UAB Logo

UW-Madison
Computer Sciences Dept.

Papers and Reports

The following papers and reports describe work done under this project:
  • Elisa Heymann, Barton P. Miller, Mohammed J. Alghazzawi and David Incertis, "Addressing the Cyber-Security of Maritime Shipping", 2016 European Transport Conference (ETC), Barcelona, Spain, October 2016. [ PDF ]

  • James A. Kupsch, Elisa Heymann, Barton P. Miller and Vamshi Basupalli, "Bad and Good News about Using Software Assurance Tools", Software: Practice and Experience, April 2016. DOI: 10.1002/spe.2401. [ PDF ]

  • Maxime Frydman, Guifre Ruiz, Elisa Heymann, Eduardo Cesar and Barton P. Miller, "Automating Risk Analysis of Software Design Models", Submitted for publication. The Scientific World Journal, Article ID 805856, June 2014, http://dx.doi.org/10.1155/2014/80585. [Design Report pdf] [Implementation Report pdf] [Verification Report pdf] [Data-flow Diagram tms]

  • Manuel Brugnoli, Maxime Frydman, Joe Carrion, and Elisa Heymann, "CREAM Vulnerability Assessment", MIST Project Technical Report, September, 2013. [PDF]

  • Jairo D. Serrano, Elisa Heymann, Eduardo César, Barton P. Miller, "Increasing Automated Vulnerability Assessment Accuracy on Cloud and Grid Middleware", 9th International Conference on Information Security Practice and Experience (ISPEC), Lanzhou, China, May 2013. [ PDF ]

  • Karl F. Mazurak, James A. Kupsch, and Barton P. Miller, "OAuth for MyProxy Vulnerablity Assessment", MIST Project Technical Report, March 2013. [html]

  • Wenbin Fang, Barton P. Miller, and James A. Kupsch, "Automated Tracing and Visualization of Software Security Structure and Properties", 9th International Symposium on Visualization for Cyber Security (VizSec), Seattle, WA, USA, October 2012. [PDF]

  • Guifre Ruiz, Elisa Heymann, Eduardo Cesar and Barton P. Miller, "Automating Threat Modeling through the Software Development Life-Cycle", XXIII Jornadas de Paralelismo (JP2012), Elche, Spain, September 2012. [PDF]

  • Manuel Brugnoli and Elisa Heymann, "VOMS Core Vulnerability Assessment", MIST Project Technical Report, February, 2012. [PDF]

  • Jairo D. Serrano, Elisa Heymann, Eduardo César, Barton P. Miller, "Vulnerability Assessment Enhancement for Middleware", 5th Iberian Grid Infrastructure Conference (IBERGRID), Santander, Spain, June 2011. [PDF]

  • Manuel Brugnoli and Elisa Heymann, "Argus Vulnerability Assessment", MIST Project Technical Report, June 2011. [PDF]

  • James A. Kupsch, Barton P. Miller, Eduardo César, and Elisa Heymann, "First Principles Vulnerability Assessment", 2010 ACM Cloud Computing Security Workshop (CCSW), Chicago, IL, October 2010. [PDF]

  • James A. Kupsch, Barton P. Miller, Eduardo César, and Elisa Heymann, "First Principles Vulnerability Assessment" (extended version), MIST Project Technical Report, September 2009. [PDF]

  • James A. Kupsch and Barton P. Miller, "Manual vs. Automated Vulnerability Assessment: A Case Study", The First International Workshop on Managing Insider Security Threats, West Lafayette, IN, June 2009. [PDF]

  • James A. Kupsch and Barton P. Miller, "MyProxy Vulnerability Assessment", MIST Project Technical Report, May 2008. [html]

  • James A. Kupsch and Barton P. Miller, "How to Open a File and Not Get Hacked", 2008 Third International Conference on Availability, Reliability and Security (ARES), Barcelona, Spain, March 2008. [PDF] An extended version of the paper is also available [extended version pdf], as is an implementation of the ideas in the paper [Safefile library].

 
Computer Sciences | UW Home