Overview
Posts
18
Media
Teaching
Team
Publications
Theses
LOCS
👾
LOCS
Leiden Organizational Cyber Security Group
Netherlands
o.gadyatskaya@liacs.leidenuniv.nl
https://locs.liacs.nl/
Organizations
Overview
Posts
18
Media
Teaching
Team
Publications
Theses
A limited technical background is sufficient for attack-defense tree acceptability
Nathan Daniel Schiele
,
Olga Gadyatskaya
- In USENIX Security Symposium
DOI: doi/10.5555/3766078.3766193
Published at 8 September 2025
Eradicating the Unseen: Detecting, Exploiting, and Remediating a Path Traversal Vulnerability across GitHub
Jafar Akhoundali
, Hamidi , Rietveld ,
Olga Gadyatskaya
- In AsiaCCS 2025
Download
DOI: https://dl.acm.org/doi/pdf/10.1145/3708821.3736220
Published at 28 August 2025
My Code Is Less Secure with Gen AI: Surveying Developers' Perceptions of the Impact of Code Generation Tools on Security
Arina Kudriavtseva
, Hotak ,
Olga Gadyatskaya
- In Proceedings of the 40th ACM/SIGAPP Symposium on Applied Computing (SAC '25)
DOI: 10.1145/3672608.3707778
Published at 1 January 2025
The File That Contained the Keys Has Been Removed: An Empirical Analysis of Secret Leaks in Cloud Buckets and Responsible Disclosure Outcomes
Soufian El Yadmani
,
Olga Gadyatskaya
, Zhauniarovich - In IEEE Symposium on Security and Privacy (SP)
DOI: 10.1109/SP61157.2025.00009
Published at 1 January 2025
MoreFixes: A Large-Scale Dataset of CVE Fix Commits Mined through Enhanced Repository Discovery
Jafar Akhoundali
, Rahim Nouri , Rietveld ,
Olga Gadyatskaya
- PROMISE 2024: Proceedings of the 20th International Conference on Predictive Models and Data Analytics in Software Engineering
Download
DOI: 10.5281/zenodo.11199120
Source code
Dataset
Published at 10 July 2024
You cannot improve what you do not measure: A triangulation study of software security metrics
Arina Kudriavtseva
, Ahmad Hotak ,
Olga Gadyatskaya
- In Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing (SAC '24)
DOI: 10.1145/3605098.3635892
Published at 1 January 2024
Evaluating Rule-Based Global XAI Malware Detection Methods
Rui Li
,
Olga Gadyatskaya
- International Conference on Network and System Security
DOI: 10.1007/978-3-031-39828-5_1
Published at 1 January 2023
Secure Software Development Methodologies: A Multivocal Literature Review
Arina Kudriavtseva
,
Olga Gadyatskaya
Download
DOI: 10.48550/arXiv.2211.16987
Published at 10 May 2022
How security professionals are being attacked: A study of malicious CVE proof of concept exploits in GitHub
Soufian El Yadmani
,
Robin The
,
Olga Gadyatskaya
Download
DOI: 10.48550/arXiv.2210.08374
Published at 1 January 2022
Towards Combining Several Android Instrumentation Tools.
A. van der Staaij ,
Olga Gadyatskaya
- In Proceedings of ACNS 2022 Satellite Workshop SecMT
Download
DOI: 10.1007/978-3-031-02067-4_5
Published at 1 January 2022
Previous
Next