default search action
9. ESSoS 2017: Bonn, Germany
- Eric Bodden, Mathias Payer, Elias Athanasopoulos:
Engineering Secure Software and Systems - 9th International Symposium, ESSoS 2017, Bonn, Germany, July 3-5, 2017, Proceedings. Lecture Notes in Computer Science 10379, Springer 2017, ISBN 978-3-319-62104-3 - Jasper Bogaerts, Bert Lagaisse, Wouter Joosen:
SEQUOIA: Scalable Policy-Based Access Control for Search Operations in Data-Driven Applications. 1-18 - Emad Heydari Beni, Bert Lagaisse, Ren Zhang, Danny De Cock, Filipe Beato, Wouter Joosen:
A Voucher-Based Security Middleware for Secure Business Process Outsourcing. 19-35 - Anhtuan Le, Utz Roedig, Awais Rashid:
LASARUS: Lightweight Attack Surface Reduction for Legacy Industrial Control Systems. 36-52 - Robert Lagerström, Carliss Y. Baldwin, Alan MacCormack, Daniel J. Sturtevant, Lee Doolan:
Exploring the Relationship Between Architecture Coupling and Software Vulnerabilities. 53-69 - Nuthan Munaiah, Benjamin S. Meyers, Cecilia Ovesdotter Alm, Andrew Meneely, Pradeep K. Murukannaiah, Emily Prud'hommeaux, Josephine Wolff, Yang Yu:
Natural Language Insights from Code Reviews that Missed a Vulnerability - A Large Scale Study of Chromium. 70-86 - Gebrehiwet Biyane Welearegai, Christian Hammer:
Idea: Optimized Automatic Sanitizer Placement. 87-96 - Pierre Laperdrix, Benoit Baudry, Vikas Mishra:
FPRandom: Randomizing Core Browser Objects to Break Advanced Device Fingerprinting Techniques. 97-114 - Dolière Francis Somé, Nataliia Bielova, Tamara Rezk:
Control What You Include! - Server-Side Protection Against Third Party Web Tracking. 115-132 - Tayyaba Nafees, Natalie Coull, Robert Ian Ferguson, Adam T. Sampson:
Idea-Caution Before Exploitation: The Use of Cybersecurity Domain Knowledge to Educate Software Engineers Against Software Vulnerabilities. 133-142 - Micah Morton, Hyungjoon Koo, Forrest Li, Kevin Z. Snow, Michalis Polychronakis, Fabian Monrose:
Defeating Zombie Gadgets by Re-randomizing Code upon Disclosure. 143-160 - Daniel Gruss, Moritz Lipp, Michael Schwarz, Richard Fellner, Clémentine Maurice, Stefan Mangard:
KASLR is Dead: Long Live KASLR. 161-176 - Lucian Cojocar, Taddeus Kroes, Herbert Bos:
JTR: A Binary Solution for Switch-Case Recovery. 177-195 - Federico De Meo, Luca Viganò:
A Formal Approach to Exploiting Multi-stage Attacks Based on File-System Vulnerabilities of Web Applications. 196-212 - Heiko Mantel, Alexandra Weber, Boris Köpf:
A Systematic Study of Cache Side Channels Across AES Implementations. 213-230 - Giampaolo Bella, Rosario Giustolisi:
Idea: A Unifying Theory for Evaluation Systems. 231-239
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.