Page d'accueil // SnT // People // Olga Gadyatskaya

Olga Gadyatskaya

Olga Gadyatskaya
Adresse postale Université du Luxembourg
2, Avenue de l'Université
L-4365 Esch-sur-Alzette
powered by


Full Text
See detailAttribute evaluation on attack trees with incomplete information
Buldas, Ahto; Gadyatskaya, Olga; Lenin, Aleksandr; Mauw, Sjouke; Trujillo Rasua, Rolando

in Computers and Security (2020), 88(101630),

Full Text
See detailAttack-Tree Series: A Case for Dynamic Attack Tree Analysis
Gadyatskaya, Olga; Mauw, Sjouke

in Proc.\ 6th International Workshop on Graphical Models for Security (GraMSec'19) (2020)

Top of Page


Full Text
See detailThe Influence of Code Coverage Metrics on Automated Testing Efficiency in Android
Dashevskyi, Stanislav; Gadyatskaya, Olga; Pilgun, Aleksandr; Yury, Zhauniarovich

Poster (2018, October)

Full Text
See detailNew Directions in Attack Tree Research: Catching up with Industrial Needs
Gadyatskaya, Olga; Trujillo Rasua, Rolando

in Mauw, Sjouke (Ed.) Proceedings of the 4th International Workshop on Graphical Models for Security (2018, January)

Full Text
See detailDEMO: An Effective Android Code Coverage Tool
Pilgun, Aleksandr; Gadyatskaya, Olga; Dashevskyi, Stanislav; Zhauniarovich, Yury; Kushniarou, Artsiom

Poster (2018, October 15)

Top of Page


Full Text
See detailRefinement-Aware Generation of Attack Trees
Gadyatskaya, Olga; Ravi, Jhawar; Mauw, Sjouke; Trujillo Rasua, Rolando; Tim, A.C. Willemse

in Livraga, Giovanni; Mitchell, Chris J. (Eds.) Security and Trust Management - 13th International Workshop (2017, September)

Top of Page


Full Text
See detailUsing attack-defense trees to analyze threats and countermeasures in an ATM: a case study
Fraile, Marlon; Ford, Margaret; Gadyatskaya, Olga; Kumar, Rajesh; Stoelinga, Mariëlle; Trujillo Rasua, Rolando

in IFIP Working Conference on The Practice of Enterprise Modeling (2016)

Full Text
See detailModelling Attack-defense Trees Using Timed Automata
Gadyatskaya, Olga; Hansen, R. R.; Larsen, K. G.; Legay, A.; Olesen, M. C.; Poulsen, D. B.

in Proc. of FORMATS (2016)

Full Text
See detailBridging two worlds: Reconciling practical risk assessment methodologies with theory of attack trees
Gadyatskaya, Olga; Harpes, Carlo; Mauw, Sjouke; Muller, Cedric; Muller, Steve

in Proc. of GraMSec (2016)

Full Text
See detailAttack trees for practical security assessment: ranking of attack scenarios with ADTool 2.0
Gadyatskaya, Olga; Jhawar, Ravi; Kordy, Piotr; Lounis, Karim; Mauw, Sjouke; Trujillo Rasua, Rolando

in Quantitative Evaluation of Systems - 13th International Conference (2016)

Full Text
See detailTowards Empirical Evaluation of Automated Risk Assessment Methods
Gadyatskaya, Olga; Labunets, Katsiaryna; Paci, Federica

in Risks and Security of Internet and Systems (2016)

Full Text
See detailEvaluation of Resource-based App Repackaging Detection in Android
Gadyatskaya, Olga; Lezza, A.-L.; Zhauniarovich, Y.

in Proc. of NordSec (2016)

Full Text
See detailSmall changes, big changes: an updated view on the Android permission system
Zhauniarovich, Yury; Gadyatskaya, Olga

in Research in Attacks, Intrusions, and Defenses - 19th International Symposium, RAID 2016, Paris, France, September 19-21, 2016, Proceedings (2016, September)

Top of Page


Full Text
See detailStaDynA: Addressing the Problem of Dynamic Code Updates in the Security Analysis of Android Applications
Zhauniarovich, Yury; Ahmad, Maqsood; Gadyatskaya, Olga; Crispo, Bruno; Massacci, Fabio

in Proceedings of CODASPY '15 (2015, March)

Full Text
See detailTowards Black Box Testing of Android Apps
Zhauniarovich, Yury; Philippov, Anton; Gadyatskaya, Olga; Crispo, Bruno; Massacci, Fabio

in Proc. of Software Assurance Workshop at the 10th International Conference on Availability, Reliability and Security (ARES) (2015, August)

Top of Page


Full Text
See detailFSquaDRA: Fast Detection of Repackaged Applications
Zhauniarovich, Yury; Gadyatskaya, Olga; Crispo, Bruno; La Spina, Francesco; Moser, Ermanno

in Data and Applications Security and Privacy XXVIII (2014, July)

Top of Page