An automatic method for assessing the versions affected by a vulnerability VH Nguyen, S Dashevskyi, F Massacci Empirical Software Engineering 21, 2268-2297, 2016 | 74 | 2016 |
A screening test for disclosed vulnerabilities in foss components S Dashevskyi, AD Brucker, F Massacci IEEE Transactions on Software Engineering 45 (10), 945-966, 2018 | 41 | 2018 |
Fine-grained code coverage measurement in automated black-box android testing A Pilgun, O Gadyatskaya, Y Zhauniarovich, S Dashevskyi, A Kushniarou, ... ACM Transactions on Software Engineering and Methodology (TOSEM) 29 (4), 1-35, 2020 | 39 | 2020 |
{TESTREX}: a Testbed for Repeatable Exploits S Dashevskyi, DR Dos Santos, F Massacci, A Sabetta 7th Workshop on Cyber Security Experimentation and Test (CSET 14), 2014 | 24* | 2014 |
Dissecting android cryptocurrency miners S Dashevskyi, Y Zhauniarovich, O Gadyatskaya, A Pilgun, H Ouhssain Proceedings of the Tenth ACM Conference on Data and Application Security and …, 2020 | 23 | 2020 |
Multi-context exploit test management A Sabetta, L Compagna, S Ponta, S Dashevskyi, D Dos Santos, ... US Patent 9,811,668, 2017 | 23 | 2017 |
On the security cost of using a free and open source component in a proprietary product S Dashevskyi, AD Brucker, F Massacci Engineering Secure Software and Systems: 8th International Symposium, ESSoS …, 2016 | 23 | 2016 |
Delta-bench: Differential benchmark for static analysis security testing tools I Pashchenko, S Dashevskyi, F Massacci 2017 ACM/IEEE International Symposium on Empirical Software Engineering and …, 2017 | 22 | 2017 |
Vulnerability analysis of software components AD Brucker, S Dashevskyi US Patent 10,691,808, 2020 | 20 | 2020 |
An effective android code coverage tool A Pilgun, O Gadyatskaya, S Dashevskyi, Y Zhauniarovich, A Kushniarou Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 17 | 2018 |
The Influence of Code Coverage Metrics on Automated Testing Efficiency in Android S Dashevskyi, O Gadyatskaya, A Pilgun, Y Zhauniarovich Proc. of CCS 10 (3243734.3278524), 2018 | 11 | 2018 |
An experimental approach for estimating cyber risk: a proposal building upon cyber ranges and capture the flags G Di Tizio, F Massacci, L Allodi, S Dashevskyi, J Mirkovic 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 56-65, 2020 | 8 | 2020 |
Amnesia: 33 How TCP/IP Stacks Breed Critical Vulnerabilities in IoT, OT and IT Devices D dos Santos, S Dashevskyi, J Wetzels, A Amri Forescout Research Labs, 2021 | 6 | 2021 |
NAME:WRECK Breaking and fixing DNS implementations D dos Santos, S Dashevskyi, A Amri, J Wetzels, O Shlomi, M Kol Black Hat Asia, 2021 | 5 | 2021 |
An Introduction to Data Analytics For Software Security L ben Othmane, AD Brucker, S Dashevskyi, P Tsalovski Empirical Research for Software Security, 69-94, 2017 | 2 | 2017 |
Demonstration of new attacks on three healthcare network protocols in a lab environment G Dupont, D dos Santos, S Dashevskyi, S Vijayakumar, SP Murali, ... Journal of Computer Virology and Hacking Techniques 20 (2), 301-314, 2024 | | 2024 |
RFC 9267: Common Implementation Anti-Patterns Related to Domain Name System (DNS) Resource Record (RR) Processing. S Dashevskyi, DR dos Santos, J Wetzels, A Amri https://datatracker.ietf.org/doc/html/rfc9267, 2022 | | 2022 |
VU Research Portal G Di Tizio, F Massacci, L Allodi, S Dashevskyi, J Mirkovic | | 2020 |
Security assessment of open source third-parties applications S Dashevskyi Università degli studi di Trento, 2017 | | 2017 |