


default search action
8. ESSoS 2016: London, UK
- Juan Caballero, Eric Bodden

, Elias Athanasopoulos:
Engineering Secure Software and Systems - 8th International Symposium, ESSoS 2016, London, UK, April 6-8, 2016. Proceedings. Lecture Notes in Computer Science 9639, Springer 2016, ISBN 978-3-319-30805-0 - Mohammad Torabi Dashti

, David A. Basin:
Security Testing Beyond Functional Tests. 1-19 - Willard Rafnsson, Deepak Garg, Andrei Sabelfeld:

Progress-Sensitive Security for SPARK. 20-37 - Enrico Lovat, Martín Ochoa

, Alexander Pretschner:
Sound and Precise Cross-Layer Data Flow Tracking. 38-55 - Bernhard J. Berger

, Karsten Sohr
, Rainer Koschke:
Automatically Extracting Threats from Extended Data Flow Diagrams. 56-71 - Achim D. Brucker, Michael Herzberg:

On the Static Analysis of Hybrid Mobile Apps - A Report on the State of Apache Cordova Nation. 72-88 - Quanlong Guan

, Heqing Huang, Weiqi Luo, Sencun Zhu:
Semantics-Based Repackaging Detection for Mobile Apps. 89-105 - Tom van Goethem, Wout Scheepers, Davy Preuveneers, Wouter Joosen:

Accelerometer-Based Device Fingerprinting for Multi-factor Mobile Authentication. 106-121 - Benjamin Fogel, Shane Farmer, Hamza Alkofahi

, Anthony Skjellum, Munawar Hafiz:
POODLEs, More POODLEs, FREAK Attacks Too: How Server Administrators Responded to Three Serious Web Vulnerabilities. 122-137 - Mathias Payer:

HexPADS: A Platform to Detect "Stealth" Attacks. 138-154 - Andreas Follner, Alexandre Bartel, Eric Bodden

:
Analyzing the Gadgets - Towards a Metric to Measure Gadget Quality. 155-172 - Mingyi Zhao, Peng Liu:

Empirical Analysis and Modeling of Black-Box Mutational Fuzzing. 173-189 - Stanislav Dashevskyi, Achim D. Brucker

, Fabio Massacci
:
On the Security Cost of Using a Free and Open Source Component in a Proprietary Product. 190-206 - Sven Türpe

:
Idea: Usable Platforms for Secure Programming - Mining Unix for Insight and Guidelines. 207-215 - Joseph Hallett, David Aspinall:

AppPAL for Android - Capturing and Checking Mobile App Policies. 216-232 - Pauline Anthonysamy, Matthew Edwards

, Christian Weichel, Awais Rashid
:
Inferring Semantic Mapping Between Policies and Code: The Clue is in the Language. 233-250 - Jasper Bogaerts, Bert Lagaisse

, Wouter Joosen:
Idea: Supporting Policy-Based Access Control on Database Systems. 251-259 - Eric Rothstein Morris, Joachim Posegga:

Idea: Enforcing Security Properties by Solving Behavioural Equations. 260-268

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














