- Achim D. Brucker, Michael Herzberg:
On the Static Analysis of Hybrid Mobile Apps - A Report on the State of Apache Cordova Nation. ESSoS 2016: 72-88 - Stanislav Dashevskyi, Achim D. Brucker, Fabio Massacci:
On the Security Cost of Using a Free and Open Source Component in a Proprietary Product. ESSoS 2016: 190-206 - Mohammad Torabi Dashti, David A. Basin:
Security Testing Beyond Functional Tests. ESSoS 2016: 1-19 - Benjamin Fogel, Shane Farmer, Hamza Alkofahi, Anthony Skjellum, Munawar Hafiz:
POODLEs, More POODLEs, FREAK Attacks Too: How Server Administrators Responded to Three Serious Web Vulnerabilities. ESSoS 2016: 122-137 - Andreas Follner, Alexandre Bartel, Eric Bodden:
Analyzing the Gadgets - Towards a Metric to Measure Gadget Quality. ESSoS 2016: 155-172 - Tom van Goethem, Wout Scheepers, Davy Preuveneers, Wouter Joosen:
Accelerometer-Based Device Fingerprinting for Multi-factor Mobile Authentication. ESSoS 2016: 106-121 - Quanlong Guan, Heqing Huang, Weiqi Luo, Sencun Zhu:
Semantics-Based Repackaging Detection for Mobile Apps. ESSoS 2016: 89-105 - Joseph Hallett, David Aspinall:
AppPAL for Android - Capturing and Checking Mobile App Policies. ESSoS 2016: 216-232 - Enrico Lovat, Martín Ochoa, Alexander Pretschner:
Sound and Precise Cross-Layer Data Flow Tracking. ESSoS 2016: 38-55 - Eric Rothstein Morris, Joachim Posegga:
Idea: Enforcing Security Properties by Solving Behavioural Equations. ESSoS 2016: 260-268 - Mathias Payer:
HexPADS: A Platform to Detect "Stealth" Attacks. ESSoS 2016: 138-154 - Willard Rafnsson, Deepak Garg, Andrei Sabelfeld:
Progress-Sensitive Security for SPARK. ESSoS 2016: 20-37 - Sven Türpe:
Idea: Usable Platforms for Secure Programming - Mining Unix for Insight and Guidelines. ESSoS 2016: 207-215 - Mingyi Zhao, Peng Liu:
Empirical Analysis and Modeling of Black-Box Mutational Fuzzing. ESSoS 2016: 173-189 - Juan Caballero, Eric Bodden, Elias Athanasopoulos:
Engineering Secure Software and Systems - 8th International Symposium, ESSoS 2016, London, UK, April 6-8, 2016. Proceedings. Lecture Notes in Computer Science 9639, Springer 2016, ISBN 978-3-319-30805-0 [contents] - 2015
- Kevin Allix, Tegawendé F. Bissyandé, Jacques Klein, Yves Le Traon:
Are Your Training Datasets Yet Relevant? - An Investigation into the Importance of Timeline in Machine Learning-Based Malware Detection. ESSoS 2015: 51-67 - Luca Allodi:
The Heavy Tails of Vulnerability Exploitation. ESSoS 2015: 133-148 - Sebastian Banescu, Martín Ochoa, Nils Kunze, Alexander Pretschner:
Idea: Benchmarking Indistinguishability Obfuscation - A Candidate Implementation. ESSoS 2015: 149-156 - Stefano Calzavara, Alvise Rabitti, Michele Bugliesi:
Formal Verification of Liferay RBAC. ESSoS 2015: 1-16 - Maarten Decat, Jasper Moeys, Bert Lagaisse, Wouter Joosen:
Improving Reuse of Attribute-Based Access Control Policies Using Policy Templates. ESSoS 2015: 196-210 - Markus Dürmuth, Fabian Angelstorf, Claude Castelluccia, Daniele Perito, Chaabane Abdelberi:
OMEN: Faster Password Guessing Using an Ordered Markov Enumerator. ESSoS 2015: 119-132 - Marouane Fazouane, Henning Kopp, Rens W. van der Heijden, Daniel Le Métayer, Frank Kargl:
Formal Verification of Privacy Properties in Electric Vehicle Charging. ESSoS 2015: 17-33 - Lars Hamann, Karsten Sohr, Martin Gogolla:
Monitoring Database Access Constraints with an RBAC Metamodel: A Feasibility Study. ESSoS 2015: 211-226 - Philippe Massonet, Jesus Luna, Alain Pannetrat, Rubén Trapero:
Idea: Optimising Multi-Cloud Deployments with Security Controls as Constraints. ESSoS 2015: 102-110 - Divya Muthukumaran, Nirupama Talele, Trent Jaeger, Gang Tan:
Producing Hook Placements to Enforce Expected Access Control Policies. ESSoS 2015: 178-195 - Thuy D. Nguyen, Mark A. Gondree, Jean Khosalim, Cynthia E. Irvine:
Re-thinking Kernelized MLS Database Architectures in the Context of Cloud-Scale Data Stores. ESSoS 2015: 86-101 - Martín Ochoa, Jorge Cuéllar, Alexander Pretschner, Per A. Hallgren:
Idea: Unwinding Based Model-Checking and Testing for Non-Interference on EFSMs. ESSoS 2015: 34-42 - David Pfaff, Sebastian Hack, Christian Hammer:
Learning How to Prevent Return-Oriented Programming Efficiently. ESSoS 2015: 68-85 - Amina Souag, Camille Salinesi, Raúl Mazo, Isabelle Comyn-Wattiau:
A Security Ontology for Security Requirements Elicitation. ESSoS 2015: 157-177 - Raoul Strackx, Niels Lambrigts:
Idea: State-Continuous Transfer of State in Protected-Module Architectures. ESSoS 2015: 43-50