Journal Articles

  1. Quentin Rouland, Brahim Hamid, and Jason Jaskolka. Specification, detection, and treatment of STRIDE threats for software components: Modeling, formal methods, and tool support. Journal of Systems Architecture, 117:102073, August 2021.
  2. Quentin Rouland, Brahim Hamid, and Jason Jaskolka. Formal specification and verification of reusable communication models for distributed systems architecture. Future Generation Computer Systems, 108:178-197, July 2020.
  3. Maxime Buyse and Jason Jaskolka. Communicating concurrent Kleene algebra for distributed systems specification. Archive of Formal Proofs, p. 22, August 2019.
  4. Jason Jaskolka and John Villasenor. An approach for identifying and analyzing implicit interactions in distributed systems. IEEE Transactions on Reliability, 66(2):529-546, June 2017.
  5. Jason Jaskolka and Ridha Khedri. Mitigating covert channels based on analysis of the potential for communicationTheoretical Computer Science, 643:1–37, August 2016.

Conference Papers

  1. Alvi Jawad and Jason Jaskolka. Modeling and simulation approaches for cybersecurity impact analysis: State-of-the-art. In Proceedings of the 2021 Annual Modeling and Simulation Conference, ANNSIM 2021, pages 1–12, Fairfax, VA, USA, 2021.
  2. Joe Samuel, Jason Jaskolka, and George O.M. Yee. Leveraging external data sources to enhance secure system design. In Proceedings of the 2021 Reconciling Data Analytics, Automation, Privacy, and Security: A Big Data Challenge, RDAAPS 2021, pages 1–8, Hamilton, ON, Canada, 2021.
  3. Joe Samuel, Khalil Aalab, and Jason Jaskolka. Evaluating the soundness of security metrics from vulnerability scoring frameworks. In Proceedings of the 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, IEEE TrustCom 2020, pages 442–449, Guangzhou, China, 2020.
  4. Jason Jaskolka. Identifying and analyzing implicit interactions in a wastewater dechlorination system. In Sokratis Katsikas et al., editors, Computer Security. CyberICPS 2020, SECPRE 2020, ADIoT 2020, volume 12501 of Lecture Notes in Computer Science, pages 34–51, Guildford, UK, 2020. Springer, Cham.
  5. Quentin Rouland, Brahim Hamid, and Jason Jaskolka. Reusable formal models for threat specification, detection, and treatment. In Sihem Ben Sassi, Stéphane Ducasse, and Hafedh Mili, editors, Reuse in Emerging Software Engineering Practices, Proceedings of the 19th International Conference on Software and Systems Reuse, ICSR 2020, volume 12541 of Lecture Notes in Computer Science, pages 52–68, Hammamet, Tunisia, December 2020. Springer International Publishing. (Winner of the Best Paper Award)
  6. Thomas Sattolo and Jason Jaskolka. Evaluation of statistical tests for detecting storage-based covert channels. In Marko Hölbl, Kai Rannenberg, and Tatjana Welzer, editors, Proceedings of the 35th International Conference on ICT Systems Security and Privacy Protection, IFIP SEC 2020, volume 580 of IFIP Advances in Information and Communication Technology, pages 17–31, Maribor, Slovenia, September 2020. Springer, Cham.
  7. Jason Jaskolka. Recommendations for effective security assurance of software-dependent systems. In Kohei Arai, Supriya Kapoor, and Rahul Bhatia, editors, Intelligent Computing, SAI 2020, volume 1230 of Advances in Intelligent Systems and Computing, pages 511–531. London, UK, 2020. Springer, Cham.
  8. Brahim Hamid, Quentin Rouland, and Jason Jaskolka. Distributed maintenance of a spanning tree of k-connected graphs. In Proceedings of the 24th IEEE Pacific Rim International Symposium on Dependable Computing, pages 217-226, Kyoto, Japan, December 2019.
  9. Quentin Rouland, Brahim Hamid, and Jason Jaskolka. Formalizing reusable communication models for distributed systems architecture. In El Hassan Abdelwahed, Ladjel Bellatreche, Mattéo Golfarelli, Dominique Méry, and Carlos Ordonez, editors, Proceedings of the 8th International Conference on Model and Data EngineeringMEDI 2018, volume 11163 of Lecture Notes in Computer Science, pages 198-216, Marrakesh, Morocco, October 2018.
  10. Jason Jaskolka. Challenges in assuring security and resilience of advanced metering infrastructure. In Proceedings of the 18th annual IEEE Canada Electrical Power and Energy Conference, EPEC 2018, Toronto, ON, Canada, 2018.
  11. Jason Jaskolka and Ridha Khedri. Towards the certification of covert channel freeness in cloud-based systems. In Elhadi Shakshuki, editor, Proceedings of the 6th International Conference on Ambient Systems, Networks and Technologies, volume 52 of Procedia Computer Science, ANT 2015 and SEIT 2015, pages 318–225, London, UK, June 2015.