Dylan Léveillé and Jason Jaskolka. A game-theoretic approach for security control selection. In Antonios Achilleos and Andrian Francalanza, editors, Proceedings of the 15th International Symposium on Games, Automata, Logics and Formal Verification, volume 409 of Electronic Proceedings in Theoretical Computer Science, pages 103–119. Open Publishing Association, Reykjavi, Iceland, 2024.
Nilofar Mansourzadeh, Anil Somayaji, and Jason Jaskolka. A fragility metric for software diversity. In Proceedings of the 19th Annual Symposium on Information Assurance, ASIA 2024 , pages 121–129, Albany, NY, USA, 2024.
John Breton, Jason Jaskolka, and George O.M. Yee. Hardening systems against data corruption attacks at design time. In Mohamed Mosbah, Florence Sèdes, Nadia Tawbi, Toufik Ahmed, Nora Boulahia-Cuppens and Joaquin Garcia-Alfaro, editors, Proceedings of the 16th International Symposium on Foundations & Practice of Security, FPS 2023, volume 14551 of Lecture Notes in Computer Science, pages 391-407, Bordeaux, France, 2024.
Quentin Rouland, Stojanche Gjorcheski, and Jason Jaskolka. A security compliance-by-design framework utilizing reusable formal models. In Proceedings of the 2023 IEEE 23rd International Conference on Software Quality, Reliability, and Security Companion, QRS-C, pages 186–195, Chiang Mai, Thailand, 2023.
Marwa Zeroual, Brahim Hamid, Morayo Adedjouma, and Jason Jaskolka. Formal model-based argument patterns for security cases. In Proceedings of the 28th European Conference on Pattern Languages of Programs, EuroPLoP 2023, pages 1-12, 2023.
James Baak, Quentin Rouland, and Jason Jaskolka. A formal metamodel with composite components. In Mohamed Mosbah, Tahar Kechadi, Ladjel Bellatreche, and Faiez Gargouri, editors, Proceedings of the 12th International Conference on Model and Data Engineering, MEDI 2023, volume 14396 of Lecture Notes in Computer Science, pages 15-29, Sousse, Tunisia, 2023.
Marwa Zeroual, Brahim Hamid, Morayo Adedjouma, and Jason Jaskolka. Constructing security cases based on formal verification of security requirements in Alloy. In Jérémie Guiochet, Stefano Tonetta, Erwin Schoitsch, Matthieu Roy, and Friedemann Bitsch, editors, Computer Safety, Reliability, and Security. SAFECOMP 2023 Workshops, volume 14182 of Lecture Notes in Computer Science, pages 15–25, Toulouse, France, 2023.
Sanaa Alwidian and Jason Jaskolka. Understanding the role of human-related factors in security requirements elicitation. In Alessio Ferrari and Birgit Penzenstadler, editors, Proceedings of the 29th International Working Conference on Requirements Engineering: Foundation for Software Quality, REFSQ 2023, volume 13975 of Lecture Notes in Computer Science, pages 65-74, Barcelona, Spain, 2023.
Alvi Jawad and Jason Jaskolka. Defense models for data recovery in industrial control systems. In Guy-Vincent Jourdan, Laurent Mounier, Carlisle Adams, Florence Sèdes, and Joaquin Garcia-Alfaro, editors, Proceedings of the 15th International Symposium on Foundations & Practice of Security, FPS 2022, volume 13877 of Lecture Notes in Computer Science, pages 198-216, Ottawa, ON, Canada, 2023.
Marwa Zeroual, Brahim Hamid, Morayo Adedjouma, and Jason Jaskolka. Towards logical specification of adversarial examples in machine learning. In Proceedings of the 2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, pages 1575-1580, 2022.
Bohdana Sereda and Jason Jaskolka. An evaluation of IoT security guidance documents: A shared responsibility perspective. In Elhadi Shakshuki and Muhammad Younas, editors, Proceedings of the 13th International Conference on Ambient Systems, Networks and Technologies, volume 201C of Procedia Computer Science, ANT 2022, pages 281-288, Porto, Portugal, 2022.
Joe Samuel, Jason Jaskolka, and George O.M. Yee. Leveraging external data sources to enhance secure system design. In Proceedings of the 2021 Reconciling Data Analytics, Automation, Privacy, and Security: A Big Data Challenge, RDAAPS 2021, pages 1–8, Hamilton, ON, Canada, 2021.
Quentin Rouland, Brahim Hamid, and Jason Jaskolka. Reusable formal models for threat specification, detection, and treatment. In Sihem Ben Sassi, Stéphane Ducasse, and Hafedh Mili, editors, Reuse in Emerging Software Engineering Practices, Proceedings of the 19th International Conference on Software and Systems Reuse, ICSR 2020, volume 12541 of Lecture Notes in Computer Science, pages 52–68, Hammamet, Tunisia, December 2020. Springer International Publishing. (Winner of the Best Paper Award)
Thomas Sattolo and Jason Jaskolka. Evaluation of statistical tests for detecting storage-based covert channels. In Marko Hölbl, Kai Rannenberg, and Tatjana Welzer, editors, Proceedings of the 35th International Conference on ICT Systems Security and Privacy Protection, IFIP SEC 2020, volume 580 of IFIP Advances in Information and Communication Technology, pages 17–31, Maribor, Slovenia, September 2020. Springer, Cham.
Quentin Rouland, Brahim Hamid, and Jason Jaskolka. Formalizing reusable communication models for distributed systems architecture. In El Hassan Abdelwahed, Ladjel Bellatreche, Mattéo Golfarelli, Dominique Méry, and Carlos Ordonez, editors, Proceedings of the 8th International Conference on Model and Data Engineering, MEDI 2018, volume 11163 of Lecture Notes in Computer Science, pages 198-216, Marrakesh, Morocco, October 2018.
Jason Jaskolka and Ridha Khedri. Towards the certification of covert channel freeness in cloud-based systems. In Elhadi Shakshuki, editor, Proceedings of the 6th International Conference on Ambient Systems, Networks and Technologies, volume 52 of Procedia Computer Science, ANT 2015 and SEIT 2015, pages 318–225, London, UK, June 2015.
Share: Twitter, Facebook
Short URL:
https://carleton.ca/cybersea/?p=155