Congratulations to Michael on passing his PhD viva!
Many congratulations to Michael Herzberg who passed his PhD viva with minor corrections!
Many congratulations to Michael Herzberg who passed his PhD viva with minor corrections!
Both the home/personal online offerings of Microsoft Outlook (e.g., Outlook.com, Office 365 Home, or Office 365 Personal) and the professional Office 365 offerings (e.g., as part of Office 365 Advanced Threat Detection) might rewrite links in received emails with the goal of protecting users against certain threats (e.g., phishing).
A warm welcome to Dr Diego Marmsoler. Diego is joining the Security and Trust of Advanced Systems Group at the Department of Computer Science of the University of Exeter as a Lecturer in Cyber Security.
After a successful 19th edition of the International Workshop on OCL and Textual Modeling in Munich the proceedings are now available online, as Volume 2513 of the CEUR Workshop Proceedings.
A common problem in the certification of highly safety or security critical systems is the consistency of the certification documentation in general and, in particular, the linking between semiformal and formal content of the certification documentation.
The trend towards ever more complex client-side web applications is unstoppable. Compared to traditional software development, client-side web development lacks a well-established component model, i.e., a method for easily and safely reusing already developed functionality. To address this issue, the web community started to adopt shadow trees as part of the Document Object Model (DOM). Shadow trees allow developers to “partition” a DOM instance into parts that should be safely separated, e.g., code modifying one part should not unintentionally affect other parts of the DOM.
Software is changing the marine world both by providing new functionality and opportunities and by replacing mechanical controls by software-based systems. In this session, we will look at the security risk of interconnected software systems in general, discuss lessons learned in other sectors, and explore what makes cybersecurity for the marine sector special.
DOF is a novel framework for defining ontologies and en- forcing them during document development and document evolution. A major goal of DOF is the integrated development of formal certification documents (e.g., for Common Criteria or CENELEC 50128) that require consistency across both formal and informal arguments.
Welcome to the blog of the Software Assurance & Security Research Team at the University of Exeter. We blog regularly news, tips & tricks, as well as fun facts about software assurance, reliability, security, testing, verification, hacking, and logic.
You can also follow us on Twitter: @logicalhacking.