Barbara Kordy

Publications

Peer-reviewed international journals

Barbara Kordy, Patrick Schweitzer, Marc Pouly. Probabilistic Reasoning with Graphical Security Models. Information Sciences, INS11951, pages 111–131, Elsevier, 2016, DOI: 10.1016/j.ins.2016.01.010. Available online.pre-print ]
Barbara Kordy, Ludovic Piètre-Cambacédès, Patrick Schweitzer. DAG-Based Attack and Defense Modeling: Don't Miss the Forest for the Attack Trees. Computer Science Review, volume 13–14, pages 1–38, Elsevier, 2014, DOI: 10.1016/j.cosrev.2014.07.001. Available online.pre-print ]
Barbara Kordy, Sjouke Mauw, Saša Radomirović, Patrick Schweitzer. Attack-defense trees. Journal of Logic and Computation, volume 24(1), pages 55–87. Oxford Journals, 2014. [ pre-print ]
Alessandra Bagnato, Barbara Kordy, Per Håkon Meland, Patrick Schweitzer. Attribute Decoration of Attack-Defense Trees. International Journal of Secure Software Engineering, volume 3(2), pages 1-35. IGI Global, 2012. [ .pdf ] [ excellence award ]

Peer-reviewed international conferences and workshops

Maxime Audinot, Sophie Pinchinat, and Barbara Kordy. Is my attack tree correct? The Proceedings of the 22nd European Symposium on Research in Computer Security (ESORICS'17), to appear in LNCS series, Springer, 2017.
Barbara Kordy and Wojciech Wideł. How well can I secure my system? The Proceedings of the 13th International Conference on integrated Formal Methods (iFM'17), to appear in LNCS series, Springer, 2017. [ .pdf ]
Gildas Avoine, Xavier Carpent, Barbara Kordy, Florent Tardif. How to Handle Rainbow Tables with External Memory. The Proceedings of the 22nd Australasian Conference on Information Security and Privacy (ACISP'17), volume 10342 of LNCS, pages 306-323, Springer, 2017. [ .pdf ]
Barbara Kordy, Piotr Kordy, Yoann van den Boom. SPTool - Equivalence Checker for SAND Attack Trees. The Proceedings of the 11th International Conference on Risks and Security of Internet and Systems (CRiSIS'16), volume 10158 of LNCS, pages 105-113, Springer, 2017. [ .pdf ] [ SPTool website ]
Ravi Jhawar, Barbara Kordy, Sjouke Mauw, Saša Radomirović, Rolando Trujillo-Rasua. Attack Trees with Sequential Conjunction. The Proceedings of the 30th IFIP TC 11 International Conference on ICT Systems Security and Privacy Protection (IFIP SEC'15), volume 455 of IFIP AICT, pages 339-353, Springer, 2015. [ extended version ]
Barbara Kordy, Patrick Schweitzer, Marc Pouly. A Probabilistic Framework for Security Scenarios with Dependent Actions. The Proceedings of The 11th International Conference on Integrated Formal Methods (iFM'14), volume 8739 of LNCS, pages 256–271, Springer, 2014. [ .pdf ]
Barbara Kordy, Piotr Kordy, Sjouke Mauw, Patrick Schweitzer. ADTool: Security Analysis with Attack-Defense Trees The Proceedings of the 10th International Conference on Quantitative Evaluation of Systems (QEST'13), volume 8054 of LNCS, pages 173-176, Springer, 2013. [ extended version ]
Barbara Kordy, Sjouke Mauw, Patrick Schweitzer. Quantitative Questions on Attack-Defense Trees. The proceedings of the 15th Annual International Conference on Information Security and Cryptology (ICISC'12), volume 7839 of LNCS, pages 49-64, Springer, 2013. [ extended version ]
Barbara Kordy, Saša Radomirović. Constructing Optimistic Multi-party Contract Signing Protocols. Proceedings of Computer Security Foundations Symposium (CSF'12), IEEE, pages 215-229, 2012. [ .pdf ]
Barbara Kordy, Marc Pouly, Patrick Schweitzer. Computational Aspects of Attack-Defense Trees. In Security and Intelligent Information Systems (SIIS 2011), volume 7053 of LNCS, pages 103-116, Springer, 2011. [ .pdf ]
Barbara Kordy, Sjouke Mauw, Saša Radomirović, Patrick Schweitzer. Foundations of Attack-Defense Trees. In Formal Aspects of Security and Trust (FAST'10) , volume 6561 of LNCS, pages 80-95. Springer, 2011. [ .pdf ]
Barbara Kordy, Sjouke Mauw, Matthijs Melissen, and Patrick Schweitzer. Attack-defense trees and two-player binary zero-sum extensive form games are equivalent. In Proceedings of the Conference on Decision and Game Theory for Security (GameSec'10), volume 6442 of LNCS, pages 245-256. Springer, 2010. [ .pdf ]
Barbara Kordy. A Rewrite Approach for Pattern Containment. In Recent Trends in Algebraic Development Techniques (WADT'08), volume 5486 of LNCS, pages 236-250. Springer, 2009. [ .pdf ]
Barbara Fila-Kordy. A Rewrite Approach for Pattern Containment - Application to Query Evaluation on Compressed Documents. In Structure-Based Compression of Complex Massive Data, number 08261 in Dagstuhl Seminar Proceedings. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany, 2008.
Barbara Fila and Siva Anantharaman. A Clausal View for Access Control and XPath Query Evaluation. In pre-proceedings of The 17th International Symposium on Logic-Based Program Synthesis and Transformation (LOPSTR'07), Kongens Lyngby, Denmark, 2007. [ .pdf ]
Barbara Fila and Siva Anantharaman. Automata for Positive Core XPath Queries on Compressed Documents. In Herman, M., Voronkov, A., eds.: Logic for Programming, Artificial Intelligence, and Reasoning (LPAR'06), volume 4246 of LNAI, pages 467-481. Springer, 2006. [ extended version  ]
Barbara Fila and Siva Anantharaman. Querying Compressed Documents with Tree/Dag Automata. In proceedings of The Third Taiwanese-French Conference on Information Technology (TFIT'06), LORIA, Nancy, France, 2006.

Edited proceedings

Barbara Kordy, Mathias Ekstedt, and Dong Seong Kim, editors. Proceedings of the Third International Workshop on Graphical Models for Security, GraMSec 2016, Lisbon, Portugal, June 27, 2016, volume 9987 of LNCS, Springer, 2016. [ from publisher ]
Sjouke Mauw, Barbara Kordy, and Sushil Jajodia, editors. Proceedings of the Second International Workshop on Graphical Models for Security, GraMSec 2015, Verona, Italy, July 13, 2015, volume 9390 of LNCS, Springer, 2015. [ from publisher ]
Barbara Kordy, Sjouke Mauw, and Wolter Pieters, editors. Proceedings of the First International Workshop on Graphical Models for Security, GraMSec 2014, Grenoble, France, April 12, 2014, volume 148 of EPTCS, 2014. [ from publisher ]

Peer-reviewed national publications

Thomas Genet, Barbara Kordy, and Amaury Vansyngel. Vers un outil de vérification formelle légère pour OCaml. In Dadeau, F., and Le Gall, P., eds.: 14èmes journées Approches Formelles dans l'Assistance au Développement Logiciel (AFADL'15), pages 28-33. June 9-10, 2015, Bordeaux, France. [  AFADL'15 Proceedings  ]

Ph.D. thesis

Barbara Kordy. Automates pour l'analyse de documents XML compressés, applications à la sécurité d'accès. University of Orléans, November 2008. [ .pdf ]