Serena Elisa Ponta
Serena Elisa Ponta
SAP Security Research
Verified email at sap.com
Title
Cited by
Cited by
Year
The AVANTSSAR platform for the automated validation of trust and security of service-oriented architectures
A Armando, W Arsac, T Avanesov, M Barletta, A Calvi, A Cappai, ...
International Conference on Tools and Algorithms for the Construction andá…, 2012
1262012
Security validation of business processes via model-checking
W Arsac, L Compagna, G Pellegrino, SE Ponta
International Symposium on Engineering Secure Software and Systems, 29-42, 2011
602011
Model checking of security-sensitive business processes
A Armando, SE Ponta
International Workshop on Formal Aspects in Security and Trust, 66-80, 2009
602009
Impact assessment for vulnerabilities in open-source software libraries
H Plate, SE Ponta, A Sabetta
2015 IEEE International Conference on Software Maintenance and Evolutioná…, 2015
522015
Vulnerable open source dependencies: Counting those that matter
I Pashchenko, H Plate, SE Ponta, A Sabetta, F Massacci
Proceedings of the 12th ACM/IEEE International Symposium on Empiricalá…, 2018
422018
Beyond Metadata: Code-centric and Usage-based Analysis of Known Vulnerabilities in Open-source Software
SE Ponta, H Plate, A Sabetta
412018
A manually-curated dataset of fixes to vulnerabilities of open-source software
SE Ponta, H Plate, A Sabetta, M Bezzi, C Dangremont
2019 IEEE/ACM 16th International Conference on Mining Software Repositoriesá…, 2019
242019
Model checking authorization requirements in business processes
A Armando, SE Ponta
Computers & Security 40, 1-22, 2014
202014
Detection, assessment and mitigation of vulnerabilities in open source dependencies
SE Ponta, H Plate, A Sabetta
Empirical Software Engineering 25 (5), 3175-3215, 2020
162020
Multi-context exploit test management
A Sabetta, L Compagna, S Ponta, S Dashevskyi, D Dos Santos, ...
US Patent 9,811,668, 2017
152017
Cerberus: Automated synthesis of enforcement mechanisms for security-sensitive business processes
L Compagna, DR Dos Santos, SE Ponta, S Ranise
International Conference on Tools and Algorithms for the Construction andá…, 2016
132016
Formal specification and automatic analysis of business processes under authorization constraints: an action-based approach
A Armando, E Giunchiglia, SE Ponta
International Conference on Trust, Privacy and Security in Digital Businessá…, 2009
122009
Assessing vulnerability impact using call graphs
H Plate, S Ponta, A Sabetta
US Patent 9,792,200, 2017
112017
An action-based approach to the formal specification and automatic analysis of business processes under authorization constraints
A Armando, E Giunchiglia, M Maratea, SE Ponta
Journal of Computer and System Sciences 78 (1), 119-141, 2012
112012
Aegis: automatic enforcement of security policies in workflow-driven web applications
L Compagna, DR dos Santos, SE Ponta, S Ranise
Proceedings of the Seventh ACM on Conference on Data and Applicationá…, 2017
102017
Modular synthesis of enforcement mechanisms for the workflow satisfiability problem: Scalability and reusability
DR dos Santos, SE Ponta, S Ranise
Proceedings of the 21st ACM on Symposium on Access Control Models andá…, 2016
102016
Security validation tool for business processes
W Arsac, L Compagna, SP Kaluvuri, SE Ponta
Proceedings of the 16th ACM symposium on Access control models andá…, 2011
102011
Vuln4real: A methodology for counting actually vulnerable dependencies
I Pashchenko, H Plate, SE Ponta, A Sabetta, F Massacci
IEEE Transactions on Software Engineering, 2020
92020
Prioritization of software patches
H Plate, S Ponta, A Sabetta
US Patent 9,959,111, 2018
92018
Software patch evaluator
H Plate, S Ponta, A Sabetta
US Patent 9,880,832, 2018
92018
The system can't perform the operation now. Try again later.
Articles 1–20