Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision |
| software [2014/08/18 21:33] – [Click and Run] fabio.massacci@unitn.it | software [Unknown date] (current) – external edit (Unknown date) 127.0.0.1 |
|---|
| The group has made available a number of software tools that can be also found in the individual [[research_activities|research activities]]. | The group has made available a number of software tools that can be also found in the individual [[research_activities|research activities]]. |
| |
| ===== Click and Run ===== | ===== Download and Run ===== |
| | * **LastPyMie** (A tool for identifying the differences between build artifacts of PyPI packages and the respective source code repository) is available on [[https://github.com/assuremoss/lastpymile|Github]]. The paper appears on [[https://securitylab.disi.unitn.it/lib/exe/fetch.php?media=research_activities:experiments:esecfse2021.pdf|ESEC/FSE'21]]. |
| * {{:tissec-analysis-14.r.zip| R-code (zip file)}} to generate the case controlled [[vulnerability_discovery_models|study for vulnerability exploitation]] is available for sharing. The paper appears in [[http://dl.acm.org/citation.cfm?id=2630069|ACM TISSEC]]. The [[datasets|datasets]] are also available. | * {{:tissec-analysis-14.r.zip| R-code (zip file)}} to generate the case controlled [[vulnerability_discovery_models|study for vulnerability exploitation]] is available for sharing. The paper appears in [[http://dl.acm.org/citation.cfm?id=2630069|ACM TISSEC]]. The [[datasets|datasets]] are also available. |
| * TestREx (a Testbed for Repeatable Exploits) is available on [[https://github.com/standash/TestREx|GitHub]]. The paper appears on [[https://www.usenix.org/system/files/conference/cset14/cset14-paper-dashevskyi.pdf|USENIX CSET'14]]. | * **TestREx** (a Testbed for Repeatable Exploits) is available on [[https://github.com/standash/TestREx|GitHub]]. Instructions on how to use are available on our [[testrex|wiki]]. The paper appears on [[https://www.usenix.org/system/files/conference/cset14/cset14-paper-dashevskyi.pdf|USENIX CSET'14]]. |
| * The Web-service for Autonomic Interactive Authorization is available as [[http://www.interactiveaccess.org|open source]]. It is a result of our research on [[practical_enforcement_of_information_flow_properties|Practical Enforcement of Security Properties]]. The paper appears in [[http://dx.doi.org/10.1145/1380422.1380424|ACM TAAS]]. | * **MalwareLab** scripts for experimenting with exploit kits described in our [[malware_analysis]] are available for download {{:malwarelab-experiment-unitn.zip|(ZIP)}}. The paper appears in [[https://www.usenix.org/conference/cset13/workshop-program/presentation/allodi|Usenix CSET 2013]]. An additional archive with historical releases of Mozilla Firefox, Opera Browser, Adobe Flash and Adobe Reader is also available for sharing. You can follow the guidelines [[datasets|here]] to request it. |
| | * The //Web-service for Autonomic Interactive Authorization// is available as [[http://www.interactiveaccess.org|open source]]. The paper appears in [[http://dx.doi.org/10.1145/1380422.1380424|ACM TAAS]]. |
| |
| |