Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Aleieldin Salem, Tabea Schmidt, Alexander Pretschner |
Idea: Automatic Localization of Malicious Behaviors in Android Malware with Hidden Markov Models. |
ESSoS |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Christian Bunse, Sebastian Plotz |
Security Analysis of Drone Communication Protocols. |
ESSoS |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Claudio Corrodi, Timo Spring, Mohammad Ghafari, Oscar Nierstrasz |
Idea: Benchmarking Android Data Leak Detection Tools. |
ESSoS |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Victor Le Pochat, Tom van Goethem, Wouter Joosen |
Idea: Visual Analytics for Web Security. |
ESSoS |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Jago Gyselinck, Jo Van Bulck, Frank Piessens, Raoul Strackx |
Off-Limits: Abusing Legacy x86 Memory Segmentation to Spy on Enclaved Execution. |
ESSoS |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Oleksii Starov, Nick Nikiforakis |
PrivacyMeter: Designing and Developing a Privacy-Preserving Browser Extension. |
ESSoS |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Christopher Gerking, David Schubert, Eric Bodden |
Model Checking the Information Flow Security of Real-Time Systems. |
ESSoS |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Mohammadreza Hazhirpasand, Mohammad Ghafari |
One Leak Is Enough to Expose Them All - From a WebRTC IP Leak to Web-Based Network Scanning. |
ESSoS |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Mathias Payer, Awais Rashid, Jose M. Such (eds.) |
Engineering Secure Software and Systems - 10th International Symposium, ESSoS 2018, Paris, France, June 26-27, 2018, Proceedings |
ESSoS |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Otto Brechelmacher, Willibald Krenn, Thorsten Tarrach |
A Vision for Enhancing Security of Cryptography in Executables. |
ESSoS |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Eyasu Getahun Chekole, Sudipta Chattopadhyay 0001, Martín Ochoa, Huaqun Guo |
Enforcing Full-Stack Memory-Safety in Cyber-Physical Systems. |
ESSoS |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Daniel Gruss, Moritz Lipp, Michael Schwarz 0001, Richard Fellner, Clémentine Maurice, Stefan Mangard |
KASLR is Dead: Long Live KASLR. |
ESSoS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Lucian Cojocar, Taddeus Kroes, Herbert Bos |
JTR: A Binary Solution for Switch-Case Recovery. |
ESSoS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Dolière Francis Somé, Nataliia Bielova, Tamara Rezk |
Control What You Include! - Server-Side Protection Against Third Party Web Tracking. |
ESSoS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Gebrehiwet Biyane Welearegai, Christian Hammer 0001 |
Idea: Optimized Automatic Sanitizer Placement. |
ESSoS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Eric Bodden, Mathias Payer, Elias Athanasopoulos (eds.) |
Engineering Secure Software and Systems - 9th International Symposium, ESSoS 2017, Bonn, Germany, July 3-5, 2017, Proceedings |
ESSoS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Tayyaba Nafees, Natalie Coull, Robert Ian Ferguson, Adam T. Sampson |
Idea-Caution Before Exploitation: The Use of Cybersecurity Domain Knowledge to Educate Software Engineers Against Software Vulnerabilities. |
ESSoS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Micah Morton, Hyungjoon Koo, Forrest Li, Kevin Z. Snow, Michalis Polychronakis, Fabian Monrose |
Defeating Zombie Gadgets by Re-randomizing Code upon Disclosure. |
ESSoS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Federico De Meo, Luca Viganò 0001 |
A Formal Approach to Exploiting Multi-stage Attacks Based on File-System Vulnerabilities of Web Applications. |
ESSoS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Robert Lagerström, Carliss Y. Baldwin, Alan MacCormack, Daniel J. Sturtevant, Lee Doolan |
Exploring the Relationship Between Architecture Coupling and Software Vulnerabilities. |
ESSoS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Giampaolo Bella, Rosario Giustolisi |
Idea: A Unifying Theory for Evaluation Systems. |
ESSoS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Jasper Bogaerts, Bert Lagaisse, Wouter Joosen |
SEQUOIA: Scalable Policy-Based Access Control for Search Operations in Data-Driven Applications. |
ESSoS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Nuthan Munaiah, Benjamin S. Meyers, Cecilia Ovesdotter Alm, Andrew Meneely, Pradeep K. Murukannaiah, Emily Prud'hommeaux, Josephine Wolff, Yang Yu 0004 |
Natural Language Insights from Code Reviews that Missed a Vulnerability - A Large Scale Study of Chromium. |
ESSoS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Anhtuan Le, Utz Roedig, Awais Rashid |
LASARUS: Lightweight Attack Surface Reduction for Legacy Industrial Control Systems. |
ESSoS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Pierre Laperdrix, Benoit Baudry, Vikas Mishra |
FPRandom: Randomizing Core Browser Objects to Break Advanced Device Fingerprinting Techniques. |
ESSoS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Heiko Mantel, Alexandra Weber, Boris Köpf |
A Systematic Study of Cache Side Channels Across AES Implementations. |
ESSoS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Emad Heydari Beni, Bert Lagaisse, Ren Zhang 0003, Danny De Cock, Filipe Beato, Wouter Joosen |
A Voucher-Based Security Middleware for Secure Business Process Outsourcing. |
ESSoS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Mathias Payer |
HexPADS: A Platform to Detect "Stealth" Attacks. |
ESSoS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Benjamin Fogel, Shane Farmer, Hamza Alkofahi, Anthony Skjellum, Munawar Hafiz |
POODLEs, More POODLEs, FREAK Attacks Too: How Server Administrators Responded to Three Serious Web Vulnerabilities. |
ESSoS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Tom van Goethem, Wout Scheepers, Davy Preuveneers, Wouter Joosen |
Accelerometer-Based Device Fingerprinting for Multi-factor Mobile Authentication. |
ESSoS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Stanislav Dashevskyi, Achim D. Brucker, Fabio Massacci |
On the Security Cost of Using a Free and Open Source Component in a Proprietary Product. |
ESSoS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Sven Türpe |
Idea: Usable Platforms for Secure Programming - Mining Unix for Insight and Guidelines. |
ESSoS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Andreas Follner, Alexandre Bartel, Eric Bodden |
Analyzing the Gadgets - Towards a Metric to Measure Gadget Quality. |
ESSoS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Willard Rafnsson, Deepak Garg 0001, Andrei Sabelfeld |
Progress-Sensitive Security for SPARK. |
ESSoS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Eric Rothstein Morris, Joachim Posegga |
Idea: Enforcing Security Properties by Solving Behavioural Equations. |
ESSoS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Achim D. Brucker, Michael Herzberg |
On the Static Analysis of Hybrid Mobile Apps - A Report on the State of Apache Cordova Nation. |
ESSoS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Bernhard J. Berger, Karsten Sohr, Rainer Koschke |
Automatically Extracting Threats from Extended Data Flow Diagrams. |
ESSoS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Joseph Hallett, David Aspinall 0001 |
AppPAL for Android - Capturing and Checking Mobile App Policies. |
ESSoS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Pauline Anthonysamy, Matthew Edwards 0001, Christian Weichel, Awais Rashid |
Inferring Semantic Mapping Between Policies and Code: The Clue is in the Language. |
ESSoS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Jasper Bogaerts, Bert Lagaisse, Wouter Joosen |
Idea: Supporting Policy-Based Access Control on Database Systems. |
ESSoS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Mingyi Zhao, Peng Liu 0005 |
Empirical Analysis and Modeling of Black-Box Mutational Fuzzing. |
ESSoS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Enrico Lovat, Martín Ochoa, Alexander Pretschner |
Sound and Precise Cross-Layer Data Flow Tracking. |
ESSoS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Quanlong Guan, Heqing Huang, Weiqi Luo 0002, Sencun Zhu |
Semantics-Based Repackaging Detection for Mobile Apps. |
ESSoS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Juan Caballero, Eric Bodden, Elias Athanasopoulos (eds.) |
Engineering Secure Software and Systems - 8th International Symposium, ESSoS 2016, London, UK, April 6-8, 2016. Proceedings |
ESSoS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Mohammad Torabi Dashti, David A. Basin |
Security Testing Beyond Functional Tests. |
ESSoS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Divya Muthukumaran, Nirupama Talele, Trent Jaeger, Gang Tan |
Producing Hook Placements to Enforce Expected Access Control Policies. |
ESSoS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Philippe Massonet, Jesus Luna, Alain Pannetrat, Rubén Trapero |
Idea: Optimising Multi-Cloud Deployments with Security Controls as Constraints. |
ESSoS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Amina Souag, Camille Salinesi, Raúl Mazo, Isabelle Comyn-Wattiau |
A Security Ontology for Security Requirements Elicitation. |
ESSoS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Raoul Strackx, Niels Lambrigts |
Idea: State-Continuous Transfer of State in Protected-Module Architectures. |
ESSoS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Markus Dürmuth, Fabian Angelstorf, Claude Castelluccia, Daniele Perito, Chaabane Abdelberi |
OMEN: Faster Password Guessing Using an Ordered Markov Enumerator. |
ESSoS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Stefano Calzavara, Alvise Rabitti, Michele Bugliesi |
Formal Verification of Liferay RBAC. |
ESSoS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Marouane Fazouane, Henning Kopp, Rens W. van der Heijden, Daniel Le Métayer, Frank Kargl |
Formal Verification of Privacy Properties in Electric Vehicle Charging. |
ESSoS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Maarten Decat, Jasper Moeys, Bert Lagaisse, Wouter Joosen |
Improving Reuse of Attribute-Based Access Control Policies Using Policy Templates. |
ESSoS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Luca Allodi |
The Heavy Tails of Vulnerability Exploitation. |
ESSoS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Thuy D. Nguyen, Mark A. Gondree, Jean Khosalim, Cynthia E. Irvine |
Re-thinking Kernelized MLS Database Architectures in the Context of Cloud-Scale Data Stores. |
ESSoS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Frank Piessens, Juan Caballero, Nataliia Bielova (eds.) |
Engineering Secure Software and Systems - 7th International Symposium, ESSoS 2015, Milan, Italy, March 4-6, 2015. Proceedings |
ESSoS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Kevin Allix, Tegawendé F. Bissyandé, Jacques Klein, Yves Le Traon |
Are Your Training Datasets Yet Relevant? - An Investigation into the Importance of Timeline in Machine Learning-Based Malware Detection. |
ESSoS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Raoul Strackx, Pieter Philippaerts, Frédéric Vogels |
Idea: Towards an Inverted Cloud. |
ESSoS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | David Pfaff, Sebastian Hack, Christian Hammer 0001 |
Learning How to Prevent Return-Oriented Programming Efficiently. |
ESSoS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Martín Ochoa, Jorge Cuéllar, Alexander Pretschner, Per A. Hallgren |
Idea: Unwinding Based Model-Checking and Testing for Non-Interference on EFSMs. |
ESSoS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Lars Hamann, Karsten Sohr, Martin Gogolla |
Monitoring Database Access Constraints with an RBAC Metamodel: A Feasibility Study. |
ESSoS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Sebastian Banescu, Martín Ochoa, Nils Kunze, Alexander Pretschner |
Idea: Benchmarking Indistinguishability Obfuscation - A Candidate Implementation. |
ESSoS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Brahim Hamid, Christian Percebois |
A Modeling and Formal Approach for the Precise Specification of Security Patterns. |
ESSoS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Emily R. Jacobson, Andrew R. Bernat, William R. Williams, Barton P. Miller |
Detecting Code Reuse Attacks with a Model of Conformant Program Execution. |
ESSoS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Sibylle B. Fröschle, Alexander Stühring |
Idea: Security Engineering Principles for Day Two Car2X Applications. |
ESSoS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Joachim Biskup, Cornelia Tadros |
Idea: Towards a Vision of Engineering Controlled Interaction Execution for Information Services. |
ESSoS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Tri Minh Ngo, Marieke Huisman |
Quantitative Security Analysis for Programs with Low Input and Noisy Output. |
ESSoS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Hamza Ghani, Jesus Luna Garcia, Ivaylo Petkov, Neeraj Suri |
User-Centric Security Assessment of Software Configurations: A Case Study. |
ESSoS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jan Jürjens, Frank Piessens, Nataliia Bielova (eds.) |
Engineering Secure Software and Systems - 6th International Symposium, ESSoS 2014, Munich, Germany, February 26-28, 2014, Proceedings |
ESSoS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Fabian van den Broek, Brinio Hond, Arturo Cedillo Torres |
Security Testing of GSM Implementations. |
ESSoS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Peter T. Breuer, Jonathan P. Bowen |
Idea: Towards a Working Fully Homomorphic Crypto-processor - Practice and the Secret Computer. |
ESSoS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Maël Berthier, Julien Bringer, Hervé Chabanne, Thanh-Ha Le, Lionel Rivière, Victor Servant |
Idea: Embedded Fault Injection Simulator on Smartcard. |
ESSoS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Michele Bugliesi, Stefano Calzavara, Riccardo Focardi, Wilayat Khan |
Automatic and Robust Client-Side Protection for Cookie-Based Sessions. |
ESSoS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Hermann de Meer, Henrich Christopher Pöhls, Joachim Posegga, Kai Samelin |
On the Relation between Redactable and Sanitizable Signature Schemes. |
ESSoS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Yehia Elrakaiby, Moussa Amrani, Yves Le Traon |
Security@Runtime: A Flexible MDE Approach to Enforce Fine-grained Security Policies. |
ESSoS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Piergiuseppe Bettassa Copet, Riccardo Sisto |
Automated Formal Verification of Application-specific Security Properties. |
ESSoS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jonas Magazinius, Daniel Hedin, Andrei Sabelfeld |
Architectures for Inlining Security Monitors in Web Applications. |
ESSoS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Filippo Del Tedesco, Alejandro Russo, David Sands 0001 |
Fault-Tolerant Non-interference. |
ESSoS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Myla Archer, Elizabeth I. Leonard, Constance L. Heitmeyer |
Idea: Writing Secure C Programs with SecProve. |
ESSoS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Bojan Simic, James Walden |
Eliminating SQL Injection and Cross Site Scripting Using Aspect Oriented Programming. |
ESSoS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Linda Ariani Gunawan, Peter Herrmann |
Compositional Verification of Application-Level Security Properties. |
ESSoS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Vadim Kotov, Fabio Massacci |
Anatomy of Exploit Kits - Preliminary Analysis of Exploit Kits as Software Artefacts. |
ESSoS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Anne Edmundson, Brian Holtkamp, Emanuel Rivera, Matthew Finifter, Adrian Mettler, David A. Wagner 0001 |
An Empirical Study on the Effectiveness of Security Code Review. |
ESSoS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Denis Butin, David Gray, Giampaolo Bella |
Towards Verifying Voter Privacy through Unlinkability. |
ESSoS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Prachi Kumari, Alexander Pretschner |
Model-Based Usage Control Policy Derivation. |
ESSoS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Peter T. Breuer, Jonathan P. Bowen |
A Fully Homomorphic Crypto-Processor Design. |
ESSoS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jan Jürjens, Benjamin Livshits, Riccardo Scandariato (eds.) |
Engineering Secure Software and Systems - 5th International Symposium, ESSoS 2013, Paris, France, February 27 - March 1, 2013. Proceedings |
ESSoS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Koen Decroix, Jorn Lapon, Bart De Decker, Vincent Naessens |
A Formal Approach for Inspecting Privacy and Trust in Advanced Electronic Services. |
ESSoS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Nirupama Talele, Jason Teutsch, Trent Jaeger, Robert F. Erbacher |
Using Security Policies to Automate Placement of Network Intrusion Prevention. |
ESSoS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Philipp von Styp-Rekowsky, Sebastian Gerling, Michael Backes 0001, Christian Hammer 0001 |
Idea: Callee-Site Rewriting of Sealed System Libraries. |
ESSoS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Bastian Braun, Patrick Gemein, Hans P. Reiser, Joachim Posegga |
Control-Flow Integrity in Web Applications. |
ESSoS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jean-Baptiste Jeannin, Guido de Caso, Juan Chen 0002, Yuri Gurevich, Prasad Naldurg, Nikhil Swamy |
dkal ⋆ : Constructing Executable Specifications of Authorization Protocols. |
ESSoS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Tri Minh Ngo, Mariëlle Stoelinga, Marieke Huisman |
Confidentiality for Probabilistic Multi-threaded Programs and Its Verification. |
ESSoS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Michael J. May, Karthikeyan Bhargavan |
Towards Unified Authorization for Android. |
ESSoS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Massimiliano Masi, Rosario Pugliese, Francesco Tiezzi 0001 |
Formalisation and Implementation of the XACML Access Control Mechanism. |
ESSoS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Viet Hung Nguyen, Fabio Massacci |
An Idea of an Independent Validation of Vulnerability Discovery Models. |
ESSoS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Máté Kovács, Helmut Seidl |
Runtime Enforcement of Information Flow Security in Tree Manipulating Processes. |
ESSoS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Samson Gejibo, Federico Mancini 0001, Khalid A. Mughal, Remi Valvik, Jørn Klungsøyr |
Challenges in Implementing an End-to-End Secure Protocol for Java ME-Based Mobile Data Collection in Low-Budget Settings. |
ESSoS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Kristian Beckers, Stephan Faßbender, Maritta Heisel, Jan-Christoph Küster, Holger Schmidt 0001 |
Supporting the Development and Documentation of ISO 27001 Information Security Management Systems through Security Requirements Engineering Approaches. |
ESSoS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Matteo Maria Casalino, Henrik Plate, Slim Trabelsi |
Transversal Policy Conflict Detection. |
ESSoS |
2012 |
DBLP DOI BibTeX RDF |
|