Jason Jaskolka, Ph.D.

Assistant Professor

Publications (By Year)

2018

  1. Quentin Rouland, Brahim Hamid, and Jason Jaskolka. Formalizing reusable communication models for distributed systems architecture. In El Hassan Abdelwahed, Ladjel Bellatreche, Mattéo Golfarelli, Dominique Méry, and Carlos Ordonez, , editors, Proceedings of the 8th International Conference on Model and Data Engineering, MEDI 2018, volume 11163 of Lecture Notes in Computer Science, pages 198-216, Marrakesh, Morocco, October 2018. BiBTeX
  2. Jason Jaskolka. Challenges in assuring security and resilience of advanced metering infrastructure. In Proceedings of the 18th annual IEEE Canada Electrical Power and Energy Conference, EPEC 2018, Toronto, ON, Canada, 2018. BiBTeX
  3. Jason Jaskolka. Assurance cases for security and resilience of advanced metering infrastructure. Technical Report Prepared for Natural Resources Canada, March, 2018. BiBTeX

2017

  1. Jason Jaskolka and John Villasenor. Securing Cyber-Dependent Maritime Systems and Operations. NMIO Technical Bulletin 12:4-6, June 2017. BiBTeX
  2. Jason Jaskolka and John Villasenor. An approach for identifying and analyzing implicit interactions in distributed systems. IEEE Transactions on Reliability, 66(2):529-546, June 2017. BiBTeX
  3. Jason Jaskolka and John Villasenor. Identifying implicit component interactions in distributed cyber-physical systems. In Proceedings of the 50th Hawaii International Conference on System Sciences, HICSS-50, pages 5988–5997, Hilton Waikoloa Village, HI, U.S.A., January 2017. BiBTeX

2016

  1. Monika Bialy, Vera Pantelic, Jason Jaskolka, Alexander Schaap, Lucian Patcas, Mark Lawford, and Alan Wassyng. Handbook of System Safety and Security: Cyber Risk and Risk Management, Cyber Security, Threat Analysis, Functional Safety, Software Systems, and Cyber Physical Systems, chapter 3: Software engineering for model-based development by domain experts, pages 39-64. Elsevier, First Edition, October 2016. BiBTeX
  2. Jason Jaskolka and Ridha Khedri. Mitigating covert channels based on analysis of the potential for communication. Theoretical Computer Science, 643:1–37, August 2016. BiBTeX

2015

  1. Jason Jaskolka, Wendy MacCaull, and Ridha Khedri. Towards an ontology design architecture. In Proceedings of the 2015 International Conference on Computational Science and Computational Intelligence, CSCI 2015, pages 132–135, Las Vegas, NV, U.S.A., December 2015. BiBTeX
  2. Monika Bialy, Jacques Carette, Lane Gibson, Jason Jaskolka, Mark Lawford, Bennett Mackenzie, Tom Maibaum, Archana Mallya, Gordon Marks, Vera Pantelic, Alexander Schaap, Syed Asim Shah, and Alan Wassyng. Phase 1 Quarterly Report 8 on APC LEAP - Embedded Software Project. Technical Report, McMaster Centre for Software Certification, Hamilton, ON, Canada, December 2015. BiBTeX
  3. Jason Jaskolka, Wendy MacCaull, and Ridha Khedri. Towards an architectural framework for systematically designing ontologies. Technical Report CAS-15-09-RK, McMaster University, Hamilton, ON, Canada, November 2015. PDF BiBTeX
  4. Jason Jaskolka, Ridha Khedri, and Khair Eddin Sabri. Investigative support for information confidentiality. Journal of Ambient Intelligence and Humanized Computing, 6(4):425-451, August 2015. BiBTeX
  5. Jason Jaskolka and Ridha Khedri. Towards the certification of covert channel freeness in cloud-based systems. In Elhadi Shakshuki, editor, Proceedings of the 6th International Conference on Ambient Systems, Networks and Technologies, volume 52 of Procedia Computer Science, ANT 2015 and SEIT 2015, pages 318–225, London, UK, June 2015. BiBTeX
  6. Jason Jaskolka. On the modeling, analysis, and mitigation of distributed covert channels. Ph.D. thesis, McMaster University, Hamilton, ON, Canada. March 2015. BiBTeX

2014

  1. Jason Jaskolka and Ridha Khedri. A formulation of the potential for communication condition using C2KA. In Adriano Peron and Carla Piazza, editors, Proceedings of the 5th International Symposium on Games, Automata, Logics and Formal Verification, volume 161 of Electronic Proceedings in Theoretical Computer Science, pages 161-174. Open Publishing Association, Verona, Italy, September 2014. BiBTeX Errata
  2. Jason Jaskolka, Ridha Khedri, and Khair Eddin Sabri. Investigative support for confidentiality part I: Detecting information leakage via protocol-based covert channels. In Proceedings of the 9th International Conference on Future Networks and Communications, volume 34 of Procedia Computer Science, FNC 2014 and MobiSPC 2014, pages 276–285, Niagara Falls, ON, Canada, August 2014. (Invited Paper). BiBTeX
  3. Jason Jaskolka, Ridha Khedri, and Khair Eddin Sabri. Investigative support for confidentiality part II: Applications in cryptanalysis and digital forensics. In Proceedings of the 9th International Conference on Future Networks and Communications, volume 34 of Procedia Computer Science, FNC 2014 and MobiSPC 2014, pages 266–275, Niagara Falls, ON, Canada, August 2014. (Invited Paper). BiBTeX
  4. Qinglei Zhang, Ridha Khedri, and Jason Jaskolka. An aspect-oriented language for feature-modeling. Journal of Ambient Intelligence and Humanized Computing, 5(3):343-356, June 2014. BiBTeX
  5. Jason Jaskolka, Ridha Khedri, and Qinglei Zhang. Endowing concurrent Kleene algebra with communication actions. In Peter Höfner, Peter Jipsen, Wolfram Kahl, and Martin E. Müller, editors, Proceedings of the 14th International Conference on Relational and Algebraic Methods in Computer Science, volume 8428 of Lecture Notes in Computer Science, pages 19-36. Springer International Publishing Switzerland, Marienstatt, Germany, April 2014. BiBTeX Errata

2013

  1. Jason Jaskolka, Ridha Khedri, and Qinglei Zhang. Foundations of communicating concurrent Kleene algebra. Technical Report CAS-13-07-RK, McMaster University, Hamilton, ON, Canada, November 2013. PDF BiBTeX

2012

  1. Qinglei Zhang, Ridha Khedri, and Jason Jaskolka. Verification of aspectual composition in feature-modeling. In George Eleftherakis, Mike Hinchey, and Mike Holcombe, editors, Proceedings of the 10th International Conference on Software Engineering and Formal Methods, volume 7504 of Lecture Notes in Computer Science, pages 109–125. Springer Berlin/Heidelberg, Thessaloniki, Greece, October 2012. BiBTeX
  2. Jason Jaskolka, Ridha Khedri, and Qinglei Zhang. On the necessary conditions for covert channel existence: A state-of-the-art survey. In Elhadi Shakshuki and Muhammad Younas, editors, Proceedings of the 3rd International Conference on Ambient Systems, Networks and Technologies, volume 10 of Procedia Computer Science, ANT 2012 and MobiWIS 2012, pages 458–465, Niagara Falls, ON, Canada, August 2012. BiBTeX
  3. Qinglei Zhang, Ridha Khedri, and Jason Jaskolka. An aspect-oriented language for product family specification. In Elhadi Shakshuki and Muhammad Younas, editors, Proceedings of the 3rd International Conference on Ambient Systems, Networks and Technologies, volume 10 of Procedia Computer Science, ANT 2012 and MobiWIS 2012, pages 482–489, Niagara Falls, ON, Canada, August 2012. BiBTeX

2011

  1. Qinglei Zhang, Ridha Khedri, and Jason Jaskolka. An aspect-oriented language based on product family algebra: Aspects specification and verification. Technical Report CAS-11-08-RK, McMaster University, Hamilton, ON, Canada, November 2011. PDF BiBTeX
  2. Jason Jaskolka, Ridha Khedri, and Khair Eddin Sabri. A formal test for detecting information leakage via covert channels. In Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, CSIIRW7, pages 1–4, Oak Ridge, TN, U.S.A., October 2011. BiBTeX
  3. Jason Jaskolka, Ridha Khedri, and Khair Eddin Sabri. Information leakage via protocol-based covert channels: Detection, automation, and applications. Technical Report CAS-11-05-RK, McMaster University, Hamilton, ON, Canada, August 2011. PDF BiBTeX
  4. Jason Jaskolka and Ridha Khedri. Exploring covert channels. In Proceedings of the 44th Hawaii International Conference on System Sciences, HICSS-44, pages 1–10, Koloa, Kauai, HI, U.S.A., January 2011. BiBTeX

2010

  1. Jason Jaskolka. Modeling, analysis, and detection of information leakage via protocol-based covert channels. Master's thesis, McMaster University, Hamilton, ON, Canada. September 2010. BiBTeX

2009

  1. Khair Eddin Sabri, Ridha Khedri, and Jason Jaskolka. Advanced Technologies, chapter 13: Algebraic model for agent explicit knowledge in multi-agent systems, pages 224-250. IN-TECH, October 2009. BiBTeX
  2. Khair Eddin Sabri, Ridha Khedri, and Jason Jaskolka. Verification of information flow in agent-based systems. In Gilbert Babin, Peter Kropf, and Michael Weiss, editors, Proceedings of the 4th International MCETECH Conference on e-Technologies, volume 26 of Lecture Notes in Business Information Processing, pages 252–266, Ottawa, ON, Canada, May 2009. (Nominated for Best Paper Award). BiBTeX
  3. Khair Eddin Sabri, Ridha Khedri, and Jason Jaskolka. Automated verification of information flow in agent-based systems. Technical Report CAS-09-01-RK, McMaster University, Hamilton, ON, Canada, January 2009. PDF BiBTeX

2008

  1. Khair Eddin Sabri, Ridha Khedri, and Jason Jaskolka. Specification of agent explicit knowledge in cryptographic protocols. In Proceedings of the International Conference on Computer, Electrical, and Systems Science, and Engineering, volume 35 of CESSE 2008, pages 447–454, Venice, Italy, October 2008. BiBTeX