Safety, security, and configurable software systems: a systematic mapping study

A Kenner, R May, J Krüger, G Saake… - Proceedings of the 25th …, 2021 - dl.acm.org
Safety and security are important properties of any software system, particularly in safety-
critical domains, such as embedded, automotive, or cyber-physical systems. Moreover …

A systematic mapping study of security concepts for configurable data storages

R May, C Biermann, J Krüger, G Saake… - Proceedings of the 26th …, 2022 - dl.acm.org
Most modern software systems can be configured to fulfill specific customer requirements,
adapting their behavior as required. However, such adaptations also increase the need to …

Intelligent and secure framework for critical infrastructure (CPS): Current trends, challenges, and future scope

ZA Sheikh, Y Singh, PK Singh, KZ Ghafoor - Computer Communications, 2022 - Elsevier
Abstract Cyber–Physical Systems (CPS) are developed by the integration of computational
algorithms and physical components and they exist as a result of technological …

[HTML][HTML] CARMEN: A framework for the verification and diagnosis of the specification of security requirements in cyber-physical systems

ÁJ Varela-Vaca, DG Rosado, LE Sánchez… - Computers in …, 2021 - Elsevier
In the last years, cyber-physical systems (CPS) are receiving substantial mainstream
attention especially in industrial environments, but this popularity has been accompanied by …

Vulnerably (mis) configured? Exploring 10 years of developers' Q&As on Stack Overflow

R May, C Biermann, XM Zerweck, K Ludwig… - Proceedings of the 18th …, 2024 - dl.acm.org
The increasing number of attacks exploiting system vulnerabilities in recent years underpins
the growing importance of security; especially for software comprising configuration options …

Feature models to boost the vulnerability management process

ÁJ Varela-Vaca, D Borrego, MT Gómez-López… - Journal of Systems and …, 2023 - Elsevier
Vulnerability management is a critical and very challenging process that allows
organisations to design a procedure to identify potential vulnerabilities, assess the level of …

AMADEUS: towards the AutoMAteD secUrity teSting

ÁJ Varela-Vaca, RM Gasca… - Proceedings of the 24th …, 2020 - dl.acm.org
The proper configuration of systems has become a fundamental factor to avoid cybersecurity
risks. Thereby, the analysis of cybersecurity vulnerabilities is a mandatory task, but the …

Definition and verification of security configurations of cyber-physical systems

ÁJ Varela-Vaca, DG Rosado, LE Sánchez… - … Security: ESORICS 2020 …, 2020 - Springer
Abstract The proliferation of Cyber-Physical Systems (CPSs) is raising serious security
challenges. These are complex systems, integrating physical elements into automated …

[PDF][PDF] Towards vulnerabilities caused by application configuring: A meta analysis of the National Vulnerability Database

R May, XM Zerweck - 24. Nachwuchswissenschaftler …, 2024 - monami.hs-mittweida.de
Configuring applications might lead to diverse security issues. In this study, 263
vulnerabilities of the National Vul-nerability Database were analyzed, which were caused by …

Model-based evaluation of vulnerabilities in software systems

A Kenner - Proceedings of the 24th ACM International Systems …, 2020 - dl.acm.org
Vulnerabilities in software systems result from faults, which occur at different stages in a
software's life cycle, for example, in the design (ie, undesired feature-interactions), the …