}}. The paper appears in [[https://​www.usenix.org/​conference/​cset13/​workshop-program/​presentation/​allodi|Usenix CSET 2013]]. An additional archive with historical releases of Mozilla Firefox, Opera Browser, Adobe Flash and Adobe Reader is also available for sharing. You can follow the guidelines [[datasets|here]] to request it. 
 +  * The //​Web-service for Autonomic Interactive Authorization//​ is available as [[http://​www.interactiveaccess.org|open source]]. The paper appears in [[http://​dx.doi.org/​10.1145/​1380422.1380424|ACM TAAS]].
  
  
Line 13: Line 14:
  
   * As a result of our research on [[Securing Access to Cloud Storage]], we have developed a prototype for securing data, as well as access control policies in outsourced environments. To get the source code, please contact [[http://​disi.unitn.it/​~asghar/​|Muhammad Rizwan Asghar]].   * As a result of our research on [[Securing Access to Cloud Storage]], we have developed a prototype for securing data, as well as access control policies in outsourced environments. To get the source code, please contact [[http://​disi.unitn.it/​~asghar/​|Muhammad Rizwan Asghar]].
-  * The web system for Autonomic Interactive Authorization is available as open source (http://​www.interactiveaccess.org). It is a result of our research on [[practical_enforcement_of_information_flow_properties|Practical Enforcement of Security Properties]]. 
   * We released the binaries of the SxC verifier for Java Card (the developer version for PC). It is a result of our work on applying the Security-by-Contract paradigm to Java smart cards (check out [[security-by-contract_for_mobile_and_smart_card|Security-by-Contract for Mobiles and Smart Cards]] for more details). To get the binaries please contact Fabio Massacci or Olga Gadyatskaya[[name.surname@unitn.it]] ​   * We released the binaries of the SxC verifier for Java Card (the developer version for PC). It is a result of our work on applying the Security-by-Contract paradigm to Java smart cards (check out [[security-by-contract_for_mobile_and_smart_card|Security-by-Contract for Mobiles and Smart Cards]] for more details). To get the binaries please contact Fabio Massacci or Olga Gadyatskaya[[name.surname@unitn.it]] ​
   * UNICORN: modeling and reasoning on the uncertainty of requirements evolutions. It is a result of our research on [[security_requirements_engineering|Security Requirements Engineering]]   * UNICORN: modeling and reasoning on the uncertainty of requirements evolutions. It is a result of our research on [[security_requirements_engineering|Security Requirements Engineering]]
software.1408389833.txt.gz · Last modified: 2021/01/29 10:58 (external edit)