default search action
SERE 2014: San Francisco, CA, USA
- IEEE Eighth International Conference on Software Security and Reliability, SERE 2014, San Francisco, CA, USA, June 30 - July 2, 2014 - Companion Volume. IEEE 2014
Fast Abstracts
- Kuo-Fong Kao, Wen-Ching Chen, Jui-Chi Chang, Heng-Te Chu:
An Accurate Fake Access Point Detection Method Based on Deviation of Beacon Time Interval. 1-2 - Siyuan Jiang, Raúl A. Santelices, Haipeng Cai, Mark Grechanik:
How Accurate Is Dynamic Program Slicing? An Empirical Approach to Compute Accuracy Bounds. 3-4 - Anthony Thyron Rivers, Mladen A. Vouk, Laurie A. Williams:
On Coverage-Based Attack Profiles. 5-6
Student Doctoral Program
- Stefan Groesbrink:
Virtual Machine Migration as a Fault Tolerance Technique for Embedded Real-Time Systems. 7-12 - Awad A. Younis, Yashwant K. Malaiya:
Using Software Structure to Predict Vulnerability Exploitation Potential. 13-18 - Amira Zammali, Agnan de Bonneval, Yves Crouzet:
A Multi-function Error Detection Policy to Enhance Communication Integrity in Critical Embedded Systems. 19-24 - Esra N. Yolacan, Jennifer G. Dy, David R. Kaeli:
System Call Anomaly Detection Using Multi-HMMs. 25-30
Information Assurance Workshop
- Dhyanesh Chaudhari, Mohammad Zulkernine, Komminist Weldemariam:
FRanC: A Ranking Framework for the Prioritization of Software Maintenance. 31-40 - Dianxiang Xu, Yunpeng Zhang:
Specification and Analysis of Attribute-Based Access Control Policies: An Overview. 41-49 - Chao Yang, Tao Zheng, Zhitian Lin:
A-R Exploit: An Automatic ROP Exploit Based on Long Sequence. 50-56 - Rajendran Swamidurai, David A. Umphress:
The Impact of Static and Dynamic Pairs on Pair Programming. 57-63 - J. Jenny Li, Patricia Morreale, John Douglas Palframan:
Diagnosis-Guided Regression Test Refinement. 64-70 - Jun Ai, Hanyu Pei, Liang Yan:
Software Reliability Virtual Testing for Reliability Assessment. 71-77 - W. Eric Wong, Tej Gidvani, Alfonso Lopez, Ruizhi Gao, Matthew Horn:
Evaluating Software Safety Standards: A Systematic Review and Comparison. 78-87
Trustworthy Computing Workshop
- Hung Yu Chien:
New Gen2v2-Based Mutual Authentication Schemes. 88-96 - Yen-Chun Hsu, Yu-Sung Wu, Tsung-Han Tsai, Yi Pin Chiu, Chih-Hung Lin, Zhi-Wei Chen:
MicroApp: Architecting Web Application for Non-uniform Trustworthiness in Cloud Computing Environment. 97-106 - Xun Zhan, Tao Zheng, Shixiang Gao:
Defending ROP Attacks Using Basic Block Level Randomization. 107-112 - Wiem Tounsi, Benjamin Justus, Nora Cuppens-Boulahia, Frédéric Cuppens, Joaquín García-Alfaro:
Probabilistic Cycle Detection for Schneier's Solitaire Keystream Algorithm. 113-120 - Farzana Rahman, Md. Osman Gani, Golam Mushih Tanimul Ahsan, Sheikh Iqbal Ahamed:
Seeing Beyond Visibility: A Four Way Fusion of User Authentication for Efficient Usable Security on Mobile Devices. 121-129 - Goce Anastasovski, Katerina Goseva-Popstojanova:
Classification of Partially Labeled Malicious Web Traffic in the Presence of Concept Drift. 130-139 - Chao-Chun Yeh, Han-Lin Lu, Chun-Yen Chen, Kee Kiat Khor, Shih-Kun Huang:
CRAXDroid: Automatic Android System Testing by Selective Symbolic Execution. 140-148 - Mariem Graa, Nora Cuppens-Boulahia, Frédéric Cuppens, Ana R. Cavalli:
Protection against Code Obfuscation Attacks Based on Control Dependencies in Android Systems. 149-157 - Xiaolei Li, Guangdong Bai, Benjamin Thian, Zhenkai Liang, Heng Yin:
A Light-Weight Software Environment for Confining Android Malware. 158-167 - Curtis C. R. Busby Earle, Robert B. France, Indrakshi Ray:
Analysing Requirements to Detect Latent Security Vulnerabilities. 168-175 - Borting Chen, Ming-Wei Shih, Yu-Lun Huang:
An Anomaly Detection Module for Firefox OS. 176-184 - Amna Saeed, Asad Raza, Haider Abbas:
A Survey on Network Layer Attacks and AODV Defense in Mobile Ad Hoc Networks. 185-191 - J. Jenny Li, Tony Savor:
Detecting DoS Attacks on Notification Services. 192-198
SSCPS Workshop
- Yixiang Chen, Yuanrui Zhang:
A Hybrid Clock System Related to STeC Language. 199-203 - Juan Zhai, Hanfei Wang, Jianhua Zhao:
Post-condition-Directed Invariant Inference for Loops over Data Structures. 204-212 - Bin Gu, Yunwei Dong, Xiaomin Wei:
A Qualitative Safety Analysis Method for AADL Model. 213-217 - Zheng Wang, Xiao Wu, Hongbin Zhao:
A Load Scheduling Strategy for Electric Vehicles Charging System. 218-222 - Kang Yu, Zhenbang Chen, Wei Dong:
A Predictive Runtime Verification Framework for Cyber-Physical Systems. 223-227 - Xinghua Yao, Yixiang Chen:
A Proof System in Process Algebra for Demand and Supply. 228-236
HSCD Workshop
- Niansheng Liu, Huaiyu Dai, Donghui Guo:
Security Analysis of MAC Protocol for Mobile Device Identification Based on PARADIS. 237-242 - Benbin Chen, Lin Li, Yiyang Li, Hongyin Luo, Donghui Guo:
Compiler Assisted Instruction Relocation for Performance Improvement of Cache Hit Rate and System Reliability. 243-246 - Sizhao Li, Shan Lin, Deming Chen, W. Eric Wong, Donghui Guo:
Analysis of System Reliability for Cache Coherence Scheme in Multi-processor. 247-251 - Long Zheng, Yangbing Wu, Dan Zhang, Liwei Lin, Donghui Guo:
Multiphysics Modeling and Characterization of MicroCVD Chip for Growing Carbon Nanomaterials. 252-256 - Hua-Ching Chen, Hsuan-Ming Feng, Benbin Chen, Donghui Guo:
A Parameters Tuning Algorithm in Wireless Networks. 257-260 - Peizhong Liu, Minghang Wang, Ping Li:
Robustness and Fragility of a New Local-World Dynamical Network Model. 261-265
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.