default search action
8. ESSoS 2016: London, UK
- Juan Caballero, Eric Bodden, Elias Athanasopoulos:
Engineering Secure Software and Systems - 8th International Symposium, ESSoS 2016, London, UK, April 6-8, 2016. Proceedings. Lecture Notes in Computer Science 9639, Springer 2016, ISBN 978-3-319-30805-0 - Mohammad Torabi Dashti, David A. Basin:
Security Testing Beyond Functional Tests. 1-19 - Willard Rafnsson, Deepak Garg, Andrei Sabelfeld:
Progress-Sensitive Security for SPARK. 20-37 - Enrico Lovat, Martín Ochoa, Alexander Pretschner:
Sound and Precise Cross-Layer Data Flow Tracking. 38-55 - Bernhard J. Berger, Karsten Sohr, Rainer Koschke:
Automatically Extracting Threats from Extended Data Flow Diagrams. 56-71 - Achim D. Brucker, Michael Herzberg:
On the Static Analysis of Hybrid Mobile Apps - A Report on the State of Apache Cordova Nation. 72-88 - Quanlong Guan, Heqing Huang, Weiqi Luo, Sencun Zhu:
Semantics-Based Repackaging Detection for Mobile Apps. 89-105 - Tom van Goethem, Wout Scheepers, Davy Preuveneers, Wouter Joosen:
Accelerometer-Based Device Fingerprinting for Multi-factor Mobile Authentication. 106-121 - Benjamin Fogel, Shane Farmer, Hamza Alkofahi, Anthony Skjellum, Munawar Hafiz:
POODLEs, More POODLEs, FREAK Attacks Too: How Server Administrators Responded to Three Serious Web Vulnerabilities. 122-137 - Mathias Payer:
HexPADS: A Platform to Detect "Stealth" Attacks. 138-154 - Andreas Follner, Alexandre Bartel, Eric Bodden:
Analyzing the Gadgets - Towards a Metric to Measure Gadget Quality. 155-172 - Mingyi Zhao, Peng Liu:
Empirical Analysis and Modeling of Black-Box Mutational Fuzzing. 173-189 - Stanislav Dashevskyi, Achim D. Brucker, Fabio Massacci:
On the Security Cost of Using a Free and Open Source Component in a Proprietary Product. 190-206 - Sven Türpe:
Idea: Usable Platforms for Secure Programming - Mining Unix for Insight and Guidelines. 207-215 - Joseph Hallett, David Aspinall:
AppPAL for Android - Capturing and Checking Mobile App Policies. 216-232 - Pauline Anthonysamy, Matthew Edwards, Christian Weichel, Awais Rashid:
Inferring Semantic Mapping Between Policies and Code: The Clue is in the Language. 233-250 - Jasper Bogaerts, Bert Lagaisse, Wouter Joosen:
Idea: Supporting Policy-Based Access Control on Database Systems. 251-259 - Eric Rothstein Morris, Joachim Posegga:
Idea: Enforcing Security Properties by Solving Behavioural Equations. 260-268
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.