default search action
6. ESSoS 2014: Munich, Germany
- Jan Jürjens, Frank Piessens, Nataliia Bielova:
Engineering Secure Software and Systems - 6th International Symposium, ESSoS 2014, Munich, Germany, February 26-28, 2014, Proceedings. Lecture Notes in Computer Science 8364, Springer 2014, ISBN 978-3-319-04896-3
Model-Based Security
- Emily R. Jacobson, Andrew R. Bernat, William R. Williams, Barton P. Miller:
Detecting Code Reuse Attacks with a Model of Conformant Program Execution. 1-18 - Yehia Elrakaiby, Moussa Amrani, Yves Le Traon:
Security@Runtime: A Flexible MDE Approach to Enforce Fine-grained Security Policies. 19-34 - Joachim Biskup, Cornelia Tadros:
Idea: Towards a Vision of Engineering Controlled Interaction Execution for Information Services. 35-44
Formal Methods
- Piergiuseppe Bettassa Copet, Riccardo Sisto:
Automated Formal Verification of Application-specific Security Properties. 45-59 - Filippo Del Tedesco, Alejandro Russo, David Sands:
Fault-Tolerant Non-interference. 60-76 - Tri Minh Ngo, Marieke Huisman:
Quantitative Security Analysis for Programs with Low Input and Noisy Output. 77-94 - Brahim Hamid, Christian Percebois:
A Modeling and Formal Approach for the Precise Specification of Security Patterns. 95-112 - Hermann de Meer, Henrich Christopher Pöhls, Joachim Posegga, Kai Samelin:
On the Relation between Redactable and Sanitizable Signature Schemes. 113-130 - Peter T. Breuer, Jonathan P. Bowen:
Idea: Towards a Working Fully Homomorphic Crypto-processor - Practice and the Secret Computer. 131-140
Web and Mobile Security
- Jonas Magazinius, Daniel Hedin, Andrei Sabelfeld:
Architectures for Inlining Security Monitors in Web Applications. 141-160 - Michele Bugliesi, Stefano Calzavara, Riccardo Focardi, Wilayat Khan:
Automatic and Robust Client-Side Protection for Cookie-Based Sessions. 161-178 - Fabian van den Broek, Brinio Hond, Arturo Cedillo Torres:
Security Testing of GSM Implementations. 179-195
Applications
- Hamza Ghani, Jesus Luna Garcia, Ivaylo Petkov, Neeraj Suri:
User-Centric Security Assessment of Software Configurations: A Case Study. 196-212 - Sibylle B. Fröschle, Alexander Stühring:
Idea: Security Engineering Principles for Day Two Car2X Applications. 213-221 - Maël Berthier, Julien Bringer, Hervé Chabanne, Thanh-Ha Le, Lionel Rivière, Victor Servant:
Idea: Embedded Fault Injection Simulator on Smartcard. 222-229
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.