2023

  1. Quentin Rouland, Stojanche Gjorcheski, and Jason Jaskolka. A security compliance-by-design framework utilizing reusable formal models. In Proceedings of the 2023 IEEE 23rd International Conference on Software Quality, Reliability, and Security CompanionQRS-C, pages 186–195, Chiang Mai, Thailand, 2023.
  2. Marwa Zeroual, Brahim Hamid, Morayo Adedjouma, and Jason Jaskolka. Formal model-based argument patterns for security cases. In Proceedings of the 28th European Conference on Pattern Languages of Programs, EuroPLoP 2023, pages 1-12, 2023.
  3. James Baak, Quentin Rouland, and Jason Jaskolka. A formal metamodel with composite components. In Mohamed Mosbah, Tahar Kechadi, Ladjel Bellatreche, and Faiez Gargouri, editors, Proceedings of the 12th International Conference on Model and Data EngineeringMEDI 2023, volume 14396 of Lecture Notes in Computer Science, pages 15-29, Sousse, Tunisia, 2023.
  4. Loïc Thierry, Jason Jaskolka, Brahim Hamid, and Jean-Paul Bodeveix. Specification and verification of communication paradigms for CBSE in Event B. In Proceedings of the 27th International Conference on Engineering of Complex Computer SystemsICECSS 2023, pages 157–166, Toulouse, France, 2023.
  5. Alvi Jawad and Jason Jaskolka. Single and combined cyberattack impact on industrial wastewater systems. In Proceedings of the 10th International Conference on Dependable Systems and Their ApplicationsDSA 2023, pages 272–281, Tokyo, Japan, 2023.
  6. Quentin Rouland, Stojanche Gjorcheski, and Jason Jaskolka. Eliciting a security architecture requirements baseline from standards and regulations. In Proceedings of the 2023 IEEE 31st International Requirements Engineering Conference WorkshopsREW, pages 224–229, Hannover, Germany, 2023.
  7. Mohannad Abu Issa, Abdelrahman Eldosouky, Mohamed Ibnkahla, Jason Jaskolka, and Ashraf Matrawy. Integrating medical and wearable devices with e-health systems using horizontal IoT platforms. In Proceedings of the 2023 IEEE Sensors Applications SymposiumSAS, pages 1–6, Ottawa, ON, Canada, 2023.
  8. Marwa Zeroual, Brahim Hamid, Morayo Adedjouma, and Jason Jaskolka. Constructing security cases based on formal verification of security requirements in Alloy. In Jérémie Guiochet, Stefano Tonetta, Erwin Schoitsch, Matthieu Roy, and Friedemann Bitsch, editors, Computer Safety, Reliability, and Security. SAFECOMP 2023 Workshops, volume 14182 of Lecture Notes in Computer Science, pages 15–25, Toulouse, France, 2023.
  9. Quentin Rouland, Brahim Hamid, Jean-Paul Bodeveix, and Jason Jaskolka. Formalizing the relationship between security policies and objectives in software architectures. In Proceedings of the 2023 IEEE 20th International Conference on Software Architecture CompanionICSA-C 2023, pages 151–158, L’Aquila, Italy, 2023.
  10. Sanaa Alwidian and Jason Jaskolka. Understanding the role of human-related factors in security requirements elicitation. In Alessio Ferrari and Birgit Penzenstadler, editors, Proceedings of the 29th International Working Conference on Requirements Engineering: Foundation for Software QualityREFSQ 2023, volume 13975 of Lecture Notes in Computer Science, pages 65-74, Barcelona, Spain, 2023.
  11. Alvi Jawad and Jason Jaskolka. Defense models for data recovery in industrial control systems. In Guy-Vincent Jourdan, Laurent Mounier, Carlisle Adams, Florence Sèdes, and Joaquin Garcia-Alfaro, editors, Proceedings of the 15th International Symposium on Foundations & Practice of SecurityFPS 2022, volume 13877 of Lecture Notes in Computer Science, pages 198-216, Ottawa, ON, Canada, 2023.

2022

  1. Xinrui Zhang and Jason Jaskolka. Conceptualizing the secure machine learning operations (SecMLOps) paradigm. In Proceedings of the 22nd IEEE International Conference on Software Quality, Reliability, and Security, QRS 2022, pages 127-138, 2022.
  2. Marwa Zeroual, Brahim Hamid, Morayo Adedjouma, and Jason Jaskolka. Towards logical specification of adversarial examples in machine learning. In Proceedings of the 2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, pages 1575-1580, 2022.
  3. Jason Jaskolka and Brahim Hamid. Towards the integration of human factors in collaborative decision making for secure architecture design. In Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, ASE 2022, pages 1-8, Rochester, MI, USA, 2022.
  4. Jediael Mendoza, Jason Mycroft, Lyam Milbury, Nafiseh Kahani, and Jason Jaskolka. On the effectiveness of data balancing techniques in the context of ML-based test case prioritization. In Proceedings of the 18th International Conference on Predictive Models and Data Analytics in Software Engineering, PROMISE 2022, pages 72-81, Singapore, 2022.
  5. Xinrui Zhang and Jason Jaskolka. Security patterns for machine learning: The data-oriented stages. In Proceedings of the 27th European Conference on Pattern Languages of Programs, EuroPLoP 2022, pages 1-12, 2022.
  6. Jason Jaskolka, Brahim Hamid, and Sahar Kokaly. Software design trends supporting multi-concern assurance. IEEE Software, 39(4):22–26, July/August 2022.
  7. Andrew Le Clair, Jason Jaskolka, Wendy MacCaull, and Ridha Khedri. Architecture for ontology-supported multi-context reasoning systems. Data & Knowledge Engineering, 140:102044, July 2022.
  8. Sajib Kumar Kuri, Tarim Islam, Jason Jaskolka, and Mohamed Ibnkahla. A threat model and security recommendations for IoT sensors in connected vehicle networks. In Proceedings of the 2022 IEEE 95th Vehicular Technology Conference, VTC-Spring 2022, pages 1-5, Helsinki, Finland, 2022.
  9. Alvi Jawad, Luke Newton, Ashraf Matrawy, and Jason Jaskolka. A formal analysis of the efficacy of rebooting as a countermeasure against IoT botnets. In Proceedings of the 2022 IEEE International Conference on Communications, IEEE ICC 2022, pages 2206-2211, Seoul, South Korea, 2022.
  10. Bohdana Sereda and Jason Jaskolka. An evaluation of IoT security guidance documents: A shared responsibility perspective. In Elhadi Shakshuki and Muhammad Younas, editors, Proceedings of the 13th International Conference on Ambient Systems, Networks and Technologies, volume 201C of Procedia Computer Science, ANT 2022, pages 281-288, Porto, Portugal, 2022.

2021

  1. Alvi Jawad and Jason Jaskolka. Analyzing the impact of cyberattacks on industrial control systems using timed automata. In Proceedings of the 21st IEEE International Conference on Software Quality, Reliability, and Security, QRS 2021, pages 966-977, Hainan Island, China, 2021.
  2. Joe Samuel, Jason Jaskolka, and George O.M. Yee. Analyzing structural security posture to evaluate system design decisions. In Proceedings of the 21st IEEE International Conference on Software Quality, Reliability, and Security, QRS 2021, page 8-17, Hainan Island, China, 2021.
  3. Jason Jaskolka, Brahim Hamid, Alvi Jawad, and Joe Samuel. A secure development decomposition argument pattern for structured assurance case models. In Proceedings of the 28th Conference on Pattern Languages of Programs, PLoP 2021, pages 1-11, 2021.
  4. Jason Jaskolka, Brahim Hamid, Alvi Jawad, and Joe Samuel. A security property decomposition argument pattern for structured assurance case models. In Proceedings of the 26th European Conference on Pattern Languages of Programs, EuroPLoP 2021, pages 1-10, Graz, Austria, 2021.
  5. Luke Newton and Jason Jaskolka. Analyzing implicit interactions to identify weak points in cyber-physical system designs. In Proceedings of the 2021 Resilience Week Symposium, pages 1-8, Salt Lake City, UT, USA, 2021.
  6. Alvi Jawad and Jason Jaskolka. Modeling and simulation approaches for cybersecurity impact analysis: State-of-the-art. In Proceedings of the 2021 Annual Modeling and Simulation Conference, ANNSIM 2021, pages 1–12, Fairfax, VA, USA, 2021.
  7. Joe Samuel, Jason Jaskolka, and George O.M. Yee. Leveraging external data sources to enhance secure system design. In Proceedings of the 2021 Reconciling Data Analytics, Automation, Privacy, and Security: A Big Data Challenge, RDAAPS 2021, pages 1–8, Hamilton, ON, Canada, 2021.
  8. Quentin Rouland, Brahim Hamid, and Jason Jaskolka. Specification, detection, and treatment of STRIDE threats for software components: Modeling, formal methods, and tool support. Journal of Systems Architecture, 117:102073, August 2021.

2020

  1. Joe Samuel, Khalil Aalab, and Jason Jaskolka. Evaluating the soundness of security metrics from vulnerability scoring frameworks. In Proceedings of the 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, IEEE TrustCom 2020, pages 442–449, Guangzhou, China, 2020.
  2. Jason Jaskolka. Identifying and analyzing implicit interactions in a wastewater dechlorination system. In Sokratis Katsikas et al., editors, Computer Security. CyberICPS 2020, SECPRE 2020, ADIoT 2020, volume 12501 of Lecture Notes in Computer Science, pages 34–51, Guildford, UK, 2020. Springer, Cham.
  3. Quentin Rouland, Brahim Hamid, and Jason Jaskolka. Reusable formal models for threat specification, detection, and treatment. In Sihem Ben Sassi, Stéphane Ducasse, and Hafedh Mili, editors, Reuse in Emerging Software Engineering Practices, Proceedings of the 19th International Conference on Software and Systems Reuse, ICSR 2020, volume 12541 of Lecture Notes in Computer Science, pages 52–68, Hammamet, Tunisia, December 2020. Springer International Publishing. (Winner of the Best Paper Award)
  4. Thomas Sattolo and Jason Jaskolka. Evaluation of statistical tests for detecting storage-based covert channels. In Marko Hölbl, Kai Rannenberg, and Tatjana Welzer, editors, Proceedings of the 35th International Conference on ICT Systems Security and Privacy Protection, IFIP SEC 2020, volume 580 of IFIP Advances in Information and Communication Technology, pages 17–31, Maribor, Slovenia, September 2020. Springer, Cham.
  5. Jason Jaskolka. Recommendations for effective security assurance of software-dependent systems. In Kohei Arai, Supriya Kapoor, and Rahul Bhatia, editors, Intelligent Computing, SAI 2020, volume 1230 of Advances in Intelligent Systems and Computing, pages 511–531. London, UK, 2020. Springer, Cham.
  6. Quentin Rouland, Brahim Hamid, and Jason Jaskolka. Formal specification and verification of reusable communication models for distributed systems architecture. Future Generation Computer Systems, 108:178-197, July 2020.

2019

  1. Brahim Hamid, Quentin Rouland, and Jason Jaskolka. Distributed maintenance of a spanning tree of k-connected graphs. In Proceedings of the 24th IEEE Pacific Rim International Symposium on Dependable Computing, pages 217-226, Kyoto, Japan, December 2019.
  2. Maxime Buyse* and Jason Jaskolka. Communicating concurrent Kleene algebra for distributed systems specification. Archive of Formal Proofs, p. 22, August 2019.

2018

  1. Quentin Rouland, Brahim Hamid, and Jason JaskolkaFormalizing Reusable Communication Models for Distributed Systems Architecture. In El Hassan Abdelwahed, Ladjel Bellatreche, Mattéo Golfarelli, Dominique Méry, and Carlos Ordonez, editors,Proceedings of the 8th International Conference on Model and Data EngineeringMEDI 2018, volume 11163 of Lecture Notes in Computer Science, pages 198-216, Marrakesh, Morocco, October 2018.
  2. Jason JaskolkaChallenges in Assuring Security and Resilience of Advanced Metering Infrastructure. In Proceedings of the 18th annual IEEE Canada Electrical Power and Energy ConferenceEPEC 2018, Toronto, ON, Canada, 2018.
  3. Jason Jaskolka. Assurance cases for security and resilience of advanced metering infrastructure. Technical Report Prepared for Natural Resources Canada, March, 2018.

2017

  1. Jason Jaskolka and John Villasenor. Securing Cyber-Dependent Maritime Systems and OperationsNMIO Technical Bulletin 12:4-6, June 2017.
  2. Jason Jaskolka and John Villasenor. An Approach for Identifying and Analyzing Implicit Interactions in Distributed Systems. IEEE Transactions on Reliability, 66(2):529-546, June 2017.
  3. Jason Jaskolka and John Villasenor. Identifying Implicit Component Interactions in Distributed Cyber-Physical Systems. In Proceedings of the 50th Hawaii International Conference on System SciencesHICSS-50, pages 5988–5997, Hilton Waikoloa Village, HI, U.S.A., January 2017.

2016

  1. Monika Bialy, Vera Pantelic, Jason Jaskolka, Alexander Schaap, Lucian Patcas, Mark Lawford, and Alan Wassyng. Handbook of System Safety and Security: Cyber Risk and Risk Management, Cyber Security, Threat Analysis, Functional Safety, Software Systems, and Cyber Physical Systems, Chapter 3: Software Engineering for Model-Based Development by Domain Experts, pages 39-64. Elsevier, First Edition, October 2016.
  2. Jason Jaskolka and Ridha Khedri. Mitigating Covert Channels Based on Analysis of the Potential for CommunicationTheoretical Computer Science, 643:1–37, August 2016.

2015

  1. Jason Jaskolka, Wendy MacCaull, and Ridha Khedri. Towards an Ontology Design Architecture. In Proceedings of the 2015 International Conference on Computational Science and Computational Intelligence, CSCI 2015, pages 132–135, Las Vegas, NV, U.S.A., December 2015.
  2. Monika Bialy, Jacques Carette, Lane Gibson, Jason Jaskolka, Mark Lawford, Bennett Mackenzie, Tom Maibaum, Archana Mallya, Gordon Marks, Vera Pantelic, Alexander Schaap, Syed Asim Shah, and Alan Wassyng. Phase 1 Quarterly Report 8 on APC LEAP – Embedded Software Project. Technical Report, McMaster Centre for Software Certification, Hamilton, ON, Canada, December 2015.
  3. Jason Jaskolka, Wendy MacCaull, and Ridha Khedri. Towards an Architectural Framework for Systematically Designing Ontologies. Technical Report CAS-15-09-RK, McMaster University, Hamilton, ON, Canada, November 2015.
  4. Jason Jaskolka, Ridha Khedri, and Khair Eddin Sabri. Investigative Support for Information ConfidentialityJournal of Ambient Intelligence and Humanized Computing, 6(4):425-451, August 2015.
  5. Jason Jaskolka and Ridha Khedri. Towards the Certification of Covert Channel Freeness in Cloud-Based Systems. In Elhadi Shakshuki, editor, Proceedings of the 6th International Conference on Ambient Systems, Networks and Technologies, volume 52 of Procedia Computer Science, ANT 2015 and SEIT 2015, pages 318–225, London, UK, June 2015.
  6. Jason JaskolkaOn the Modeling, Analysis, and Mitigation of Distributed Covert Channels. Ph.D. thesis, McMaster University, Hamilton, ON, Canada. March 2015.

2014

  1. Jason Jaskolka and Ridha Khedri. A Formulation of the Potential for Communication Condition using C2KA. In Adriano Peron and Carla Piazza, editors, Proceedings of the 5th International Symposium on Games, Automata, Logics and Formal Verification, volume 161 of Electronic Proceedings in Theoretical Computer Science, pages 161-174. Open Publishing Association, Verona, Italy, September 2014.
  2. Jason Jaskolka, Ridha Khedri, and Khair Eddin Sabri. Investigative Support for Confidentiality Part I: Detecting Information Leakage via Protocol-Based Covert Channels. In Proceedings of the 9th International Conference on Future Networks and Communications, volume 34 of Procedia Computer Science, FNC 2014 and MobiSPC 2014, pages 276–285, Niagara Falls, ON, Canada, August 2014. (Invited Paper).
  3. Jason Jaskolka, Ridha Khedri, and Khair Eddin Sabri. Investigative Support for Confidentiality Part II: Applications in Cryptanalysis and Digital Forensics. In Proceedings of the 9th International Conference on Future Networks and Communications, volume 34 of Procedia Computer Science, FNC 2014 and MobiSPC 2014, pages 266–275, Niagara Falls, ON, Canada, August 2014. (Invited Paper).
  4. Qinglei Zhang, Ridha Khedri, and Jason JaskolkaAn Aspect-Oriented Language for Feature-ModelingJournal of Ambient Intelligence and Humanized Computing, 5(3):343-356, June 2014.
  5. Jason Jaskolka, Ridha Khedri, and Qinglei Zhang. Endowing Concurrent Kleene Algebra with Communication Actions. In Peter Höfner, Peter Jipsen, Wolfram Kahl, and Martin E. Müller, editors, Proceedings of the 14th International Conference on Relational and Algebraic Methods in Computer Science, volume 8428 of Lecture Notes in Computer Science, pages 19-36. Springer International Publishing Switzerland, Marienstatt, Germany, April 2014.

2013

  1. Jason Jaskolka, Ridha Khedri, and Qinglei Zhang. Foundations of Communicating Concurrent Kleene Algebra. Technical Report CAS-13-07-RK, McMaster University, Hamilton, ON, Canada, November 2013.

2012

  1. Qinglei Zhang, Ridha Khedri, and Jason JaskolkaVerification of Aspectual Composition in Feature-Modeling. In George Eleftherakis, Mike Hinchey, and Mike Holcombe, editors, Proceedings of the 10th International Conference on Software Engineering and Formal Methods, volume 7504 of Lecture Notes in Computer Science, pages 109–125. Springer Berlin/Heidelberg, Thessaloniki, Greece, October 2012.
  2. Jason Jaskolka, Ridha Khedri, and Qinglei Zhang. On the Necessary Conditions for Covert Channel Existence: A State-of-the-Art Survey. In Elhadi Shakshuki and Muhammad Younas, editors, Proceedings of the 3rd International Conference on Ambient Systems, Networks and Technologies, volume 10 of Procedia Computer Science, ANT 2012 and MobiWIS 2012, pages 458–465, Niagara Falls, ON, Canada, August 2012.
  3. Qinglei Zhang, Ridha Khedri, and Jason JaskolkaAn Aspect-Oriented Language for Product Family Specification. In Elhadi Shakshuki and Muhammad Younas, editors, Proceedings of the 3rd International Conference on Ambient Systems, Networks and Technologies, volume 10 of Procedia Computer Science, ANT 2012 and MobiWIS 2012, pages 482–489, Niagara Falls, ON, Canada, August 2012.

2011

  1. Qinglei Zhang, Ridha Khedri, and Jason JaskolkaAn Aspect-Oriented Language Based on Product Family Algebra: Aspects Specification and Verification. Technical Report CAS-11-08-RK, McMaster University, Hamilton, ON, Canada, November 2011.
  2. Jason Jaskolka, Ridha Khedri, and Khair Eddin Sabri. A Formal Test for Detecting Information Leakage via Covert Channels. In Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, CSIIRW7, pages 1–4, Oak Ridge, TN, U.S.A., October 2011.
  3. Jason Jaskolka, Ridha Khedri, and Khair Eddin Sabri. Information Leakage via Protocol-Based Covert Channels: Detection, Automation, and Applications. Technical Report CAS-11-05-RK, McMaster University, Hamilton, ON, Canada, August 2011.
  4. Jason Jaskolka and Ridha Khedri. Exploring Covert Channels. In Proceedings of the 44th Hawaii International Conference on System Sciences, HICSS-44, pages 1–10, Koloa, Kauai, HI, U.S.A., January 2011.

2010

  1. Jason JaskolkaModeling, Analysis, and Detection of Information Leakage via Protocol-Based Covert Channels. Master’s thesis, McMaster University, Hamilton, ON, Canada. September 2010.

2009

  1. Khair Eddin Sabri, Ridha Khedri, and Jason JaskolkaAdvanced Technologies, Chapter 13: Algebraic Model for Agent Explicit Knowledge in Multi-Agent Systems, pages 224-250. IN-TECH, October 2009.
  2. Khair Eddin Sabri, Ridha Khedri, and Jason JaskolkaVerification of Information Flow in Agent-Based Systems. In Gilbert Babin, Peter Kropf, and Michael Weiss, editors, Proceedings of the 4th International MCETECH Conference on e-Technologies, volume 26 of Lecture Notes in Business Information Processing, pages 252–266, Ottawa, ON, Canada, May 2009. (Nominated for Best Paper Award)
  3. Khair Eddin Sabri, Ridha Khedri, and Jason JaskolkaAutomated Verification of Information Flow in Agent-Based Systems. Technical Report CAS-09-01-RK, McMaster University, Hamilton, ON, Canada, January 2009.

2008

  1. Khair Eddin Sabri, Ridha Khedri, and Jason JaskolkaSpecification of Agent Explicit Knowledge in Cryptographic Protocols. In Proceedings of the International Conference on Computer, Electrical, and Systems Science, and Engineering, volume 35 of CESSE 2008, pages 447–454, Venice, Italy, October 2008.