Security design patterns: Survey and evaluation MA Laverdiere, A Mourad, A Hanna, M Debbabi 2006 Canadian Conference on Electrical and Computer Engineering, 1605-1608, 2006 | 59 | 2006 |
An aspect-oriented approach for the systematic security hardening of code A Mourad, MA Laverdière, M Debbabi computers & security 27 (3-4), 101-114, 2008 | 36 | 2008 |
Security hardening of open source software. A Mourad, MA Laverdière, M Debbabi PST, 43, 2006 | 30 | 2006 |
Taxonomy of Linux Kernel Vulnerability Solutions SA Mokhov, MA Laverdière, D Benredjem Innovative Techniques in Instruction Technology, E-learning, E-assessment …, 2008 | 25 | 2008 |
A high-level aspect-oriented-based framework for software security hardening A Mourad, MA Laverdière, M Debbabi Information Security Journal: A Global Perspective 17 (2), 56-74, 2008 | 23 | 2008 |
Towards an aspect oriented approach for the security hardening of code A Mourad, MA Laverdiere, M Debbabi Advanced Information Networking and Applications Workshops, 2007, AINAW'07 …, 2007 | 23 | 2007 |
Assisting Programmers Resolving Vulnerabilities in Java Web Applications P Bathia, BR Beerelli, MA Laverdière Advanced Computing, 268-279, 2011 | 16 | 2011 |
A High-Level Aspect-Oriented based Language for Software Security Hardening. A Mourad, MA Laverdière, M Debbabi SECRYPT, 363-370, 2007 | 11 | 2007 |
Cryptolysis v. 0.0. 1-A Framework for Automated Cryptanalysis of Classical Ciphers SA Mokhov, MA Laverdière, N Hatami, A Benssam Arxiv preprint arXiv:1101.1075, 2011 | 10* | 2011 |
Control flow based pointcuts for security hardening concerns MA Laverdière, A Mourad, A Soeanu, M Debbabi Trust Management, 301-316, 2007 | 9 | 2007 |
Detection of protection-impacting changes during software evolution MA Laverdière, E Merlo 2018 IEEE 25th International Conference on Software Analysis, Evolution and …, 2018 | 8 | 2018 |
Classification and Distribution of RBAC Privilege Protection Changes in Wordpress Evolution (Short Paper) MA Laverdière, E Merlo 2017 15th Annual Conference on Privacy, Security and Trust (PST), 349-3495, 2017 | 7 | 2017 |
New aspect-oriented constructs for security hardening concerns A Mourad, A Soeanu, MA Laverdière, M Debbabi Computers & Security 28 (6), 341-358, 2009 | 7 | 2009 |
Computing counter-examples for privilege protection losses using security models MA Laverdière, E Merlo 2017 IEEE 24th International Conference on Software Analysis, Evolution and …, 2017 | 6 | 2017 |
New Primitives to AOP Weaving Capabilities for Security Hardening Concerns A Mourad, MA Laverdière, M Debbabi Proceedings of the 9th International Conference on Enterprise Information …, 2007 | 5 | 2007 |
Taint analysis of manual service compositions using Cross-Application Call Graphs MA Laverdière, BJ Berger, E Merloz Software Analysis, Evolution and Reengineering (SANER), 2015 IEEE 22nd …, 2015 | 4 | 2015 |
RBAC protection-impacting changes identification: A case study of the security evolution of two PHP applications MA Laverdière, K Julien, E Merlo Information and Software Technology 139, 106630, 2021 | 3 | 2021 |
Just-in-time detection of protection-impacting changes on WordPress and MediaWiki A Barrak, MA Laverdière, F Khomh, L An, E Merlo Proceedings of the 28th Annual International Conference on Computer Science …, 2018 | 3 | 2018 |
Security evaluation and hardening of free and open source software (FOSS) R Charpentier, M Debbabi, D Alhadidi, A Mourad, N Belblidia, ... Electronic Communications of the EASST 33, 2010 | 3 | 2010 |
On Implementation of a Safer C Library, ISO/IEC TR 24731 MA Laverdière, SA Mokhov, D Benredjem Arxiv preprint arXiv:0906.2512, 2009 | 2 | 2009 |