Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Francisco Moyano, M. Carmen Fernández Gago, Isaac Agudo, Javier López 0001 |
A Task Ordering Approach for Automatic Trust Establishment. |
ESSoS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Martín Ochoa, Jan Jürjens, Daniel Warzecha |
A Sound Decision Procedure for the Compositionality of Secrecy. |
ESSoS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | George Stergiopoulos, Bill Tsoumas, Dimitris Gritzalis |
Hunting Application-Level Logical Errors. |
ESSoS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Peter T. Breuer, Jonathan P. Bowen |
Typed Assembler for a RISC Crypto-Processor. |
ESSoS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Guillaume Barbu, Philippe Hoogvorst, Guillaume Duc |
Application-Replay Attack on Java Cards: When the Garbage Collector Gets Confused. |
ESSoS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Rahul Potharaju, Andrew Newell, Cristina Nita-Rotaru, Xiangyu Zhang 0001 |
Plagiarizing Smartphone Applications: Attack Strategies and Defense Techniques. |
ESSoS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Huafei Zhu, Hong Xiao |
Optimal Trust Mining and Computing on Keyed MapReduce. |
ESSoS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Gilles Barthe, Benjamin Livshits, Riccardo Scandariato (eds.) |
Engineering Secure Software and Systems - 4th International Symposium, ESSoS 2012, Eindhoven, The Netherlands, February, 16-17, 2012. Proceedings |
ESSoS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Mehrdad Saadatmand, Antonio Cicchetti, Mikael Sjödin |
Design of Adaptive Security Mechanisms for Real-Time Embedded Systems. |
ESSoS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Nick Nikiforakis, Wannes Meert, Yves Younan, Martin Johns, Wouter Joosen |
SessionShield: Lightweight Protection against Session Hijacking. |
ESSoS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Steffen Bartsch |
Authorization Enforcement Usability Case Study. |
ESSoS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Úlfar Erlingsson, Roel J. Wieringa, Nicola Zannone (eds.) |
Engineering Secure Software and Systems - Third International Symposium, ESSoS 2011, Madrid, Spain, February 9-10, 2011. Proceedings |
ESSoS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Fabio Massacci, Stephan Neuhaus, Viet Hung Nguyen |
After-Life Vulnerabilities: A Study on Firefox Evolution, Its Vulnerabilities, and Fixes. |
ESSoS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Jing Xie 0011, Bill Chu, Heather Richter Lipford |
Idea: Interactive Support for Secure Software Development. |
ESSoS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Linda Ariani Gunawan, Frank Alexander Kraemer, Peter Herrmann |
A Tool-Supported Method for the Design and Implementation of Secure Distributed Applications. |
ESSoS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Ingo Müller 0001, Jun Han 0004, Jean-Guy Schneider, Steven Versteeg |
Idea: A Reference Platform for Systematic Information Security Management Tool Support. |
ESSoS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Philippe De Ryck, Lieven Desmet, Wouter Joosen |
Middleware Support for Complex and Distributed Security Services in Multi-tier Web Applications. |
ESSoS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Benjamin Aziz, Alvaro E. Arenas, Michael D. Wilson |
Model-Based Refinement of Security Policies in Collaborative Virtual Organisations. |
ESSoS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Naveed Ahmed 0005, Christian Damsgaard Jensen |
Adaptable Authentication Model: Exploring Security with Weaker Attacker Models. |
ESSoS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Wihem Arsac, Luca Compagna, Giancarlo Pellegrino, Serena Elisa Ponta |
Security Validation of Business Processes via Model-Checking. |
ESSoS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Johannes Loinig, Christian Steger, Reinhold Weiss, Ernst Haselsteiner |
Idea: Simulation Based Security Requirement Verification for Transaction Level Models. |
ESSoS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Thanh-Binh Dao, Etsuya Shibayama |
Security Sensitive Data Flow Coverage Criterion for Automatic Security Testing of Web Applications. |
ESSoS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Ricardo Corin, Felipe Andrés Manzano |
Efficient Symbolic Execution for Analysing Cryptographic Protocol Implementations. |
ESSoS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Arnaud Fontaine, Samuel Hym, Isabelle Simplot-Ryl |
On-Device Control Flow Verification for Java Programs. |
ESSoS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Thomas Heyman, Koen Yskout, Riccardo Scandariato, Holger Schmidt 0001, Yijun Yu |
The Security Twin Peaks. |
ESSoS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Michael Felderer, Berthold Agreiter, Ruth Breu |
Evolution of Security Requirements Tests for Service-Centric Systems. |
ESSoS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Nataliia Bielova, Fabio Massacci |
Predictability of Enforcement. |
ESSoS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Michaela Bunke, Karsten Sohr |
An Architecture-Centric Approach to Detecting Security Patterns in Software. |
ESSoS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | David J. Power, Mark Slaymaker, Andrew Simpson |
Automatic Conformance Checking of Role-Based Access Control Policies via Alloy. |
ESSoS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Tom Goovaerts, Lieven Desmet, Wouter Joosen |
Scalable Authorization Middleware for Service Oriented Architectures. |
ESSoS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Jörn Eichler |
Lightweight Modeling and Analysis of Security Concepts. |
ESSoS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | James Walden, Maureen Doyle, Robert Lenhof, John Murray |
Idea: Java vs. PHP: Security Implications of Language Choice for Web Applications. |
ESSoS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Christian Hammer 0001 |
Experiences with PDG-Based IFC. |
ESSoS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Philippe De Ryck, Lieven Desmet, Thomas Heyman, Frank Piessens, Wouter Joosen |
CsFire: Transparent Client-Side Mitigation of Malicious Cross-Domain Requests. |
ESSoS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Alfredo Pironti 0001, Jan Jürjens |
Formally-Based Black-Box Monitoring of Security Protocols. |
ESSoS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Martin Johns, Christian Beyerlein, Rosemaria Giesecke, Joachim Posegga |
Secure Code Generation for Web Applications. |
ESSoS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Nina Moebius, Kurt Stenzel, Wolfgang Reif |
Formal Verification of Application-Specific Security Properties in a Model-Driven Approach. |
ESSoS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Aida Omerovic, Anette Andresen, Håvard Grindheim, Per Myrseth, Atle Refsdal, Ketil Stølen, Jon Ølnes |
Idea: A Feasibility Study in Model Based Prediction of Impact of Changes on System Quality. |
ESSoS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ben H. Smith, Laurie A. Williams, Andrew Austin |
Idea: Using System Level Testing for Revealing SQL Injection-Related Error Message Information Leaks. |
ESSoS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Karsten Sohr, Bernhard J. Berger |
Idea: Towards Architecture-Centric Security Analysis of Software. |
ESSoS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Francesco Gadaleta, Yves Younan, Wouter Joosen |
BuBBle: A Javascript Engine Level Countermeasure against Heap-Spraying Attacks. |
ESSoS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Albin Zuccato, Nils Daniels, Cheevarat Jampathom, Mikael Nilson |
Report: Modular Safeguards to Create Holistic Security Requirement Specifications for System of Systems. |
ESSoS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Giacomo A. Galilei, Vincenzo Gervasi |
Idea: Enforcing Consumer-Specified Security Properties for Modular Software. |
ESSoS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Clara Bertolissi, Maribel Fernández |
Category-Based Authorisation Models: Operational Semantics and Expressive Power. |
ESSoS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Per Håkon Meland, Inger Anne Tøndel, Jostein Jensen |
Idea: Reusability of Threat Models - Two Approaches with an Experimental Evaluation. |
ESSoS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Igor Santos, Felix Brezo, Javier Nieves, Yoseba K. Penya, Borja Sanz 0001, Carlos Laorden, Pablo García Bringas |
Idea: Opcode-Sequence-Based Malware Detection. |
ESSoS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Achim D. Brucker, Helmut Petritsch |
Idea: Efficient Evaluation of Access Control Constraints. |
ESSoS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | David A. Basin, Manuel Clavel, Marina Egea, Michael Schläpfer |
Automatic Generation of Smart, Security-Aware GUI Models. |
ESSoS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Stere Preda, Nora Cuppens-Boulahia, Frédéric Cuppens, Joaquín García-Alfaro, Laurent Toutain |
Model-Driven Security Policy Deployment: Property Oriented Approach. |
ESSoS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Fabio Massacci, Dan S. Wallach, Nicola Zannone (eds.) |
Engineering Secure Software and Systems, Second International Symposium, ESSoS 2010, Pisa, Italy, February 3-4, 2010. Proceedings |
ESSoS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ron van der Meyden |
Architectural Refinement and Notions of Intransitive Noninterference. |
ESSoS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Holger Schmidt 0001 |
Pattern-Based Confidentiality-Preserving Refinement. |
ESSoS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Timothy E. Levin, Cynthia E. Irvine, Terry Benzel, Thuy D. Nguyen, Paul C. Clark, Ganesha Bhaskara |
Idea: Trusted Emergency Management. |
ESSoS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Feng Chen 0015, Jinshu Su, Yi Zhang |
A Scalable Approach to Full Attack Graphs Generation. |
ESSoS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Jason Hiser, Clark L. Coleman, Michele Co, Jack W. Davidson |
MEDS: The Memory Error Detection System. |
ESSoS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Christian Wolter, Philip Miseldine, Christoph Meinel |
Verification of Business Process Entailment Constraints Using SPIN. |
ESSoS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Michael Gegick, Pete Rotella, Laurie A. Williams |
Toward Non-security Failures as a Predictor of Security Faults and Failures. |
ESSoS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Fabio Massacci, Samuel T. Redwine Jr., Nicola Zannone (eds.) |
Engineering Secure Software and Systems, First International Symposium ESSoS 2009, Leuven, Belgium, February 4-6, 2009. Proceedings |
ESSoS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Laurie A. Williams, Michael Gegick, Andrew Meneely |
Protection Poker: Structuring Software Security Risk Assessment and Knowledge Transfer. |
ESSoS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Munawar Hafiz, Paul Adamczyk, Ralph E. Johnson |
Systematically Eradicating Data Injection Attacks Using Security-Oriented Program Transformations. |
ESSoS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Thanh-Binh Dao, Etsuya Shibayama |
Idea: Automatic Security Testing for Web Applications. |
ESSoS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | James Walden, Adam Messer, Alex Kuhl |
Idea: Measuring the Effect of Code Complexity on Static Analysis Results. |
ESSoS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Pratyusa K. Manadhata, Yücel Karabulut, Jeannette M. Wing |
Report: Measuring the Attack Surfaces of Enterprise Software. |
ESSoS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Albin Zuccato, Clemens Kögler |
Report: Functional Security Testing Closing the Software - Security Testing Gap: A Case from a Telecom Provider. |
ESSoS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Pieter Philippaerts, Cédric Boon, Frank Piessens |
Report: Extensibility and Implementation Independence of the .NET Cryptographic API. |
ESSoS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Fabio Martinelli, Ilaria Matteucci |
Idea: Action Refinement for Security Properties Enforcement. |
ESSoS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Slim Kallel, Anis Charfi, Mira Mezini, Mohamed Jmaiel, Karl Klose |
From Formal Access Control Policies to Runtime Enforcement Aspects. |
ESSoS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Robin Sharp |
Report: CC-Based Design of Secure Application Systems. |
ESSoS |
2009 |
DBLP DOI BibTeX RDF |
|