Bert Abrath, Bart Coppens, Jens Van den Broeck, Brecht Wyseur, Alessandro Cabutto, Paolo Falcarin, Bjorn De Sutter. Code Renewability for Native Software Protection. ACM Transactions on Privacy and Security, v. 23(4), 2020, https://dl.acm.org/doi/10.1145/3404891. Link.
C Basile, D Canavese, L Regano, P Falcarin, B De Sutter: A Meta-model for Software Protections and Reverse Engineering Attacks. Journal of Systems and Software, Elsevier, 2019. Link.
M Ceccato, P Tonella, C Basile, P Falcarin, M Torchiano, B Coppens, B De Sutter: Understanding the Behaviour of Hackers while Performing Attack Tasks in a Professional Setting and in a Public Challenge. Empirical Software Engineering, Springer, 2018. Link.
Ceccato, Mariano, Paolo Tonella, Cataldo Basile, Bart Coppens, Bjorn De Sutter, Paolo Falcarin, and Marco Torchiano. How professional hackers understand protected code while performing attacktasks. In 2017 IEEE/ACM 25th International Conference on Program Comprehension (ICPC), pp. 154-164. IEEE, 2017. Best Paper Award and ACM Distinguished Paper Award. Link.
Zhang, Gaofeng, Paolo Falcarin, Elena Gómez-Martínez, Shareeful Islam, Christophe Tartary, Bjorn De Sutter, and Jerome d'Annoville. Attack simulation based software protection assessment method." In 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security), IEEE, 2016. Best Paper Award. Link.
Vinayakumar, R., Alazab, M., Soman, K.P., Poornachandran, P., Al-Nemrat, A. and Venkatraman, S. Deep learning approach for intelligent intrusion detection system. IEEE Access, 7, pp.41525-41550, 2019. Link.
Umar Mukhtar Ismail, and Shareeful Islam. A unified framework for cloud security transparency and audit. Journal of Information Security and Applications 54 (2020), Elsevier. Link.
Bilyaminu Auwal Romo, Andrea Capiluppi, and Ajaz Ali. Locating Bug IDs and Development Logs in Open Source Software (OSS) projects: An Experience Report. In 2018 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT), IEEE, 2018. Link.
M Ceccato, A Capiluppi, P Falcarin, C Boldyreff: A large study on the effect of code obfuscation on the quality of java code. In Empirical Software Engineering, pp 1-39, Springer, 2014. Link.
M Ceccato, M DiPenta, P Falcarin, F Ricca, M Torchiano, P Tonella: A Family of Experiments to Assess the Effectiveness and Efficiency of Source Code Obfuscation Techniques. In Empirical Software Engineering, Springer, February 2014. Link.
Islam, Shareeful, Moussa Ouedraogo, Christos Kalloniatis, Haralambos Mouratidis, and Stefanos Gritzalis. Assurance of security and privacy requirements for cloud deployment models. IEEE Transactions on Cloud Computing 6, no. 2 (2015): 387-400. Link.
Islam, Shareeful, Haralambos Mouratidis, and Edgar R. Weippl. An empirical study on the implementation and evaluation of a goal-driven software development risk management model. Information and Software Technology 56, no. 2 (2014): 117-133. Link.