


default search action
2. ESSoS 2010: Pisa, Italy
- Fabio Massacci, Dan S. Wallach, Nicola Zannone

:
Engineering Secure Software and Systems, Second International Symposium, ESSoS 2010, Pisa, Italy, February 3-4, 2010. Proceedings. Lecture Notes in Computer Science 5965, Springer 2010, ISBN 978-3-642-11746-6
Attack Analysis and Prevention I
- Francesco Gadaleta, Yves Younan, Wouter Joosen:

BuBBle: A Javascript Engine Level Countermeasure against Heap-Spraying Attacks. 1-17 - Philippe De Ryck, Lieven Desmet, Thomas Heyman, Frank Piessens, Wouter Joosen:

CsFire: Transparent Client-Side Mitigation of Malicious Cross-Domain Requests. 18-34 - Igor Santos

, Felix Brezo, Javier Nieves, Yoseba K. Penya
, Borja Sanz
, Carlos Laorden
, Pablo García Bringas
:
Idea: Opcode-Sequence-Based Malware Detection. 35-43
Attack Analysis and Prevention II
- Christian Hammer

:
Experiences with PDG-Based IFC. 44-60 - James Walden

, Maureen Doyle, Robert Lenhof, John Murray:
Idea: Java vs. PHP: Security Implications of Language Choice for Web Applications. 61-69 - Karsten Sohr

, Bernhard J. Berger
:
Idea: Towards Architecture-Centric Security Analysis of Software. 70-78
Policy Verification and Enforcement I
- Alfredo Pironti, Jan Jürjens:

Formally-Based Black-Box Monitoring of Security Protocols. 79-95 - Martin Johns

, Christian Beyerlein, Rosemaria Giesecke, Joachim Posegga:
Secure Code Generation for Web Applications. 96-113 - Per Håkon Meland, Inger Anne Tøndel, Jostein Jensen:

Idea: Reusability of Threat Models - Two Approaches with an Experimental Evaluation. 114-122
Policy Verification and Enforcement II
- Stere Preda, Nora Cuppens-Boulahia, Frédéric Cuppens, Joaquín García-Alfaro

, Laurent Toutain:
Model-Driven Security Policy Deployment: Property Oriented Approach. 123-139 - Clara Bertolissi, Maribel Fernández:

Category-Based Authorisation Models: Operational Semantics and Expressive Power. 140-156 - Achim D. Brucker

, Helmut Petritsch:
Idea: Efficient Evaluation of Access Control Constraints. 157-165
Secure System and Software Development I
- Nina Moebius, Kurt Stenzel, Wolfgang Reif

:
Formal Verification of Application-Specific Security Properties in a Model-Driven Approach. 166-181 - Giacomo A. Galilei, Vincenzo Gervasi

:
Idea: Enforcing Consumer-Specified Security Properties for Modular Software. 182-191 - Ben H. Smith, Laurie A. Williams, Andrew Austin:

Idea: Using System Level Testing for Revealing SQL Injection-Related Error Message Information Leaks. 192-200
Secure System and Software Development II
- David A. Basin, Manuel Clavel, Marina Egea, Michael Schläpfer:

Automatic Generation of Smart, Security-Aware GUI Models. 201-217 - Albin Zuccato, Nils Daniels, Cheevarat Jampathom, Mikael Nilson:

Report: Modular Safeguards to Create Holistic Security Requirement Specifications for System of Systems. 218-230 - Aida Omerovic, Anette Andresen, Håvard Grindheim, Per Myrseth, Atle Refsdal, Ketil Stølen, Jon Ølnes:

Idea: A Feasibility Study in Model Based Prediction of Impact of Changes on System Quality. 231-240

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














