Skip to main content

Showing 1–8 of 8 results for author: Beckers, K

  1. Using Process Models to understand Security Standards

    Authors: Fabiola Moyón, Daniel Méndez, Kristian Beckers, Sebastian Klepper

    Abstract: Many industrial software development processes today have to comply with security standards such as the IEC~62443-4-1. These standards, written in natural language, are ambiguous and complex to understand. This is especially true for non-security experts. Security practitioners thus invest much effort into comprehending standards and, later, into introducing them to development teams. However, our… ▽ More

    Submitted 27 May, 2021; originally announced May 2021.

    Comments: Authors Copy

    Journal ref: International Conference on Current Trends in Theory and Practice of Informatics SOFSEM 2021: Theory and Practice of Computer Science pp 458-471

  2. How to Integrate Security Compliance Requirements with Agile Software Engineering at Scale?

    Authors: Fabiola Moyón, Daniel Méndez Fernández, Kristian Beckers, Sebastian Klepper

    Abstract: Integrating security into agile software development is an open issue for research and practice. Especially in strongly regulated industries, complexity increases not only when scaling agile practices but also when aiming for compliance with security standards. To achieve security compliance in a large-scale agile context, we developed S2C-SAFe: An extension of the Scaled Agile Framework that is c… ▽ More

    Submitted 27 May, 2021; originally announced May 2021.

    Comments: Authors' Copy

    Journal ref: Product-Focused Software Process Improvement - 21st International Conference, PROFES 2020

  3. Integration of Security Standards in DevOps Pipelines: An Industry Case Study

    Authors: Fabiola Moyón Constante, Rafael Soares, Maria Pinto-Albuquerque, Daniel Méndez, Kristian Beckers

    Abstract: In the last decade, companies adopted DevOps as a fast path to deliver software products according to customer expectations, with well aligned teams and in continuous cycles. As a basic practice, DevOps relies on pipelines that simulate factory swim-lanes. The more automation in the pipeline, the shorter a lead time is supposed to be. However, applying DevOps is challenging, particularly for indus… ▽ More

    Submitted 27 May, 2021; originally announced May 2021.

    Comments: Author's Copy of the Manuscript

    Journal ref: International Conference on Product-Focused Software Process Improvement PROFES 2020: 434-452

  4. arXiv:2101.02106  [pdf, other

    cs.SE

    When Interactive Graphic Storytelling Fails

    Authors: James Barela, Tiago Espinha Gasiba, Santiago Reinhard Suppan, Marc Berges, Kristian Beckers

    Abstract: Many people are unaware of the digital dangers that lie around each cyber-corner. Teaching people how to recognize dangerous situations is crucial, especially for those who work on or with computers. We postulated that interactive graphic vignettes could be a great way to expose professionals to dangerous situations and demonstrate the effects of their choices in these situations. In that way, we… ▽ More

    Submitted 6 January, 2021; originally announced January 2021.

    Comments: Preprint accepted for publication at the IEEE 27th International Requirements Engineering Conference (RE), 2019

  5. arXiv:2101.02100  [pdf, other

    cs.SE

    On the Requirements for Serious Games geared towards Software Developers in the Industry

    Authors: Tiago Espinha Gasiba, Kristian Beckers, Santiago Suppan, Filip Rezabek

    Abstract: Teaching industry staff on cybersecurity issues is a fundamental activity that must be undertaken in order to guarantee the delivery of successful and robust products to market. Much research attention has been devoted to this topic over the last years. However, the research which has been done has not focused on developing secure code in industrial environments. In this paper we take a look at th… ▽ More

    Submitted 6 January, 2021; originally announced January 2021.

    Comments: Preprint accepted for publication at the IEEE 27th International Requirements Engineering Conference (RE), 2019

  6. Identifying Relevant Information Cues for Vulnerability Assessment Using CVSS

    Authors: Luca Allodi, Sebastian Banescu, Henning Femmer, Kristian Beckers

    Abstract: The assessment of new vulnerabilities is an activity that accounts for information from several data sources and produces a `severity' score for the vulnerability. The Common Vulnerability Scoring System (\CVSS) is the reference standard for this assessment. Yet, no guidance currently exists on \emph{which information} aids a correct assessment and should therefore be considered. In this paper w… ▽ More

    Submitted 20 March, 2018; originally announced March 2018.

    Comments: 9 pages, CODASPY 2018

    Journal ref: Proceedings of the 2018 ACM Conference on Data and Application Security and Privacy

  7. arXiv:1712.06843  [pdf, other

    cs.SE

    An Exploratory Survey of Hybrid Testing Techniques Involving Symbolic Execution and Fuzzing

    Authors: Saahil Ognawala, Ana Petrovska, Kristian Beckers

    Abstract: Recent efforts in practical symbolic execution have successfully mitigated the path-explosion problem to some extent with search-based heuristics and compositional approaches. Similarly, due to an increase in the performance of cheap multi-core commodity computers, fuzzing as a viable method of random mutation-based testing has also seen promise. However, the possibility of combining symbolic exec… ▽ More

    Submitted 19 December, 2017; originally announced December 2017.

    Comments: Author's preprint

  8. arXiv:1710.05720  [pdf, other

    cs.AI cs.PF cs.SE

    ACCBench: A Framework for Comparing Causality Algorithms

    Authors: Simon Rehwald, Amjad Ibrahim, Kristian Beckers, Alexander Pretschner

    Abstract: Modern socio-technical systems are increasingly complex. A fundamental problem is that the borders of such systems are often not well-defined a-priori, which among other problems can lead to unwanted behavior during runtime. Ideally, unwanted behavior should be prevented. If this is not possible the system shall at least be able to help determine potential cause(s) a-posterori, identify responsibl… ▽ More

    Submitted 10 October, 2017; originally announced October 2017.

    Comments: In Proceedings CREST 2017, arXiv:1710.02770

    Journal ref: EPTCS 259, 2017, pp. 16-30