Both the home/personal online offerings of Microsoft Outlook (e.g., Outlook.com,
Office 365 Home, or Office 365 Personal) and the professional Office 365
offerings (e.g., as part of Office 365 Advanced Threat Detection) might rewrite
links in received emails with the goal of protecting users against certain
threats (e.g., phishing).
A warm welcome to Dr Diego Marmsoler. Diego is joining
the Security and Trust of Advanced Systems
Group at
the Department of Computer Science of the University of
Exeter as a Lecturer in Cyber
Security.
After a successful 19th edition of the International Workshop on OCL and Textual
Modeling in Munich the proceedings are now available online, as Volume 2513 of
the CEUR Workshop Proceedings.
A common problem in the certification of highly safety or security critical
systems is the consistency of the certification documentation in general and, in
particular, the linking between semiformal and formal content of the
certification documentation.
The trend towards ever more complex client-side web applications is unstoppable.
Compared to traditional software development, client-side web development lacks
a well-established component model, i.e., a method for easily and safely reusing
already developed functionality. To address this issue, the web community
started to adopt shadow trees as part of the Document Object Model (DOM). Shadow
trees allow developers to “partition” a DOM instance into parts that should be
safely separated, e.g., code modifying one part should not unintentionally
affect other parts of the DOM.
Software is changing the marine world both by providing new functionality and
opportunities and by replacing mechanical controls by software-based systems. In
this session, we will look at the security risk of interconnected software
systems in general, discuss lessons learned in other sectors, and explore what
makes cybersecurity for the marine sector special.
DOF is a novel framework for defining ontologies and en- forcing them during
document development and document evolution. A major goal of DOF is the
integrated development of formal certification documents (e.g., for Common
Criteria or CENELEC 50128) that require consistency across both formal and
informal arguments.
Models are an important way of understanding software systems. If they do not
already exist, then we need to infer them from system behaviour. Most current
approaches infer classical FSM models that do not consider data, thus limiting
applicability. EFSMs provide a way to concisely model systems with an internal
state but existing inference techniques either do not infer models which allow
outputs to be computed from inputs, or rely heavily on comprehensive white-box
traces that reveal the internal program state, which are often unavailable.