
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 110 matches
- 2021
- Julia Rauscher, Bernhard Bauer:
Adaptation of Architecture Analyses: An IoT Safety and Security Flaw Assessment Approach. HEALTHINF 2021: 320-327 - 2020
- Erik van der Kouwe
, Gernot Heiser
, Dennis Andriesse, Herbert Bos
, Cristiano Giuffrida
:
Benchmarking Flaws Undermine Security Research. IEEE Secur. Priv. 18(3): 48-57 (2020) - Julia Rauscher, Bernhard Bauer:
Design Optimization of IoT Models: Structured Safety and Security Flaw Identification. BMSD 2020: 84-102 - Peter Mell, Assane Gueye:
A Suite of Metrics for Calculating the Most Significant Security Relevant Software Flaw Types. COMPSAC 2020: 511-516 - Francisco Araújo, Ibéria Medeiros, Nuno Neves:
Generating Tests for the Discovery of Security Flaws in Product Variants. ICST Workshops 2020: 133-142 - Katja Tuma, Laurens Sion, Riccardo Scandariato, Koen Yskout
:
Automating the early detection of security design flaws. MoDELS 2020: 332-342 - Jonathan Berger, Amit Klein, Benny Pinkas:
Flaw Label: Exploiting IPv6 Flow Label. IEEE Symposium on Security and Privacy 2020: 1259-1276 - Arnis Parsovs:
Estonian Electronic Identity Card: Security Flaws in Key Management. USENIX Security Symposium 2020: 1785-1802 - Shahriar Yazdipour:
Github Data Exposure and Accessing Blocked Data using the GraphQL Security Design Flaw. CoRR abs/2005.13448 (2020) - Peter Mell, Assane Gueye:
A Suite of Metrics for Calculating the Most Significant Security Relevant Software Flaw Types. CoRR abs/2006.08524 (2020) - 2019
- R. Anushiadevi, Veeramuthu Venkatesh, Rengarajan Amirtharajan
:
An Image Mathcrypt - A Flawless Security via Flawed Image. ATIS 2019: 16-31 - Katja Tuma, Danial Hosseini, Kyriakos Malamas, Riccardo Scandariato:
Inspection guidelines to identify security design flaws. ECSA (Companion) 2019: 116-122 - Erik van der Kouwe, Gernot Heiser, Dennis Andriesse, Herbert Bos
, Cristiano Giuffrida
:
SoK: Benchmarking Flaws in Systems Security. EuroS&P 2019: 310-325 - Laurens Sion
, Katja Tuma, Riccardo Scandariato, Koen Yskout
, Wouter Joosen:
Towards Automated Security Design Flaw Detection. ASE Workshops 2019: 49-56 - M. Junaid Gul, Rabia Riaz, Yaser Jararweh, M. Mazhar Rathore, Anand Paul
:
Security Flaws of Operating System Against Live Device Attacks: A case study on live Linux distribution device. SDS 2019: 154-159 - Bruno Forlin, Cezar Reinbrecht, Johanna Sepúlveda:
Security Aspects of Real-Time MPSoCs: The Flaws and Opportunities of Preemptive NoCs. VLSI-SoC (Selected Papers) 2019: 209-233 - Katja Tuma, Danial Hosseini, Kyriakos Malamas, Riccardo Scandariato:
Inspection Guidelines to Identify Security Design Flaws. CoRR abs/1906.01961 (2019) - 2018
- Hamid Bagheri, Eunsuk Kang, Sam Malek, Daniel Jackson:
A formal approach for detection of security flaws in the android permission system. Formal Aspects Comput. 30(5): 525-544 (2018) - Hongmin Wang, Hongzhao Zhu
, Ping Xue, Xiaohui Zhu:
The resin lens flaw feature extraction and detection system based on data transmission security. Multim. Tools Appl. 77(14): 18483-18501 (2018) - Mohamed A. Abo-Soliman, Marianne A. Azer:
Enterprise WLAN Security Flaws: Current Attacks and relative Mitigations. ARES 2018: 34:1-34:8 - Simon Biggs, Damon Lee, Gernot Heiser:
The Jury Is In: Monolithic OS Design Is Flawed: Microkernel-based Designs Improve Security. APSys 2018: 16:1-16:7 - Kenneth Schmitz, Oliver Keszöcze
, Jurij Schmidt, Daniel Große
, Rolf Drechsler
:
Towards Dynamic Execution Environment for System Security Protection Against Hardware Flaws. ISVLSI 2018: 557-562 - Erik Poll:
LangSec Revisited: Input Security Flaws of the Second Kind. IEEE Symposium on Security and Privacy Workshops 2018: 329-334 - Richard Bonett, Kaushal Kafle, Kevin Moran, Adwait Nadkarni, Denys Poshyvanyk:
Discovering Flaws in Security-Focused Static Analysis Tools for Android using Systematic Mutation. USENIX Security Symposium 2018: 1263-1280 - Richard Bonett, Kaushal Kafle, Kevin Moran, Adwait Nadkarni, Denys Poshyvanyk:
Discovering Flaws in Security-Focused Static Analysis Tools for Android using Systematic Mutation. CoRR abs/1806.09761 (2018) - 2017
- Hwankuk Kim, Kyungho Lee, Jongin Lim:
A Study on the Impact Analysis of Security Flaws between Security Controls: An Empirical Analysis of K-ISMS using Case-Control Study. KSII Trans. Internet Inf. Syst. 11(9): 4588-4608 (2017) - John Gregor Fraser, Ahmed Bouridane:
Have the security flaws surrounding BITCOIN effected the currency's value? EST 2017: 50-55 - 2016
- (Withdrawn) Flaw in the Security Analysis of Leakage-resilient Authenticated Key Exchange Protocol from CT-RSA 2016 and Restoring the Security Proof. IACR Cryptol. ePrint Arch. 2016: 862 (2016)
- (Withdrawn) Comments on "Flaw in the Security Analysis of Leakage-resilient Authenticated Key Exchange Protocol from CT-RSA 2016 and Restoring the Security Proof". IACR Cryptol. ePrint Arch. 2016: 1139 (2016)
- 2015
- Dheerendra Mishra
:
On the Security Flaws in ID-based Password Authentication Schemes for Telecare Medical Information Systems. J. Medical Syst. 39(1): 154 (2015)
skipping 80 more matches
loading more results
failed to load more results, please try again later

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
retrieved on 2021-03-05 12:49 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint