Persönlicher Status und Werkzeuge

Usage Control / Data Protection

  • Wüchner, T., Müller, S., Fischer, R.:
    Compliance-preserving Cloud Storage Federation base on Data-driven Usage Control
    Proc. 5th IEEE International Conference on Cloud Computing Technology and Science (CloudCOM), pp. 285-288, December 2013
  • Neisse, R., Pretschner, A., DiGiacomo, V.:
    A Trustworthy Usage Control Enforcement Framework
    Intl. J. Mobile Computing and Multimedia Communications 5(3):34-49, June-September
    2013
  • Kelbert, F., Pretschner, A.:
    Data Usage Control Enforcement in Distributed Systems
    Proc. 3rd ACM Conf. on Data and Application Security and Privacy (CODASPY), pp. 71-82, February 2013
    © ACM, 2013. This is the author's version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version was published in Proc. ACM Conference on Data and Application Security and Privacy.
  • Kelbert, F., Pretschner, A.:
    Towards a Policy Enforcement Infrastructure for Distributed Usage Control
    Proc. 17th ACM Symp. on Access Control Models and Technologies (SACMAT), pp. 119-122, June 2012
    © ACM, 2012. This is the author's version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version was published in Proc. ACM Symp. on Access Control Models and Technologies.
  • Kumari, P., Pretschner, A.:
    Deriving Implementation-level Policies for Usage Control Enforcement
    Proc. 2nd ACM Conference on Data and Application Security and Privacy (CODASPY), pp. 83-94, February 2012
    Outstanding paper award.

    © ACM, 2012. This is the author's version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version was published in Proc. ACM Conference on Data and Application Security and Privacy.
  • Kumari, P.:
    Requirements Analysis for Privacy in Social Networks
    Proc. 8th Intl. Workshop for Technical, Economic and Legal Aspects of Business Models for Virtual Goods (VG), October 2010
  • Gheorghe, G., Massacci, F., Neuhaus, S., Pretschner, A.:
    GoCoMM: A Governance and Compliance Maturity Model
    Proc. 1st ACM workshop on Information Security Governance (WISG), pp. 33-38, November 2009
  • Lotz, V., Pigout, E., Fischer, P., Kossmann, D., Massacci, F., Pretschner, A.:
    Towards Systematic Achievement of Compliance in Service-oriented Architectures: The MASTER approach
    J. Wirtschaftsinformatik 50(5):383-391, October 2008
  • Pretschner, A., Schütz, F., Schaefer, C., Walter, T.:
    Policy Evolution in Distributed Usage Control
    Proc. 4th Intl. Workshop on Security and Trust Management (STM'08), pp. 97-110, Trondheim, June 2008

  • Pretschner, A., Walter T.:
    Negotiation of Usage Control Policies - Simply the Best?

    Invited paper, Proc. 3rd Intl. Conf. on Availability, Reliability and Security (Contribution for the 1st Intl. Workshop on Advances in Policy Enforcement), pp. 1035-1036, Barcelona, March 2008
  • Pretschner, A., Hilty, M., Basin, D., Schaefer, C., Walter, T.:
    Mechanisms for Usage Control
    Proc. ACM Symposium on Information, Computer & Communication Security (ASIACCS), pp. 240-245, Tokyo, March 2008
    © ACM, 2008. This is the author's version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version was published in Proc. ACM Symposium on Information, Computer & Communication Security.
  • Hilty, M., Pretschner, A., Schaefer, C., Walter, T., Basin, D.:
    Monitors for Usage Control
    Proc. Joint iTrust and PST Conferences on Privacy, Trust Management and Security (IFIPTM), Moncton, August 2007
  • Hilty, M., Pretschner, A., Schaefer, C., Walter, T.:
    DUKE - Distributed Usage Control Enforcement
    Proc. 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY), p. 275, June 2007
  • Hilty, M., Pretschner, A., Schaefer, C., Walter, T.:
    Enforcement for Usage Control--A System Model and an Obligation Language for Distributed Usage Control
    DoCoMo Euro-Labs Internal Technical Report I-ST-20, December 2006
  • Pretschner, A., Hilty, M., Basin, D.:
    Distributed Usage Control
    Communications of the ACM 49(9):39-44, September 2006
    © ACM, 2006. This is the author's version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version was published in Communications of the ACM 49(9):39-44, September 2006
  • Hilty, M., Pretschner, A., Walter, T., Schaefer, C.:
    Enforcement for Usage Control--An overview of control mechanisms
    DoCoMo Euro-Labs Internal Technical Report I-ST-018, July 2006
  • Hilty, M., Pretschner, A., Walter, T., Schaefer, C.:
    Usage Control Requirements in Mobile and Ubiquitous Computing Applications
    DoCoMo Euro-Labs Internal Technical Report I-ST-015, December 2005
  • Hilty, M., Basin, D., Pretschner, A.:
    On Obligations © Springer Verlag
    Proc. 10th European Symp. on Research in Computer Security (ESORICS'05), Springer LNCS 3679, pp. 98-117, Milan, September 2005

Security

  • T. Wüchner, M. Ochoa, M. Golagha, G. Srivastava, T. Schreck, A. Pretschner
    MalFlow: Identification of C&C Servers through Host-based Data Flow Profiling
    To appear in SAC 2016

  • J.H.Castellanos, T. Wüchner, M. Ochoa, S. Rueda:
    Q-Floid: Android Malware detection with Quantitative Data Flow Graphs
    To appear in SG-CRC 2016

  • S. Banescu, T. Wuechner, A. Salem, M. Guggenmos, M.Ochoa, A. Pretschner
    A Framework for Empirical Evaluation of Malware Detection Resilience Against Behaviour Obfuscation
    Proc. International Conference on Malicious and Unwandted Software, pp. 40-47, 2015

  • R. Fedler, S. Banescu, A. Pretschner
    ISA2R: Improving Software Attack and Analysis Resilience via Compiler-Level Software Diversity",
    In Proc. Computer Safety, Reliability, and Security, pp. 362-371, 2015

  • P. Hallgren, M. Ochoa, A. Sabelfeld
    BetterTimes: Privacy-assured Outsourced Multiplications for Additively Homomorphic Encryption on Finite Fields
    To appear in Proc. of the 9th International Conference on Provable Security (ProvSec), Kanazawa, Japan, November 2015

  • P. Hallgren, M. Ochoa, A. Sabelfeld
    InnerCircle: A Parallelizable Decentralized Privacy-Preserving Location Proximity Protocol
    In Proc. of the 13th annual Conference on Privacy, Security and Trust, PST 2015

  • V. Ganesh, S. Banescu, M. Ochoa
    The Meaning of Attack Resistant Systems

    To appear in Proc. of the 10th Workshop on Programming Languages Analysis for Security, PLAS 2015

  • T. Wüchner, M. Ochoa, A. Pretschner
    Robust and Effective Malware Detection through Quantitative Data Flow Graph Metrics
    Proc. 12th International Conference on Detection of Intrusions and Malware & Vulnerability Assessment, pp. 98-118, 2015

  • Banescu, S., Ochoa, M., Pretschner, A.:
    A Framework for Measuring Software Resilience Against Automated Attacks
    In Proc. 1st Intl. workshop on software protection, May 2015

  • M. Felderer, K. Basel, P. Kalb, J. Jürjens, M. Ochoa, F. Paci, L. Sang Tran, T. Tun, K. Yskout, R. Scandariato, F. Piessens, D. Vanoverberghe, E. Fourneret, M. Gander, B. Solhaug, R. Breu:
    Evolution of Security Engineering Artifacts: A State of the Art Survey
    In Proc. IJSSE 5.4 (2014): 48-98. Web. 23 Jan. 2015

  • S. Wenzel, D. Poggenpohl, J. Jürjens, M. Ochoa:
    Specifying model changes with UMLchange to support security verification of potential evolution
    In Proc. Computer Standards & Interfaces, Volume 36, Issue 4, June 2014, Pages 776-791, ISSN 0920-5489

  • Banescu, S., Pretschner, A., Battré, D., Cazzulani, S., Shield, R., Thompson, G.:
    Software-Based Protection Against "Changeware"
    In Proc. 5th ACM Conference on Data and Application Security and Privacy, pp. 231-242, March 2015

  • Banescu, S., Ochoa, M., Kunze, N., Pretschner, A.:
    Idea: Benchmarking Indistinguishability Obfuscation - A Candidate Implementation
    In Proc. 7th Intl. Symp. on Engineering Secure Software, pp. 149-156, March 2015
    The original version is available at SpringerLink.

  • Ochoa, M., Pretschner, A., Cuellar, J., Hallgren, P.:
    Idea: Unwinding-Based Model Checking and Testing for Non-Interference in EFSMs
    Proc. 7th Intl. Symp. on Engineering Secure Software, pp. 34-42, March 2015

  • Wüchner, T., Pretschner, A., Ochoa, M.,
    DAVAST: Data-centric System Level Activity Visualization
    Proc. 11th Workshop on Visualization for Cyber Security, November 2014, Paris, France.

  • Wüchner, T., Ochoa, M., Pretschner, A.:
    Malware Detection with Quantitative Data Flow Graphs
    In Proc. 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2014), Kyoto, June 2014

  • M. Rocchetto, M. Ochoa, M. Torabi Dashti:
    Model-based detection of CSRF
    In Proceedings of the 29th International Conference ICT Systems Security and Privacy Protection (IFIP SEC 2014), Marrakech, Morocco, 2-4 June 2014

  • G. Barthe, B. Köpf, L. Mauborgne, M.Ochoa:
    Leakage Resilience against Concurrent Cache Attacks
    Proceedings of the 3rd Conference on Principles of Security and Trust (POST 2014), April 5-13 2014, Grenoble, France

  • Lovat, E., Oudinet, J., Pretschner, A.:
    On Quantitative Dynamic Data Flow Tracking
    Proc. 4th ACM Conference on Data and Application Security and Privacy (CODASPY), pp. 211-222, March 2014

  • Beckert, B., Hofheinz, D., Müller-Quade, J., Pretschner, A., Snelting, G.:
    Software Security in Virtualized Infrastructures: The Smart Meter Example
    it - Information Technology 53(3):142-151, June 2011

  • Neisse, R., Holling, D., Pretschner, A.:
    Implementing Trust in Cloud Infrastructures
    Proc. 11th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID), May 2011

Testing and Model-Based Testing

--Case studies; Empirical Investigations



--Technology



--Discrete-Continuous Systems



--Methodology



--Surveys

  • Felderer, M., Büchler, M., Johns, M., Brucker, A., Breu, R., Pretschner, A.:
    Security Testing: A Survey
    In Memon, A.: Advances in Computers, Volume 101, pages 1--51. ISBN 978-0-12-805158-0, Academic Press, 2016
  • Felderer, M., Zech, P., Breu, R., Büchler, M., Pretschner, A.:
    Model-Based Security Testing: A Taxonomy and Systematic Classification
    J. Software Testing, Verification, and Reliability 26(2):119--148, 2016
  • Utting, M., Pretschner, A., Legeard, B.:
    A taxonomy of model-based testing approaches
    Software Testing, Verification, and Reliability 22(5):297-312, 2012
  • Utting, M., Pretschner, A., Legeard, B.:
    A taxonomy of model-based testing
    Technical report 04/2006, Department of Computer Science, The University of Waikato (New Zealand), April 2006
  • Broy, M., Jonsson, B., Katoen, J.-P., Leucker, M., Pretschner, A.:
    Model-Based Testing of Reactive Systems
    Volume 3472 of Springer LNCS, 2005
  • Pretschner, A.:
    Model-Based Testing
    Tutorial, Proc. 27th Intl. Conf. on Software Engineering (ICSE'05), pp. 722-723, St. Louis, May 2005
  • Pretschner, A.:
    Modellbasiertes Testen
    Tutorial, Proc. Modellierung 2004, p. 274, Marburg, March 2004
  • Pretschner, A.:
    Modellbasiertes Testen
    Tutorial, Entwurf komplexer Automatisierungssysteme, Braunschweig, June 2003

Model-Based Development

--General



--Discrete-Continuous Systems

Personalization; Information Retrieval

Automotive SW Engineering

  • Pretschner, A., Salzmann, C., Schätz, B., Stauner, T. (editors):
    Proceedings of the 4th Intl. ICSE Workshop on Software Engineering for Automotive Systems
    ACM Press, May 2007
  • Pretschner, A., Broy, M., Krüger, I., Stauner, T.:
    Software Engineering for Automotive Systems: A Roadmap
    Future of Software Engineering 2007, pp. 55-71, L. Briand and A. Wolf (eds.), IEEE-CS Press, 2007
  • Pretschner, A., Salzmann, C., Schätz, B., Stauner, T.:
    4th International ICSE Workshop on Software Engineering for Automotive Systems
    ICSE Companion 2007, p. 146, May 2007
  • Broy, M., Krüger, I., Pretschner, A., Salzmann, C.:
    Engineering Automotive Software
    Proceedings of the IEEE 95(2):356-373, February 2007
    Abstract, Paper
  • Rappl, M., Pretschner, A., Salzmann, C., Stauner, T. (editors):
    Proceedings of the 2006 International Workshop on Software Engineering for Automotive Systems
    ACM Press, ISBN 1-59593-402-2, May 2006
  • Rappl, M., Pretschner, A., Salzmann, C., Stauner, T.:
    3rd International Workshop on Software Engineering for Automotive Systems - SEAS 2006
    Proc. 28th Intl. Conf. on Software Engineering (ICSE'06), p. 1034, Shanghai, May 2006
  • Broy, M., Pretschner, A., Salzmann, C., Stauner, T.:
    Software intensive systems in the automotive domain: challenges for research and education
    Proc. SAE world congress, SAE special publication SP-2028 "In-vehicle software and hardware systems" (ISBN 076801763-7), pp. 259-266, Detroit, April 2006
  • Pretschner, A., Salzmann, C., Stauner, T.:
    2nd Intl. ICSE workshop onSoftware engineering for automotive systems--workshop summary
    The ACM SIGSOFT Software Engineering Notes 30(4):79, July 2005 contain only the abstract
  • Pretschner, A., Prenninger, W., Wagner, S., Kühnel, C., Baumgartner, M., Sostawa, B., Zölch, R., Stauner, T.:
    One Evaluation of Model-Based Testing and its Automation
    Proc. 27th Intl. Conf. on Software Engineering (ICSE'05), pp. 392-401, St. Louis, May 2005
    © ACM, 2005. This is the author's version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version was published in Proc. ICSE'05.]
  • Pretschner, A., Salzmann, C., Stauner, T. (editors):
    Proceedings of the 2nd International ICSE Workshop on Software Engineering for Automotive Systems
    ACM Press, ISBN 1-59593-128-7, May 2005
  • Salzmann, C., Stauner, T., Pretschner, A.:
    2nd ICSE Intl. Workshop on SW Engineering for Automotive Systems
    Workshop Summary, Proc. ICSE'05, pp. 695, St. Louis, May 2005
  • Pretschner, A., Salzmann, C., Stauner, T.:
    Software engineering for automotive systems at ICSE 2004--workshop summary
    ACM SIGSOFT Software Engineering Notes 29(5), September 2004
  • Pretschner, A., Salzmann, C., Stauner, T. (editors):
    Proceedings of the ICSE 2004 workshop on Software Engineering for Automotive Systems
    The Institution of Electrical Engineers, ISBN 0-86341-429-X, May 2004
  • Salzmann, C., Stauner, T., Pretschner, A.:
    ICSE workshop: Software Engineering for Automotive Systems
    Proc. ICSE 2004, p. 779, Edinburgh, May 2004
  • Braun, P., Broy, M., Cengarle, M.V., Philipps, J.,Prenninger, W., Pretschner, A., Rappl, M., Sandner, R.:
    The Automotive CASE
    In: Nagl, M., Westfechtel, B. (eds.), Modelle, Werkzeuge, Infrastrukturen zur Unterstützung von Entwicklungsprozessen, pp. 211-228, Wiley-VCH, April 2003

Other

  • Pretschner, A.:
  • Vergleich von Narrowing-Verfahren erster und höherer Ordnung
    (Comparison of first and higher order narrowing calculi)
    Diplomarbeit, RWTH Aachen, June 1998
    Gutachter: Michael Hanus, Klaus Indermark
  • Hanus, M., Antoy, S., Pretschner, A., Sadre, R., Steiner, F.:
    TasteCurry's User Manual
    RWTH Aachen, 1998
  • Prüfer, D., Pretschner, A., Oelert, J., Adzessa, P., Oelert, H.:
    Neue computergestützte Leistungserfassung und -auswertung in der Herzchirurgie
    (New computer based performance evaluation in cardiac surgery)
    In Krian A., Scheld H. (Hrsg.): Dokumentationsverfahren in der Herzchirurgie, pp. 105-106, Darmstadt, 1995
  • Pretschner, A.:
    Symbolisches Differenzieren mit prozeduralen Programmiersprachen
    (Symbolic differentiation with procedural languages)
    ST-Computer 5/94, pp.80-87, May 1994

Suche