2021

  1. Jason Jaskolka, Brahim Hamid, Alvi Jawad, and Joe Samuel. A security property decomposition argument pattern for structured assurance case models. In Proceedings of the 26th European Conference on Pattern Languages of Programs, EuroPLoP 2021, pages 1-10, Graz, Austria, 2021.
  2. Luke Newton and Jason Jaskolka. Analyzing implicit interactions to identify weak points in cyber-physical system designs. In Proceedings of the 2021 Resilience Week Symposium, pages 1-8, Salt Lake City, UT, USA, 2021.
  3. Alvi Jawad and Jason Jaskolka. Modeling and simulation approaches for cybersecurity impact analysis: State-of-the-art. In Proceedings of the 2021 Annual Modeling and Simulation Conference, ANNSIM 2021, pages 1–12, Fairfax, VA, USA, 2021.
  4. Joe Samuel, Jason Jaskolka, and George O.M. Yee. Leveraging external data sources to enhance secure system design. In Proceedings of the 2021 Reconciling Data Analytics, Automation, Privacy, and Security: A Big Data Challenge, RDAAPS 2021, pages 1–8, Hamilton, ON, Canada, 2021.
  5. Quentin Rouland, Brahim Hamid, and Jason Jaskolka. Specification, detection, and treatment of STRIDE threats for software components: Modeling, formal methods, and tool support. Journal of Systems Architecture, 117:102073, August 2021.

2020

  1. Joe Samuel, Khalil Aalab, and Jason Jaskolka. Evaluating the soundness of security metrics from vulnerability scoring frameworks. In Proceedings of the 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, IEEE TrustCom 2020, pages 442–449, Guangzhou, China, 2020.
  2. Jason Jaskolka. Identifying and analyzing implicit interactions in a wastewater dechlorination system. In Sokratis Katsikas et al., editors, Computer Security. CyberICPS 2020, SECPRE 2020, ADIoT 2020, volume 12501 of Lecture Notes in Computer Science, pages 34–51, Guildford, UK, 2020. Springer, Cham.
  3. Quentin Rouland, Brahim Hamid, and Jason Jaskolka. Reusable formal models for threat specification, detection, and treatment. In Sihem Ben Sassi, Stéphane Ducasse, and Hafedh Mili, editors, Reuse in Emerging Software Engineering Practices, Proceedings of the 19th International Conference on Software and Systems Reuse, ICSR 2020, volume 12541 of Lecture Notes in Computer Science, pages 52–68, Hammamet, Tunisia, December 2020. Springer International Publishing. (Winner of the Best Paper Award)
  4. Thomas Sattolo and Jason Jaskolka. Evaluation of statistical tests for detecting storage-based covert channels. In Marko Hölbl, Kai Rannenberg, and Tatjana Welzer, editors, Proceedings of the 35th International Conference on ICT Systems Security and Privacy Protection, IFIP SEC 2020, volume 580 of IFIP Advances in Information and Communication Technology, pages 17–31, Maribor, Slovenia, September 2020. Springer, Cham.
  5. Jason Jaskolka. Recommendations for effective security assurance of software-dependent systems. In Kohei Arai, Supriya Kapoor, and Rahul Bhatia, editors, Intelligent Computing, SAI 2020, volume 1230 of Advances in Intelligent Systems and Computing, pages 511–531. London, UK, 2020. Springer, Cham.
  6. Quentin Rouland, Brahim Hamid, and Jason Jaskolka. Formal specification and verification of reusable communication models for distributed systems architecture. Future Generation Computer Systems, 108:178-197, July 2020.

2019

  1. Brahim Hamid, Quentin Rouland, and Jason Jaskolka. Distributed maintenance of a spanning tree of k-connected graphs. In Proceedings of the 24th IEEE Pacific Rim International Symposium on Dependable Computing, pages 217-226, Kyoto, Japan, December 2019.
  2. Maxime Buyse* and Jason Jaskolka. Communicating concurrent Kleene algebra for distributed systems specification. Archive of Formal Proofs, p. 22, August 2019.

2018

  1. Quentin Rouland, Brahim Hamid, and Jason JaskolkaFormalizing Reusable Communication Models for Distributed Systems Architecture. In El Hassan Abdelwahed, Ladjel Bellatreche, Mattéo Golfarelli, Dominique Méry, and Carlos Ordonez, editors,Proceedings of the 8th International Conference on Model and Data EngineeringMEDI 2018, volume 11163 of Lecture Notes in Computer Science, pages 198-216, Marrakesh, Morocco, October 2018.
  2. Jason JaskolkaChallenges in Assuring Security and Resilience of Advanced Metering Infrastructure. In Proceedings of the 18th annual IEEE Canada Electrical Power and Energy ConferenceEPEC 2018, Toronto, ON, Canada, 2018.
  3. Jason Jaskolka. Assurance cases for security and resilience of advanced metering infrastructure. Technical Report Prepared for Natural Resources Canada, March, 2018.

2017

  1. Jason Jaskolka and John Villasenor. Securing Cyber-Dependent Maritime Systems and OperationsNMIO Technical Bulletin 12:4-6, June 2017.
  2. Jason Jaskolka and John Villasenor. An Approach for Identifying and Analyzing Implicit Interactions in Distributed Systems. IEEE Transactions on Reliability, 66(2):529-546, June 2017.
  3. Jason Jaskolka and John Villasenor. Identifying Implicit Component Interactions in Distributed Cyber-Physical Systems. In Proceedings of the 50th Hawaii International Conference on System SciencesHICSS-50, pages 5988–5997, Hilton Waikoloa Village, HI, U.S.A., January 2017.

2016

  1. Monika Bialy, Vera Pantelic, Jason Jaskolka, Alexander Schaap, Lucian Patcas, Mark Lawford, and Alan Wassyng. Handbook of System Safety and Security: Cyber Risk and Risk Management, Cyber Security, Threat Analysis, Functional Safety, Software Systems, and Cyber Physical Systems, Chapter 3: Software Engineering for Model-Based Development by Domain Experts, pages 39-64. Elsevier, First Edition, October 2016.
  2. Jason Jaskolka and Ridha Khedri. Mitigating Covert Channels Based on Analysis of the Potential for CommunicationTheoretical Computer Science, 643:1–37, August 2016.

2015

  1. Jason Jaskolka, Wendy MacCaull, and Ridha Khedri. Towards an Ontology Design Architecture. In Proceedings of the 2015 International Conference on Computational Science and Computational Intelligence, CSCI 2015, pages 132–135, Las Vegas, NV, U.S.A., December 2015.
  2. Monika Bialy, Jacques Carette, Lane Gibson, Jason Jaskolka, Mark Lawford, Bennett Mackenzie, Tom Maibaum, Archana Mallya, Gordon Marks, Vera Pantelic, Alexander Schaap, Syed Asim Shah, and Alan Wassyng. Phase 1 Quarterly Report 8 on APC LEAP – Embedded Software Project. Technical Report, McMaster Centre for Software Certification, Hamilton, ON, Canada, December 2015.
  3. Jason Jaskolka, Wendy MacCaull, and Ridha Khedri. Towards an Architectural Framework for Systematically Designing Ontologies. Technical Report CAS-15-09-RK, McMaster University, Hamilton, ON, Canada, November 2015.
  4. Jason Jaskolka, Ridha Khedri, and Khair Eddin Sabri. Investigative Support for Information ConfidentialityJournal of Ambient Intelligence and Humanized Computing, 6(4):425-451, August 2015.
  5. Jason Jaskolka and Ridha Khedri. Towards the Certification of Covert Channel Freeness in Cloud-Based Systems. In Elhadi Shakshuki, editor, Proceedings of the 6th International Conference on Ambient Systems, Networks and Technologies, volume 52 of Procedia Computer Science, ANT 2015 and SEIT 2015, pages 318–225, London, UK, June 2015.
  6. Jason JaskolkaOn the Modeling, Analysis, and Mitigation of Distributed Covert Channels. Ph.D. thesis, McMaster University, Hamilton, ON, Canada. March 2015.

2014

  1. Jason Jaskolka and Ridha Khedri. A Formulation of the Potential for Communication Condition using C2KA. In Adriano Peron and Carla Piazza, editors, Proceedings of the 5th International Symposium on Games, Automata, Logics and Formal Verification, volume 161 of Electronic Proceedings in Theoretical Computer Science, pages 161-174. Open Publishing Association, Verona, Italy, September 2014.
  2. Jason Jaskolka, Ridha Khedri, and Khair Eddin Sabri. Investigative Support for Confidentiality Part I: Detecting Information Leakage via Protocol-Based Covert Channels. In Proceedings of the 9th International Conference on Future Networks and Communications, volume 34 of Procedia Computer Science, FNC 2014 and MobiSPC 2014, pages 276–285, Niagara Falls, ON, Canada, August 2014. (Invited Paper).
  3. Jason Jaskolka, Ridha Khedri, and Khair Eddin Sabri. Investigative Support for Confidentiality Part II: Applications in Cryptanalysis and Digital Forensics. In Proceedings of the 9th International Conference on Future Networks and Communications, volume 34 of Procedia Computer Science, FNC 2014 and MobiSPC 2014, pages 266–275, Niagara Falls, ON, Canada, August 2014. (Invited Paper).
  4. Qinglei Zhang, Ridha Khedri, and Jason JaskolkaAn Aspect-Oriented Language for Feature-ModelingJournal of Ambient Intelligence and Humanized Computing, 5(3):343-356, June 2014.
  5. Jason Jaskolka, Ridha Khedri, and Qinglei Zhang. Endowing Concurrent Kleene Algebra with Communication Actions. In Peter Höfner, Peter Jipsen, Wolfram Kahl, and Martin E. Müller, editors, Proceedings of the 14th International Conference on Relational and Algebraic Methods in Computer Science, volume 8428 of Lecture Notes in Computer Science, pages 19-36. Springer International Publishing Switzerland, Marienstatt, Germany, April 2014.

2013

  1. Jason Jaskolka, Ridha Khedri, and Qinglei Zhang. Foundations of Communicating Concurrent Kleene Algebra. Technical Report CAS-13-07-RK, McMaster University, Hamilton, ON, Canada, November 2013.

2012

  1. Qinglei Zhang, Ridha Khedri, and Jason JaskolkaVerification of Aspectual Composition in Feature-Modeling. In George Eleftherakis, Mike Hinchey, and Mike Holcombe, editors, Proceedings of the 10th International Conference on Software Engineering and Formal Methods, volume 7504 of Lecture Notes in Computer Science, pages 109–125. Springer Berlin/Heidelberg, Thessaloniki, Greece, October 2012.
  2. Jason Jaskolka, Ridha Khedri, and Qinglei Zhang. On the Necessary Conditions for Covert Channel Existence: A State-of-the-Art Survey. In Elhadi Shakshuki and Muhammad Younas, editors, Proceedings of the 3rd International Conference on Ambient Systems, Networks and Technologies, volume 10 of Procedia Computer Science, ANT 2012 and MobiWIS 2012, pages 458–465, Niagara Falls, ON, Canada, August 2012.
  3. Qinglei Zhang, Ridha Khedri, and Jason JaskolkaAn Aspect-Oriented Language for Product Family Specification. In Elhadi Shakshuki and Muhammad Younas, editors, Proceedings of the 3rd International Conference on Ambient Systems, Networks and Technologies, volume 10 of Procedia Computer Science, ANT 2012 and MobiWIS 2012, pages 482–489, Niagara Falls, ON, Canada, August 2012.

2011

  1. Qinglei Zhang, Ridha Khedri, and Jason JaskolkaAn Aspect-Oriented Language Based on Product Family Algebra: Aspects Specification and Verification. Technical Report CAS-11-08-RK, McMaster University, Hamilton, ON, Canada, November 2011.
  2. Jason Jaskolka, Ridha Khedri, and Khair Eddin Sabri. A Formal Test for Detecting Information Leakage via Covert Channels. In Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, CSIIRW7, pages 1–4, Oak Ridge, TN, U.S.A., October 2011.
  3. Jason Jaskolka, Ridha Khedri, and Khair Eddin Sabri. Information Leakage via Protocol-Based Covert Channels: Detection, Automation, and Applications. Technical Report CAS-11-05-RK, McMaster University, Hamilton, ON, Canada, August 2011.
  4. Jason Jaskolka and Ridha Khedri. Exploring Covert Channels. In Proceedings of the 44th Hawaii International Conference on System Sciences, HICSS-44, pages 1–10, Koloa, Kauai, HI, U.S.A., January 2011.

2010

  1. Jason JaskolkaModeling, Analysis, and Detection of Information Leakage via Protocol-Based Covert Channels. Master’s thesis, McMaster University, Hamilton, ON, Canada. September 2010.

2009

  1. Khair Eddin Sabri, Ridha Khedri, and Jason JaskolkaAdvanced Technologies, Chapter 13: Algebraic Model for Agent Explicit Knowledge in Multi-Agent Systems, pages 224-250. IN-TECH, October 2009.
  2. Khair Eddin Sabri, Ridha Khedri, and Jason JaskolkaVerification of Information Flow in Agent-Based Systems. In Gilbert Babin, Peter Kropf, and Michael Weiss, editors, Proceedings of the 4th International MCETECH Conference on e-Technologies, volume 26 of Lecture Notes in Business Information Processing, pages 252–266, Ottawa, ON, Canada, May 2009. (Nominated for Best Paper Award)
  3. Khair Eddin Sabri, Ridha Khedri, and Jason JaskolkaAutomated Verification of Information Flow in Agent-Based Systems. Technical Report CAS-09-01-RK, McMaster University, Hamilton, ON, Canada, January 2009.

2008

  1. Khair Eddin Sabri, Ridha Khedri, and Jason JaskolkaSpecification of Agent Explicit Knowledge in Cryptographic Protocols. In Proceedings of the International Conference on Computer, Electrical, and Systems Science, and Engineering, volume 35 of CESSE 2008, pages 447–454, Venice, Italy, October 2008.