DiversIoT:Publications

= Publications in DiversIoT =

Peer-reviewed articles in well established venues
These are publications that have gone through a very thorough reviewing process, and are published in well established venues like Springer, Elsevier, IEEE, ACM, etc, and are usually considered as Level 1&2 publications in the Norwegian system.


 * 1) Confidentiality of Interactions in Concurrent Object-Oriented Systems. By Olaf Owe, Toktam Ramezani. In proceedings of  12th International Workshop on Data Privacy Management (DPM 2017) Lecture Notes in Computer Science 10436, pages 19--34, Springer, 2017. Held in conjunction with the European Symposium on Research in Computer Security (ESORICS 2017). DOI 10.1007/978-3-319-67816-0_2
 * 2) Hoare-style Reasoning from Multiple Contracts. By Olaf Owe, Toktam Ramezani, Elahe Fazeldehkordi. In proceedings of  13th International Conference on Integrated Formal Methods (iFM'17) Torino, Italy, September. Published in Lecture Notes in Computer Science 10510, pages 263--278, Springer, 2017  DOI 10.1007/978-3-319-66845-1_17
 * 3) Offline Trusted Device and Proxy Architecture based on a new TLS Switching technique. By Denis Migdal, Christian Johansen and Audun Josang. In proceedings of Workshop on Secure Internet of Things (SIoT 2017) held in conjunction with the European Symposium on Research in Computer Security (ESORICS 2017). Published by IEEE (10 pages) Link to Authors Draft
 * 4) A Modular Reasoning System Using Uninterpreted Predicates for Code Reuse. By Crystal Chang Din, Einar Broch Johnsen, Olaf Owe, and Ingrid Chieh Yu. Accepted for Elsevier's Journal of Logical and Algebraic Methods in Programming (Norwegian level 2). (37 pages)

Workshop contributions and Technical reports
These are publications with dissemination purposes which do not go through a very thorough reviewing process as the ones above, and are not considered as Level 1&2 publications usually.


 * 1) Code Diversification Mechanisms for Securing the Internet of Things, by Shukun Tokas, Olaf Owe and Christian Johansen, to be presented in the 29th Nordic Workshop on Programming Theory (NWPT'17) on 1-3 November 2017 in Turku, Finland. Link to Authors Draft
 * 2) A High-Level Language for Active Objects with Future-Free Support of Futures, by Toktam Ramezanifarkhani, Farzane Karami, and Olaf Owe, to be presented in the 29th Nordic Workshop on Programming Theory (NWPT'17) on 1-3 November 2017 in Turku, Finland. Link to Authors Draft
 * 3) Survey of Code Diversification Mechanisms for Securing the Internet of Things (long version), by Shukun Tokas, Olaf Owe and Christian Johansen, Technical report nr. 473, ISBN 978-82-7368-438-7, University of Oslo. Link to Authors Draft

Under review

 * 1) Dynamic Structural Operational Semantics. By Christian Johansen, Olaf Owe. Under first review for Elsevier's Journal of Logical and Algebraic Methods in Programming (Norwegian level 2). (32 pages) Link to Authors Draft
 * 2) Assumption-Commitment Type System for Resource Management in Virtually Timed Ambients. By Einar Broch Johnsen and Martin Steffen and Johanna Beate Stumpf. Submitted to European Joint Conferences on Theory and Practice of Software ETAPS'18 (Norwegian level 1 Springer LNCS). (15 pages) Link to Authors Draft
 * 3) An Operational Semantics for a Weak Memory Model with Channel Synchronization. By Daniel Fava and Martin Steffen and Volker Stolz and Stian Valle. Submitted to European Joint Conferences on Theory and Practice of Software ETAPS'18 (Norwegian level 1 Springer LNCS). (15 pages) Link to Authors Draft

= Related Work = Some of the most relevant related works are listed here with links to where they can be retrieved (for convenience of the partners). in Journal ACM Computing Surveys; by Benoit Baudry (INRIA Rennes) and Martin Monperrus (Université de Lille). by Okhravi, H ; Rabe, M A ; Mayberry, T J ; Leonard, W G ; Hobson, T R ; Bigelow, D ; Streilein, W W; from MIT Defence Technical Information Centre
 * The Multiple Facets of Software Diversity: Recent Developments in Year 2000 and Beyond
 * Survey of Cyber Moving Target Techniques