Search for courses or information

The SSE group research papers are linked in the following list, or they can be searched and downloaded from the UEL repository.

  • Bert Abrath, Bart Coppens, Jens Van den Broeck, Brecht Wyseur, Alessandro Cabutto, Paolo Falcarin, Bjorn De Sutter. Code Renewability for Native Software Protection. ACM Transactions on Privacy and Security, v. 23(4), 2020, Link.
  • C Basile, D Canavese, L Regano, P Falcarin, B De Sutter: A Meta-model for Software Protections and Reverse Engineering Attacks.  Journal of Systems and Software, Elsevier, 2019. Link.
  • M Ceccato, P Tonella, C Basile, P Falcarin, M Torchiano, B Coppens, B De Sutter: Understanding the Behaviour of Hackers while Performing Attack Tasks in a Professional Setting and in a Public Challenge. Empirical Software Engineering, Springer, 2018. Link.
  • Ceccato, Mariano, Paolo Tonella, Cataldo Basile, Bart Coppens, Bjorn De Sutter, Paolo Falcarin, and Marco Torchiano. How professional hackers understand protected code while performing attack tasks. In 2017 IEEE/ACM 25th International Conference on Program Comprehension (ICPC), pp. 154-164. IEEE, 2017. Best Paper Award and ACM Distinguished Paper Award. Link.
  • Zhang, Gaofeng, Paolo Falcarin, Elena Gómez-Martínez, Shareeful Islam, Christophe Tartary, Bjorn De Sutter, and Jerome d'Annoville. Attack simulation based software protection assessment method." In 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security), IEEE, 2016. Best Paper Award. Link.
  • Vinayakumar, R., Alazab, M., Soman, K.P., Poornachandran, P., Al-Nemrat, A. and Venkatraman, S. Deep learning approach for intelligent intrusion detection system. IEEE Access, 7, pp.41525-41550, 2019. Link.
  • Chafika Benzaid, Karim Lounis, Ameer Al-Nemrat, Nadjib Badache, Mamoun Alazab. Fast authentication in wireless sensor networks. Future Generation Computer Systems, Volume 55, Pages 362-375, ISSN 0167-739X, 2016, Link.
  • Umar Mukhtar Ismail, and Shareeful Islam. A unified framework for cloud security transparency and audit. Journal of Information Security and Applications 54 (2020), Elsevier. Link.
  • Bilyaminu Auwal Romo, Andrea Capiluppi, and Ajaz Ali. Locating Bug IDs and Development Logs in Open Source Software (OSS) projects: An Experience Report. In 2018 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT), IEEE, 2018. Link.
  • M Ceccato, A Capiluppi, P Falcarin, C Boldyreff: A large study on the effect of code obfuscation on the quality of java code. In Empirical Software Engineering, pp 1-39, Springer, 2014. Link.
  • M Ceccato, M DiPenta, P Falcarin, F Ricca, M Torchiano, P Tonella: A Family of Experiments to Assess the Effectiveness and Efficiency of Source Code Obfuscation Techniques. In Empirical Software Engineering, Springer, February 2014. Link.
  • Islam, Shareeful, Moussa Ouedraogo, Christos Kalloniatis, Haralambos Mouratidis, and Stefanos Gritzalis. Assurance of security and privacy requirements for cloud deployment models. IEEE Transactions on Cloud Computing 6, no. 2 (2015): 387-400. Link.
  • Islam, Shareeful, Haralambos Mouratidis, and Edgar R. Weippl. An empirical study on the implementation and evaluation of a goal-driven software development risk management model. Information and Software Technology 56, no. 2 (2014): 117-133. Link.
  • A Ordonez, V Alcázar, JC Corrales, P Falcarin,  Automated context aware composition of Advanced Telecom Services for environmental early warnings. In Expert Systems with Applications, v. 41 (13), 5907-5916, Elsevier, 2014. Link.
  • Falcarin, Paolo, Collberg Christian, Atallah Mikhail, Jakubowski Mariusz (2011) ‘Software protection’, IEEE Software, 28(2), pp. 24-27.  
  • Islam, Shareeful and Mouratidis, Haralambos (2010) ‘A Framework to Support Alignment of Secure Software Engineering with Legal Regulations’, Software and Systems Modeling, 10(3), pp. 369-394. Link.
  • Islam, Shareeful (2009) ‘Eliciting Security Requirements and Tracing them to Design: An Integration of Common Criteria, Heuristics, and UMLsec’, Requirements Engineering Journal, 15(1), pp. 63-93. Link.
  • Islam, Shareeful (2009) ‘Software Development Risk Management Model – A Goal Driven Approach’, ESEC/FSE'09 Joint 12th European Software Engineering Conference (ESEC) and 17th ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE-17). Amsterdam, The Netherlands, 24-28 Aug 2009. ACM. Link