Background and activities

Reseach areas:

  • Software security and security testing
  • Software vulnerability analysis
  • Model driven software development and model driven security
  • Access control, usage control and privacy protection
  • Security monitoring, policies, languages, models and enforcement

Scientific, academic and artistic work

A selection of recent journal publications, artistic productions, books, including book and report excerpts. See all publications in the database

Journal publications

Part of book/report

  • Schuckert, Felix; Hildner, Max; Katt, Basel; Langweg, Hanno. (2018) Source Code Patterns of Buffer Overflow Vulnerabilities in Firefox. SICHERHEIT 2018.
  • Weldehawaryat, Goitom Kahsay; Katt, Basel. (2018) Towards a Quantitative Approach for Security Assurance Metrics. The Twelfth International Conference on Emerging Security Information, Systems and Technologies; SECURWARE 2018 September 16, 2018 to September 20, 2018 - Venice, Italy.
  • Schuckert, Felix; Katt, Basel; Langweg, Hanno. (2017) Source Code Patterns of SQL Injection Vulnerabilities. ARES'17. Proceedings of The 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy — August 29 - September 01, 2017.
  • Gander, Matthias; Katt, Basel; Felderer, Michael; Breu, Ruth. (2013) Towards a Model- and Learning-Based Framework for Security Anomaly Detection. Formal Methods for Components and Objects.
  • Katt, Basel; Gander, Matthias; Breu, Ruth; Felderer, Michael. (2013) Enhancing Model Driven Security through Pattern Refinement Techniques. Formal Methods for Components and Objects.
  • Gander, Matthias; Felderer, Michael; Katt, Basel; Breu, Ruth. (2012) Monitoring Anomalies in IT-Landscapes Using Clustering Techniques and Complex Event Processing. Leveraging Applications of Formal Methods, Verification, and Validation.
  • Gander, Matthias; Katt, Basel; Felderer, Michael; Tolbaru, Adrian; Breu, Ruth; Moschitti, A.. (2012) Anomaly Detection in the Cloud: Detecting Security Incidents via Machine Learning. Trustworthy Eternal Systemsvia Evolving Software, Data and Knowledge..
  • Trojer, Thomas; Katt, Basel; Schabetsberger, Thomas; Breu, Ruth; Mair, Richard. (2012) The Process of Policy Authoring of Patient-Controlled Privacy Preferences. Electronic Healthcare.
  • Katt, Basel; Trojer, Thomas; Breu, Ruth; Schabetsberger, Thomas; Wozak, Florian. (2010) cover Meeting EHR Security Requirements: SeAAS Approach. Seamless Care – Safe Care.