Riccardo Scandariato

Orcid: 0000-0003-3591-7671

Affiliations:
  • Hamburg University of Technology, Germany
  • University of Gothenburg, Sweden
  • Chalmers University of Technology, Sweden


According to our database1, Riccardo Scandariato authored at least 107 papers between 2002 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
APR4Vul: an empirical study of automatic program repair techniques on real-world Java vulnerabilities.
Empir. Softw. Eng., February, 2024

Comparison of Static Analysis Architecture Recovery Tools for Microservice Applications.
CoRR, 2024

What Can Self-Admitted Technical Debt Tell Us About Security? A Mixed-Methods Study.
CoRR, 2024

CATMA: Conformance Analysis Tool For Microservice Applications.
CoRR, 2024

How Dataflow Diagrams Impact Software Security Analysis: an Empirical Experiment.
CoRR, 2024

2023
Cybersecurity discussions in Stack Overflow: a developer-centred analysis of engagement and self-disclosure behaviour.
Soc. Netw. Anal. Min., December, 2023

Automatic extraction of security-rich dataflow diagrams for microservice applications written in Java.
J. Syst. Softw., August, 2023

Checking security compliance between models and code.
Softw. Syst. Model., February, 2023

Microservice Security Metrics for Secure Communication, Identity Management, and Observability.
ACM Trans. Softw. Eng. Methodol., January, 2023

CASCADE: An Asset-driven Approach to Build Security Assurance Cases for Automotive Systems.
ACM Trans. Cyber Phys. Syst., January, 2023

LLMSecEval: A Dataset of Natural Language Prompts for Security Evaluations.
Proceedings of the 20th IEEE/ACM International Conference on Mining Software Repositories, 2023

microSecEnD: A Dataset of Security-Enriched Dataflow Diagrams for Microservice Applications.
Proceedings of the 20th IEEE/ACM International Conference on Mining Software Repositories, 2023

DockerCleaner: Automatic Repair of Security Smells in Dockerfiles.
Proceedings of the IEEE International Conference on Software Maintenance and Evolution, 2023

Developers Need Protection, Too: Perspectives and Research Challenges for Privacy in Social Coding Platforms.
Proceedings of the 16th IEEE/ACM International Conference on Cooperative and Human Aspects of Software Engineering, 2023

Regret, Delete, (Do Not) Repeat: An Analysis of Self-Cleaning Practices on Twitter After the Outbreak of the COVID-19 Pandemic.
Proceedings of the Extended Abstracts of the 2023 CHI Conference on Human Factors in Computing Systems, 2023

2022
CONSERVE: A framework for the selection of techniques for monitoring containers security.
J. Syst. Softw., 2022

Security of Microservice Applications: A Practitioners' Perspective on Challenges and Best Practices.
CoRR, 2022

GitHub Considered Harmful? Analyzing Open-Source Projects for the Automatic Generation of Cryptographic API Call Sequences.
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022

Identifying security-related requirements in regulatory documents based on cross-project classification.
Proceedings of the 18th International Conference on Predictive Models and Data Analytics in Software Engineering, 2022

Vul4J: A Dataset of Reproducible Java Vulnerabilities Geared Towards the Study of Program Repair Techniques.
Proceedings of the 19th IEEE/ACM International Conference on Mining Software Repositories, 2022

Maestro: a platform for benchmarking automatic program repair tools on software vulnerabilities.
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022

RIPOSTE: A Collaborative Cyber Attack Response Framework for Automotive Systems.
Proceedings of the 48th Euromicro Conference on Software Engineering and Advanced Applications, 2022

Conversational DevBots for Secure Programming: An Empirical Study on SKF Chatbot.
Proceedings of the EASE 2022: The International Conference on Evaluation and Assessment in Software Engineering 2022, Gothenburg, Sweden, June 13, 2022

Towards a Security Benchmark for the Architectural Design of Microservice Applications.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

STRIPED: A Threat Analysis Method for IoT Systems.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

SoK: Security of Microservice Applications: A Practitioners' Perspective on Challenges and Best Practices.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

Precise Analysis of Purpose Limitation in Data Flow Diagrams.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
SyntIoT: Privacy and security experimentation in consumer-oriented IoT ecosystems.
EAI Endorsed Trans. Security Safety, 2021

Finding security threats that matter: Two industrial case studies.
J. Syst. Softw., 2021

Security assurance cases - state of the art of an emerging approach.
Empir. Softw. Eng., 2021

Secure Software Development in the Era of Fluid Multi-party Open Software and Services.
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering: New Ideas and Emerging Results, 2021

Asset-driven Security Assurance Cases with Built-in Quality Assurance.
Proceedings of the 2nd IEEE/ACM International Workshop on Engineering and Cybersecurity of Critical Systems, 2021

2020
Cross-project Classification of Security-related Requirements.
CoRR, 2020

REMIND: A Framework for the Resilient Design of Automotive Systems.
Proceedings of the IEEE Secure Development, SecDev 2020, Atlanta, GA, USA, 2020

JavaScript Malware Detection Using Locality Sensitive Hashing.
Proceedings of the ICT Systems Security and Privacy Protection, 2020

Secure Data-Flow Compliance Checks between Models and Code based on Automated Mappings.
Proceedings of the Software Engineering 2020, 2020

Automating the early detection of security design flaws.
Proceedings of the MoDELS '20: ACM/IEEE 23rd International Conference on Model Driven Engineering Languages and Systems, 2020

Perception and Acceptance of an Autonomous Refactoring Bot.
Proceedings of the 12th International Conference on Agents and Artificial Intelligence, 2020

Contextualisation of Data Flow Diagrams for Security Analysis.
Proceedings of the Graphical Models for Security - 7th International Workshop, 2020

Security assurance cases for road vehicles: an industry perspective.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

2019
Finding Security Threats That Matter: An Industrial Case Study.
CoRR, 2019

Towards Automated Security Design Flaw Detection.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering Workshops, 2019

Current and future bots in software development.
Proceedings of the 1st International Workshop on Bots in Software Engineering, 2019

Flaws in Flows: Unveiling Design Flaws via Information Flow Analysis.
Proceedings of the IEEE International Conference on Software Architecture, 2019

Inspection guidelines to identify security design flaws.
Proceedings of the 13th European Conference on Software Architecture, 2019

2018
Threat analysis of software systems: A systematic literature review.
J. Syst. Softw., 2018

A Lingua Franca for Security by Design.
Proceedings of the 2018 IEEE Cybersecurity Development, SecDev 2018, Cambridge, MA, USA, 2018

Generative secure design, defined.
Proceedings of the 40th International Conference on Software Engineering: New Ideas and Emerging Results, 2018

Back to the Drawing Board - Bringing Security Constraints in an Architecture-centric Software Development Process.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

Privacy Compliance Via Model Transformations.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy Workshops, 2018

Two Architectural Threat Analysis Techniques Compared.
Proceedings of the Software Architecture, 2018

2017
The Effect of Dimensionality Reduction on Software Vulnerability Prediction Models.
IEEE Trans. Reliab., 2017

Design notations for secure software: a systematic literature review.
Softw. Syst. Model., 2017

A Modular Meta-model for Security Solutions.
Proceedings of the Companion to the first International Conference on the Art, 2017

A Model for Provably Secure Software Design.
Proceedings of the 5th IEEE/ACM International FME Workshop on Formal Methods in Software Engineering, 2017

Traceability Metrics as Early Predictors of Software Defects?
Proceedings of the 2017 IEEE International Conference on Software Architecture, 2017

Towards Security Threats that Matter.
Proceedings of the Computer Security - ESORICS 2017 International Workshops, 2017

Theta Architecture: Preserving the Quality of Analytics in Data-Driven Systems.
Proceedings of the New Trends in Databases and Information Systems, 2017

2016
Traceability Data in Early Development Phases as an Enabler for Decision Support.
Proceedings of the Scientific Workshop Proceedings of XP2016, 2016

Data veracity in intelligent transportation systems: The slippery road warning scenario.
Proceedings of the 2016 IEEE Intelligent Vehicles Symposium, 2016

A Privacy-Aware Conceptual Model for Handling Personal Data.
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation: Foundational Techniques, 2016

Is Newer Always Better?: The Case of Vulnerability Prediction Models.
Proceedings of the 10th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, 2016

Static Analysis and Penetration Testing from the Perspective of Maintenance Teams.
Proceedings of the 10th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, 2016

2015
A descriptive study of Microsoft's threat modeling technique.
Requir. Eng., 2015

SoSPa: A system of Security design Patterns for systematically engineering secure systems.
Proceedings of the 18th ACM/IEEE International Conference on Model Driven Engineering Languages and Systems, 2015

Do Security Patterns Really Help Designers?
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015

MASC: Modelling Architectural Security Concerns.
Proceedings of the 7th IEEE/ACM International Workshop on Modeling in Software Engineering, 2015

2014
Empirical Assessment of Security Requirements and Architecture: Lessons Learned.
Proceedings of the Engineering Secure Future Internet Services and Systems, 2014

Predicting Vulnerable Software Components via Text Mining.
IEEE Trans. Software Eng., 2014

Change patterns - Co-evolving requirements and architecture.
Softw. Syst. Model., 2014

Empirical evaluation of a privacy-focused threat modeling methodology.
J. Syst. Softw., 2014

Design Churn as Predictor of Vulnerabilities?
Int. J. Secur. Softw. Eng., 2014

Evolution of Security Engineering Artifacts: A State of the Art Survey.
Int. J. Secur. Softw. Eng., 2014

Predicting Vulnerable Components: Software Metrics vs Text Mining.
Proceedings of the 25th IEEE International Symposium on Software Reliability Engineering, 2014

2013
Least privilege analysis in software architectures.
Softw. Syst. Model., 2013

Static analysis versus penetration testing: A controlled experiment.
Proceedings of the IEEE 24th International Symposium on Software Reliability Engineering, 2013

2012
Extraction of an Architectural Model for Least Privilege Analysis.
Int. J. Secur. Softw. Eng., 2012

Reusable Formal Models for Secure Software Architectures.
Proceedings of the 2012 Joint Working IEEE/IFIP Conference on Software Architecture and European Conference on Software Architecture, 2012

Does organizing security patterns focus architectural choices?
Proceedings of the 34th International Conference on Software Engineering, 2012

2011
A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements.
Requir. Eng., 2011

Integrating Patient Consent in e-Health Access Control.
Int. J. Secur. Softw. Eng., 2011

Composition of least privilege analysis results in software architectures (position paper).
Proceedings of the 7th International Workshop on Software Engineering for Secure Systems, 2011

Requirements-Driven Runtime Reconfiguration for Security.
Proceedings of the Eternal Systems - First International Workshop, 2011

The Security Twin Peaks.
Proceedings of the Engineering Secure Software and Systems - Third International Symposium, 2011

Preserving Aspects via Automation: A Maintainability Study.
Proceedings of the 5th International Symposium on Empirical Software Engineering and Measurement, 2011

2010
SecureChange: Security Engineering for Lifelong Evolvable Systems.
Proceedings of the Leveraging Applications of Formal Methods, Verification, and Validation, 2010

Automated Detection of Least Privilege Violations in Software Architectures.
Proceedings of the Software Architecture, 4th European Conference, 2010

Security in Context: Analysis and Refinement of Software Architectures.
Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010

From aspect-oriented models to aspect-oriented code?: the maintenance perspective.
Proceedings of the 9th International Conference on Aspect-Oriented Software Development, 2010

2009
On the secure software development process: CLASP, SDL and Touchpoints compared.
Inf. Softw. Technol., 2009

Measuring the interplay of security principles in software architectures.
Proceedings of the Third International Symposium on Empirical Software Engineering and Measurement, 2009

Linking Privacy Solutions to Developer Goals.
Proceedings of the The Forth International Conference on Availability, 2009

Risk-Driven Architectural Decomposition.
Proceedings of the The Forth International Conference on Availability, 2009

2008
Identity in federated electronic healthcare.
Proceedings of the 1st IFIP Wireless Days, 2008

Using Multi-Level Security Annotations to Improve Software Assurance.
Proceedings of the 11th IEEE High Assurance Systems Engineering Symposium, 2008

Transforming Security Requirements into Architecture.
Proceedings of the The Third International Conference on Availability, 2008

Hardening XDS-Based Architectures.
Proceedings of the The Third International Conference on Availability, 2008

Application-Oriented Trust in Distributed Computing.
Proceedings of the The Third International Conference on Availability, 2008

Using Security Patterns to Combine Security Metrics.
Proceedings of the The Third International Conference on Availability, 2008

2007
An Analysis of the Security Patterns Landscape.
Proceedings of the Third International Workshop on Software Engineering for Secure Systems, 2007

On the Secure Software Development Process: CLASP and SDL Compared.
Proceedings of the Third International Workshop on Software Engineering for Secure Systems, 2007

Process Activities Supporting Security Principles.
Proceedings of the 31st Annual International Computer Software and Applications Conference, 2007

2006
Towards a measuring framework for security properties of software.
Proceedings of the 2nd ACM Workshop on Quality of Protection, 2006

Remote Trust with Aspect-Oriented Programming.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

2004
Plicy-based solutions for distributed systems.
PhD thesis, 2004

The Design and Evaluation of a Defense System for Internet Worms.
Proceedings of the 23rd International Symposium on Reliable Distributed Systems (SRDS 2004), 2004

2002
LMAP: a protocol to automate the setup of logical networks.
Proceedings of the Proceedings 10th IEEE International Conference on Networks: Towards Network Superiority, 2002


  Loading...