iew by year: 1999 - 2003 2004 2005 2006 2007 2008 2009
  2010 2011 2012 2013 2014 2015 All
Keyword:  model checking static analysis simulation software quality & testing software architecture service systems

Journal Publications 2011

J11. Basagiannis, S., Petridou, S., Alexiou, N., Papadimitriou, G., Katsaros, P., Quantitative analysis of a certified e-mail protocol in mobile environments: A probabilistic model checking approach, Computers & Security, Vol. 30 (4), 257-272, Elsevier, 2011

Keywords: security protocols, probabilistic model checking, mobile computing
J10. Basagiannis, S., Katsaros, P., Pombortsis, A., Synthesis of attack actions using model checking for the verification of security protocols, Security and Communication Networks, Vol. 4 (2), 147-161, John Wiley & Sons, 2011
Keywords: security protocols, intruder modeling, model checking

Book Chapters 2011 

BC3. Loizidis, A., Almaliotis, V., Katsaros, P., Static Program Analysis of Multi-Applet JavaCard Applications, Software Engineering for Secure Systems: Industrial and Research Perspectives, Ed. by H. Mouratidis (Un. of East London, UK), IGI Global, 286-304 (online:, 2011
Keywords: static program analysis, security verification, information flow, temporal safety, taint analysis

Articles in Conference Proceedings 2011 

C38. Deshpande, T., Katsaros, P., Basagiannis, S., Smolka, S. Formal analysis of the DNS Bandwidth Amplification Attack and its countermeasures using probabilistic model checking, In Proceedings of the 13th IEEE International High Assurance Systems Engineering Symposium (HASE), Boca Raton, Florida, IEEE Computer Society, 360-367, 2011
bandwidth amplification attack, probabilistic model checking
C37. Kakarontzas, G., Gerogiannis, V. C., Stamelos, I., Katsaros, P. Elastic component characterization with respect to quality properties: an intuitionistic fuzzy-based approach, In Proceedings of the 15th Panhellenic Conference on Informatics (PCI), Kastoria, Greece, IEEE Computer Society, 270-274, 2011

Keywords: software quality, component-based software
C36. Tsiakis, T., Katsaros, P., Gritzalis, D. Economic evaluation of Interactive Audio Media for securing Internet services, In Proceedings of the 7th Int. Conference in Global Security, Safety and Sustainability (ICGS3), Thessaloniki, Greece, Springer, 2011
Keywords: security economics, spam, internet services
C35. Katos, V., Vrakas, D., Katsaros, P. A framework for access control with inference constraints, In Proceedings of the 35th IEEE Computer Software and Applications Conference (COMPSAC), Munich, Germany, IEEE Computer Society, 289-297, 2011

Keywords: access control, inference control
C34. Chatzieleftheriou, G., Katsaros, P. Test driving static analysis tools in search of C code vulnerabilities, In Proceedings of the 35th IEEE Computer Software and Applications Conference Workshops (COMPSACW), Munich, Germany, IEEE Computer Society, 96-103, 2011

Keywords: static program analysis, software security, benchmark tests  
C33. Petridou, S., Basagiannis, S., Alexiou, N., Papadimitriou, G., Katsaros, P. Quantitative model checking of an RSA-based email protocol on mobile devices, In Proceedings of the 16th IEEE Symposium on Computers and Communications (ISCC), Corfu, Greece, IEEE Computer Society, 639-645, 2011

Keywords: security protocols, probabilistic model checking, mobile computing
C32. Bartocci, E., Grosu, R., Katsaros, P., Ramakrishnan, CR, Smolka, S. Model Repair for probabilistic systems, In Proceedings of the 17th Int. Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS), Saarbrücken, Germany, LNCS 6605, 326-340, Springer Verlag, 2011

Keywords: model repair, probabilistic model checking, nonlinear programming
C31. Soupionis, Y., Basagiannis, S., Katsaros, P., Gritzalis, D. A formally verified mechanism for countering SPIT, 5th International Workshop on Critical Information Infrastructure Security (CRITIS'10), Athens, Greece, LNCS 6712, 128-139, Springer Verlag, 2011
Keywords: Spam over Internet Telephony (SPIT), policy management, model checking, formal verification, Voice over IP (VoIP)