software
This is an old revision of the document!
Table of Contents
Software from the Security Group in Trento
The group has made available a number of software tools that can be also found in the individual research activities.
Click and Run
- R-code (zip file) to generate the case controlled study for vulnerability exploitation is available for sharing. the published paper is on ACM TISSEC. The datasets are also available.
- TestREx (a Testbed for Repeatable Exploits) is available on GitHub
- Autonomic Interactive Authorization is available as open source. It is a result of our research on Practical Enforcement of Security Properties.
Ask the Developer
- As a result of our research on Securing Access to Cloud Storage, we have developed a prototype for securing data, as well as access control policies in outsourced environments. To get the source code, please contact Muhammad Rizwan Asghar.
- We released the binaries of the SxC verifier for Java Card (the developer version for PC). It is a result of our work on applying the Security-by-Contract paradigm to Java smart cards (check out Security-by-Contract for Mobiles and Smart Cards for more details). To get the binaries please contact Fabio Massacci or Olga Gadyatskayaname.surname@unitn.it
- UNICORN: modeling and reasoning on the uncertainty of requirements evolutions. It is a result of our research on Security Requirements Engineering
software.1408390079.txt.gz · Last modified: (external edit)
