Apvrille, A. (2015). Geek usages for your Fitbit Flex tracker
Hack.lu, Luxemburg, October 2015. Slides at fra-
madrive.org/index.php/s/Wk6nxAKMpVTdQl4.
Apvrille, L. (2003). TTool. ttool.telecom-paristech.fr.
Apvrille, L. and Roudier, Y. (2015). SysML-Sec: A Model
Driven Approach for Designing Safe and Secure Sys-
tems. In 3rd International Conference on Model-
Driven Engineering and Software Development, Spe-
cial session on Security and Privacy in Model Based
Engineering, France. SCITEPRESS Digital Library.
Avalle, M., Pironti, A., and Sisto, R. (2014). Formal verifi-
cation of security protocol implementations: a survey.
Formal Aspects of Computing, 26(1):99–123.
Balarin, F., Watanabe, Y., Hsieh, H., Lavagno, L.,
Passerone, C., and Sangiovanni-Vincentelli, A.
(2003). Metropolis: An Integrated Electronic System
Design Environment. Computer, 36(4):45–52.
Blanchet, B. (2001). An efficient cryptographic protocol
verifier based on prolog rules. In Proceedings of the
14th IEEE Workshop on Computer Security Founda-
tions, CSFW ’01, pages 82–, Washington, DC, USA.
IEEE Computer Society.
Constantin, L. (2016). Researchers hack Tesla Model S
with remote attack. http://www.pcworld.com/article/
3121999/security/researchers-demonstrate-remote-
attack-against-tesla-model-s.html.
Costin, A. and Francillon, A. (2012). Ghost in the
Air(Traffic): On insecurity of ADS-B protocol and
practical attacks on ADS-B devices. In BLACKHAT
2012, July 21-26, 2012, Las Vegas, NV, USA, Las Ve-
gas, USA.
Drouineaud, M., Bortin, M., Torrini, P., and Sohr, K.
(2004). A first step towards formal verification of se-
curity policy properties for RBAC. In QSIC’04, pages
60–67, Washington, DC, USA.
Hansson, J., Wrage, L., Feiler, P. H., Morley, J., Lewis, B.,
and Hugues, J. (2010). Architectural Modeling to Ver-
ify Security and Nonfunctional Behavior. IEEE Secu-
rity Privacy, 8(1):43–49.
J
¨
urjens, J. (2002). UMLsec: Extending UML for Secure
Systems Development. In Proceedings of the 5th In-
ternational Conference on The Unified Modeling Lan-
guage, UML ’02, pages 412–425, London, UK, UK.
Springer-Verlag.
Kangas, T., Kukkala, P., Orsila, H., Salminen, E.,
H
¨
annik
¨
ainen, M., H
¨
am
¨
al
¨
ainen, T. D., Riihim
¨
aki, J.,
and Kuusilinna, K. (2006). UML-based Multipro-
cessor SoC Design Framework. ACM Trans. Embed.
Comput. Syst., 5(2):281–320.
Kienhuis, B., Deprettere, E. F., Wolf, P. v. d., and Vis-
sers, K. A. (2002). A Methodology to Design Pro-
grammable Embedded Systems - The Y-Chart Ap-
proach. In Embedded Processor Design Challenges:
Systems, Architectures, Modeling, and Simulation -
SAMOS, pages 18–37, London, UK, UK. Springer-
Verlag.
Lin, C.-W., Zheng, B., Zhu, Q., and Sangiovanni-
Vincentelli, A. (2015). Security-Aware Design
Methodology and Optimization for Automotive Sys-
tems. ACM Transactions on Design Automation of
Electronic Systems (TODAES), 21(1):18.
Lodderstedt, T., Basin, D. A., and Doser, J. (2002). Se-
cureUML: A UML-Based Modeling Language for
Model-Driven Security. In Proceedings of the 5th In-
ternational Conference on The Unified Modeling Lan-
guage, UML’02, pages 426–441, London, UK, UK.
Springer-Verlag.
Lugou, F., Li, L. W., Apvrille, L., and Ameur-Boulifa, R.
(2016). SysML Models and Model Transformation for
Security. In Confer
´
ence on Model-Driven Engineer-
ing and Software Development (Modelsward’2016),
Rome, Italy.
Maslennikov, D. (2010). Russian cybercriminals on the
move: profiting from mobile malware. In The 20th
Virus Bulletin Internation Conference, pages 84–89,
Vancouver, Canada.
Pedroza, G., Knorreck, D., and Apvrille, L. (2011).
AVATAR: A SysML Environment for the Formal Veri-
fication of Safety and Security Properties. In The 11th
IEEE Conference on Distributed Systems and New
Technologies (NOTERE’2011), Paris, France.
Rodday, N. (2016). Hacking a Professional Drone. Slides
at www.blackhat.com/docs/asia-16/materials/asia-16-
Rodday-Hacking-A-Professional-Drone.pdf.
Rosales, R., Glass, M., Teich, J., Wang, B., Xu, Y., and
Hasholzner, R. (2014). MAESTRO— Holistic Actor-
Oriented Modeling of Nonfunctional Properties and
Firmware Behavior for MPSoCs. ACM Trans. Des.
Autom. Electron. Syst., 19(3):23:1–23:26.
Schweppe, H., Roudier, Y., Weyl, B., Apvrille, L., and
Scheuermann, D. (2011). C2x communication: Se-
curing the last meter. In The 4th IEEE International
Symposium on Wireless Vehicular Communications:
WIVEC2011, San Francisco, USA.
Smyth, B., Ryan, M. D., and Chen, L. (2015). Formal
analysis of privacy in Direct Anonymous Attestation
schemes. Science of Computer Programming, 111(2).
Tanzi, T. J., Sebastien, O., and Rizza, C. (2015). Designing
Autonomous Crawling Equipment to Detect Personal
Connected Devices and Support Rescue Operations:
Technical and Societal Concerns. The Radio Science
Bulletin, 355(355):35–44.
Vasilevskaya, M. and Nadjm-Tehrani, S. (2015). Quanti-
fying Risks to Data Assets Using Formal Metrics in
Embedded System Design, pages 347–361. Springer
International Publishing, Cham.
Security-aware Modeling and Analysis for HW/SW Partitioning
311