Skip to content

Commit

Permalink
Browse files Browse the repository at this point in the history
Fix to have no affiliation with submitted work
  • Loading branch information
paw10003 committed Jun 13, 2016
1 parent d6bcb9c commit f312694
Show file tree
Hide file tree
Showing 5 changed files with 640 additions and 1 deletion.
132 changes: 132 additions & 0 deletions AADLSecPaper.aux
@@ -0,0 +1,132 @@
\relax
\citation{jeepHack}
\citation{planeHack}
\citation{superFish}
\citation{lenovoWPBT}
\citation{govHack}
\citation{stageFright}
\citation{androidMarshmallow,googleAndroid}
\citation{aaraj2008analysis,denning1996location,saito2015case,denning2015toward,nguyen2015model,ravi2004security,gokhale2008model,perez2006vtpm,yan2015novel,tehranipoor2015dram}
\select@language{english}
\@writefile{toc}{\select@language{english}}
\@writefile{lof}{\select@language{english}}
\@writefile{lot}{\select@language{english}}
\@writefile{toc}{\contentsline {title}{AADL Language Review and Expansion with Respect to Security Behavior and Requirements}{1}}
\@writefile{toc}{\authcount {1}}
\@writefile{toc}{\contentsline {author}{No Author Given}{1}}
\@writefile{toc}{\contentsline {section}{\numberline {1}Introduction}{1}}
\newlabel{securityBasics}{{1}{1}}
\citation{CommonCriteria}
\citation{benzel2005design}
\citation{lin2013security}
\@writefile{toc}{\contentsline {section}{\numberline {2}Motivation and Related Work}{2}}
\newlabel{Motivation and Related Work}{{2}{2}}
\citation{markose2008systematic}
\citation{yu1997towards}
\citation{massacci2010security}
\citation{yu1997towards}
\citation{jurjens2005secure}
\citation{jurjens2002umlsec}
\citation{SysML-Sec}
\citation{SysML}
\citation{AADLSite}
\citation{AADLV2Overview}
\@writefile{toc}{\contentsline {section}{\numberline {3}AADL Annexes and Security Extensions}{4}}
\newlabel{AADL Annexes and Extensions}{{3}{4}}
\@writefile{toc}{\contentsline {subsection}{\numberline {3.1}Introduction to AADL}{4}}
\citation{AADLTools}
\citation{ellison2015extending}
\@writefile{toc}{\contentsline {subsection}{\numberline {3.2}AADL Security Annex}{5}}
\newlabel{lst:AADLaccessExtension}{{1.1}{5}}
\@writefile{lol}{\contentsline {lstlisting}{\numberline {1.1}User-defined AccessMode and AccessGroup properties~\cite {ellison2015extending}}{5}}
\citation{ellison2015extending}
\citation{AADLSecAnnex}
\citation{AADLSecAnnex}
\citation{AADLSecAnalysis}
\citation{AADLSecAnalysis}
\citation{Osate2Examples}
\citation{UserDaysMay2016}
\citation{AADLResolute}
\citation{gacek2014resolute}
\citation{ellison2015extending}
\citation{gacek2014resolute}
\newlabel{lst:AADLSecLevels}{{1.2}{6}}
\@writefile{lol}{\contentsline {lstlisting}{\numberline {1.2}Security Level Definition for AADL Security Annex~\cite {AADLSecAnnex}}{6}}
\@writefile{toc}{\contentsline {subsection}{\numberline {3.3}AADL Tools support for Security}{6}}
\citation{RDALOverview}
\@writefile{lof}{\contentsline {figure}{\numberline {1}{\ignorespaces Graphical Example of AADL Security Annex Attack Impact Analysis~\cite {AADLSecAnalysis}}}{7}}
\newlabel{fig:AADLAttackAnalysis}{{1}{7}}
\citation{BLESS2013}
\citation{jurjens2002umlsec,jurjens2005secure}
\citation{AADLSecAnnex}
\@writefile{toc}{\contentsline {subsection}{\numberline {3.4}AADL Security Annex Limitations}{8}}
\citation{AADLSecAnnex}
\newlabel{lst:AADLSecEncryption}{{1.3}{9}}
\@writefile{lol}{\contentsline {lstlisting}{\numberline {1.3}AADL Security Annex Definitions of Encryption~\cite {AADLSecAnnex}}{9}}
\@writefile{toc}{\contentsline {section}{\numberline {4}Proposed Extensions to AADL}{10}}
\newlabel{New Framework}{{4}{10}}
\citation{AADLSecAnalysis}
\@writefile{lof}{\contentsline {figure}{\numberline {2}{\ignorespaces Visualization of Security Framework}}{11}}
\newlabel{fig:AADLSecFrame}{{2}{11}}
\@writefile{toc}{\contentsline {subsection}{\numberline {4.1}Component Libraries}{11}}
\@writefile{lot}{\contentsline {table}{\numberline {1}{\ignorespaces Table illustrating different component variations}}{12}}
\newlabel{elementTypes}{{1}{12}}
\newlabel{lst:AADLUserDefineLow}{{1.4}{12}}
\@writefile{lol}{\contentsline {lstlisting}{\numberline {1.4}Example of User-defined Lower Level Components}{12}}
\citation{ALISA2016}
\@writefile{toc}{\contentsline {subsection}{\numberline {4.2}Security Requirements}{13}}
\newlabel{lst:AADLUserDefineHigh}{{1.5}{13}}
\@writefile{lol}{\contentsline {lstlisting}{\numberline {1.5}User-defined Higher Level Security Requirement}{13}}
\@writefile{toc}{\contentsline {subsection}{\numberline {4.3}Mapping Process}{14}}
\@writefile{toc}{\contentsline {subsection}{\numberline {4.4}Verification Tools}{14}}
\newlabel{lst:AADLUserDefineResolute}{{1.6}{14}}
\@writefile{lol}{\contentsline {lstlisting}{\numberline {1.6}User-defined Resolute Checks}{14}}
\bibcite{SysML-Sec}{1}
\bibcite{jurjens2005secure}{2}
\bibcite{jurjens2002umlsec}{3}
\bibcite{SysML}{4}
\bibcite{AADLSite}{5}
\bibcite{AADLV2Overview}{6}
\bibcite{AADLTools}{7}
\bibcite{Osate2}{8}
\@writefile{toc}{\contentsline {section}{\numberline {5}Conclusion}{15}}
\newlabel{Conclusion}{{5}{15}}
\bibcite{Osate2Examples}{9}
\bibcite{UserDaysMay2016}{10}
\bibcite{AADLResolute}{11}
\bibcite{RDALOverview}{12}
\bibcite{gacek2014resolute}{13}
\bibcite{EMV1}{14}
\bibcite{EMV2}{15}
\bibcite{BLESS2013}{16}
\bibcite{AADLSecAnnex}{17}
\bibcite{AADLSecAnalysis}{18}
\bibcite{ellison2015extending}{19}
\bibcite{jeepHack}{20}
\bibcite{planeHack}{21}
\bibcite{superFish}{22}
\bibcite{lenovoWPBT}{23}
\bibcite{govHack}{24}
\bibcite{stageFright}{25}
\bibcite{stageFright2}{26}
\bibcite{androidUpdates}{27}
\bibcite{androidMarshmallow}{28}
\bibcite{googleAndroid}{29}
\bibcite{aaraj2008analysis}{30}
\bibcite{denning1996location}{31}
\bibcite{saito2015case}{32}
\bibcite{denning2015toward}{33}
\bibcite{nguyen2015model}{34}
\bibcite{ravi2004security}{35}
\bibcite{gokhale2008model}{36}
\bibcite{perez2006vtpm}{37}
\bibcite{yan2015novel}{38}
\bibcite{tehranipoor2015dram}{39}
\bibcite{CommonCriteria}{40}
\bibcite{benzel2005design}{41}
\bibcite{lin2013security}{42}
\bibcite{markose2008systematic}{43}
\bibcite{yu1997towards}{44}
\bibcite{massacci2010security}{45}
\bibcite{sangiovanni2007quo}{46}
\bibcite{ALISA2016}{47}

0 comments on commit f312694

Please sign in to comment.