Barbara FILA

Slava Ukraini!
Publications

Peer-reviewed international journals

Beyond 2014: Formal methods for attack tree-based security modeling. Wojciech Wideł, Maxime Audinot, Barbara Fila and Sophie Pinchinat. ACM Computing Surveys, volume 52 issue 4, September 2019. [ Available online ] [ pre-print ]
Probabilistic Reasoning with Graphical Security Models. Barbara Kordy, Patrick Schweitzer, Marc Pouly. Information Sciences, INS11951, pages 111–131, Elsevier, 2016, DOI: 10.1016/j.ins.2016.01.010. Available online.pre-print ]
DAG-Based Attack and Defense Modeling: Don't Miss the Forest for the Attack Trees. Barbara Kordy, Ludovic Piètre-Cambacédès, Patrick Schweitzer. Computer Science Review, volume 13–14, pages 1–38, Elsevier, 2014, DOI: 10.1016/j.cosrev.2014.07.001. Available online.pre-print ]
Attack-defense trees. Journal of Logic and Computation, Barbara Kordy, Sjouke Mauw, Saša Radomirović, Patrick Schweitzer. volume 24(1), pages 55–87. Oxford Journals, 2014. [ pre-print ]
Attribute Decoration of Attack-Defense Trees. International Journal Alessandra Bagnato, Barbara Kordy, Per Håkon Meland, Patrick Schweitzer. of Secure Software Engineering, volume 3(2), pages 1-35. IGI Global, 2012. [ .pdf ] [ excellence award ]

Peer-reviewed international conferences and workshops

Exploiting attack–defense trees to find an optimal set of countermeasures. Barbara Fila and Wojciech Wideł. The Proceedings of the 33rd IEEE Computer Security Foundations Symposium (CSF'20) , IEEE Computer Society, 2020. [ extended version with proofs ]
Efficient attack-defense tree analysis using Pareto attribute domains. Barbara Fila and Wojciech Wideł. The Proceedings of the 32rd IEEE Computer Security Foundations Symposium (CSF'19) , pages 200-215, IEEE Computer Society, 2019. [ pdf ]
Attack-defense trees for abusing optical power meters: A case study and the OSEAD tool experience report. Barbara Fila and Wojciech Wideł. The Proceedings of the 6th International Workshop on Graphical Models for Security (GraMSec'19), LNCS series, Springer 2019. [ .pdf ]
Attack trees: a notion of missing attacks. Florence Wacheux, Sophie Pinchinat, Barbara Fila and Yann Thierry-Mieg. The Proceedings of the 6th International Workshop on Graphical Models for Security (GraMSec'19), LNCS series, Springer 2019. [ .pdf ]
Guided design of attack trees: a system-based approach. Maxime Audinot, Sophie Pinchinat and Barbara Kordy. The Proceedings of the 31st IEEE Computer Security Foundations Symposium (CSF'18) , pages 61-75, IEEE Computer Society, 2018. [ .pdf ]
On quantitative analysis of attack-defense trees with repeated labels. Barbara Kordy and Wojciech Wideł. The Proceedings of the 7th International Conference on Principles of Security and Trust (POST'18), volume 10804 of LNCS series, pages 325-346, Springer, 2018. [ .pdf ]
Evil Twins: Handling Repetitions in Attack-Defense Trees - A Survival Guide. Angèle Bossuat and Barbara Kordy. The Proceedings of the 4th International Workshop on Graphical Models for Security (GraMSec'17), volume 10744 of LNCS series, pages 17-37, Springer 2017. [ .pdf ]
Is my attack tree correct? Maxime Audinot, Sophie Pinchinat, and Barbara Kordy. The Proceedings of the 22nd European Symposium on Research in Computer Security (ESORICS'17), volume 10492 of LNCS series, pages 83-102, Springer, 2017. [ extended version ]
How well can I secure my system? Barbara Kordy and Wojciech Wideł. The Proceedings of the 13th International Conference on integrated Formal Methods (iFM'17), volume 10510 of LNCS series, pages 332–347, Springer, 2017. [ .pdf ]
How to Handle Rainbow Tables with External Memory. Gildas Avoine, Xavier Carpent, Barbara Kordy, Florent Tardif. The Proceedings of the 22nd Australasian Conference on Information Security and Privacy (ACISP'17), volume 10342 of LNCS, pages 306-323, Springer, 2017. [ .pdf ]
SPTool - Equivalence Checker for SAND Attack Trees. Barbara Kordy, Piotr Kordy, Yoann van den Boom. The Proceedings of the 11th International Conference on Risks and Security of Internet and Systems (CRiSIS'16), volume 10158 of LNCS, pages 105-113, Springer, 2017. [ .pdf ] [ SPTool website ]
Attack Trees with Sequential Conjunction. Ravi Jhawar, Barbara Kordy, Sjouke Mauw, Saša Radomirović, Rolando Trujillo-Rasua. The Proceedings of the 30th IFIP TC 11 International Conference on ICT Systems Security and Privacy Protection (IFIP SEC'15), volume 455 of IFIP AICT, pages 339-353, Springer, 2015. [ extended version ]
A Probabilistic Framework for Security Scenarios with Dependent Actions. Barbara Kordy, Patrick Schweitzer, Marc Pouly. The Proceedings of The 11th International Conference on Integrated Formal Methods (iFM'14), volume 8739 of LNCS, pages 256–271, Springer, 2014. [ .pdf ]
ADTool: Security Analysis with Attack-Defense Trees. Barbara Kordy, Piotr Kordy, Sjouke Mauw, Patrick Schweitzer. The Proceedings of the 10th International Conference on Quantitative Evaluation of Systems (QEST'13), volume 8054 of LNCS, pages 173-176, Springer, 2013. [ extended version ]
Quantitative Questions on Attack-Defense Trees. Barbara Kordy, Sjouke Mauw, Patrick Schweitzer. The proceedings of the 15th Annual International Conference on Information Security and Cryptology (ICISC'12), volume 7839 of LNCS, pages 49-64, Springer, 2013. [ extended version ]
Constructing Optimistic Multi-party Contract Signing Protocols. Barbara Kordy, Saša Radomirović. Proceedings of Computer Security Foundations Symposium (CSF'12), IEEE, pages 215-229, 2012. [ .pdf ]
Computational Aspects of Attack-Defense Trees. Barbara Kordy, Marc Pouly, Patrick Schweitzer. In Security and Intelligent Information Systems (SIIS 2011), volume 7053 of LNCS, pages 103-116, Springer, 2011. [ .pdf ]
Foundations of Attack-Defense Trees. Barbara Kordy, Sjouke Mauw, Saša Radomirović, Patrick Schweitzer. In Formal Aspects of Security and Trust (FAST'10) , volume 6561 of LNCS, pages 80-95. Springer, 2011. [ .pdf ]
Attack-defense trees and two-player binary zero-sum extensive form games are equivalent. Barbara Kordy, Sjouke Mauw, Matthijs Melissen, and Patrick Schweitzer. In Proceedings of the Conference on Decision and Game Theory for Security (GameSec'10), volume 6442 of LNCS, pages 245-256. Springer, 2010. [ .pdf ]
A Rewrite Approach for Pattern Containment. Barbara Kordy. In Recent Trends in Algebraic Development Techniques (WADT'08), volume 5486 of LNCS, pages 236-250. Springer, 2009. [ .pdf ]
A Rewrite Approach for Pattern Containment - Application to Query Evaluation on Compressed Documents. Barbara Fila-Kordy. In Structure-Based Compression of Complex Massive Data, number 08261 in Dagstuhl Seminar Proceedings. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany, 2008.
A Clausal View for Access Control and XPath Query Evaluation. Barbara Fila and Siva Anantharaman. In pre-proceedings of The 17th International Symposium on Logic-Based Program Synthesis and Transformation (LOPSTR'07), Kongens Lyngby, Denmark, 2007. [ .pdf ]
Automata for Positive Core XPath Queries on Compressed Documents. Barbara Fila and Siva Anantharaman. In Herman, M., Voronkov, A., eds.: Logic for Programming, Artificial Intelligence, and Reasoning (LPAR'06), volume 4246 of LNAI, pages 467-481. Springer, 2006. [ extended version  ]
Querying Compressed Documents with Tree/Dag Automata. Barbara Fila and Siva Anantharaman. In proceedings of The Third Taiwanese-French Conference on Information Technology (TFIT'06), LORIA, Nancy, France, 2006.

Edited proceedings

Proceedings of the Fifth International Workshop on Graphical Models for Security, GraMSec 2018, Oxford, UK, July 8, 2018, volume 11086 of LNCS, Springer, 2019. George Cybenko, David J. Pym, and Barbara Fila, editors. [ from publisher ]
Proceedings of the Third International Workshop on Graphical Models for Security, GraMSec 2016, Lisbon, Portugal, June 27, 2016, volume 9987 of LNCS, Springer, 2016. Barbara Kordy, Mathias Ekstedt, and Dong Seong Kim, editors. [ from publisher ]
Proceedings of the Second International Workshop on Graphical Models for Security, GraMSec 2015, Verona, Italy, July 13, 2015, volume 9390 of LNCS, Springer, 2015. Sjouke Mauw, Barbara Kordy, and Sushil Jajodia, editors. [ from publisher ]
Proceedings of the First International Workshop on Graphical Models for Security, GraMSec 2014, Grenoble, France, April 12, 2014, volume 148 of EPTCS, 2014. Barbara Kordy, Sjouke Mauw, and Wolter Pieters, editors. [ from publisher ]

Peer-reviewed national publications

Vers un outil de vérification formelle légère pour OCaml. Thomas Genet, Barbara Kordy, and Amaury Vansyngel. In Dadeau, F., and Le Gall, P., eds.: 14èmes journées Approches Formelles dans l'Assistance au Développement Logiciel (AFADL'15), pages 28-33. June 9-10, 2015, Bordeaux, France. [  AFADL'15 Proceedings  ]

Habilitation (HDR) thesis

The story of attack-defense trees. Barbara Fila. University of Rennes 1, July 2021.

Ph.D. thesis

Automates pour l'analyse de documents XML compressés, applications à la sécurité d'accès. Barbara Kordy. University of Orléans, November 2008. [ .pdf ]