default search action
5. ESSoS 2013: Paris, France
- Jan Jürjens, Benjamin Livshits, Riccardo Scandariato:
Engineering Secure Software and Systems - 5th International Symposium, ESSoS 2013, Paris, France, February 27 - March 1, 2013. Proceedings. Lecture Notes in Computer Science 7781, Springer 2013, ISBN 978-3-642-36562-1
Secure Programming
- Bastian Braun, Patrick Gemein, Hans P. Reiser, Joachim Posegga:
Control-Flow Integrity in Web Applications. 1-16 - Nirupama Talele, Jason Teutsch, Trent Jaeger, Robert F. Erbacher:
Using Security Policies to Automate Placement of Network Intrusion Prevention. 17-32 - Philipp von Styp-Rekowsky, Sebastian Gerling, Michael Backes, Christian Hammer:
Idea: Callee-Site Rewriting of Sealed System Libraries. 33-41
Policies
- Michael J. May, Karthikeyan Bhargavan:
Towards Unified Authorization for Android. 42-57 - Prachi Kumari, Alexander Pretschner:
Model-Based Usage Control Policy Derivation. 58-74 - Linda Ariani Gunawan, Peter Herrmann:
Compositional Verification of Application-Level Security Properties. 75-90
Proving
- Denis Butin, David Gray, Giampaolo Bella:
Towards Verifying Voter Privacy through Unlinkability. 91-106 - Tri Minh Ngo, Mariëlle Stoelinga, Marieke Huisman:
Confidentiality for Probabilistic Multi-threaded Programs and Its Verification. 107-122 - Peter T. Breuer, Jonathan P. Bowen:
A Fully Homomorphic Crypto-Processor Design. 123-138
Formal Methods
- Jean-Baptiste Jeannin, Guido de Caso, Juan Chen, Yuri Gurevich, Prasad Naldurg, Nikhil Swamy:
dkal ⋆ : Constructing Executable Specifications of Authorization Protocols. 139-154 - Koen Decroix, Jorn Lapon, Bart De Decker, Vincent Naessens:
A Formal Approach for Inspecting Privacy and Trust in Advanced Electronic Services. 155-170 - Myla Archer, Elizabeth I. Leonard, Constance L. Heitmeyer:
Idea: Writing Secure C Programs with SecProve. 171-180
Analyzing
- Vadim Kotov, Fabio Massacci:
Anatomy of Exploit Kits - Preliminary Analysis of Exploit Kits as Software Artefacts. 181-196 - Anne Edmundson, Brian Holtkamp, Emanuel Rivera, Matthew Finifter, Adrian Mettler, David A. Wagner:
An Empirical Study on the Effectiveness of Security Code Review. 197-212 - Bojan Simic, James Walden:
Eliminating SQL Injection and Cross Site Scripting Using Aspect Oriented Programming. 213-228
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.