Engineering Secure Software and Systems [E-Book] : 5th International Symposium, ESSoS 2013, Paris, France, February 27 - March 1, 2013. Proceedings / edited by Jan Jürjens, Benjamin Livshits, Riccardo Scandariato.
Jürjens, Jan.
Livshits, Benjamin. / Scandariato, Riccardo.
Berlin, Heidelberg : Springer, 2013
XII, 229 p. 40 illus. digital.
Lecture notes in computer science ; 7781
Full Text
Table of Contents:
  • Control-Flow Integrity in Web Applications Using Security Policies to Automate Placement of Network Intrusion Prevention
  • Idea: Callee-Site Rewriting of Sealed System Libraries
  • Towards Unified Authorization for Android
  • Model-Based Usage Control Policy Derivation
  • Compositional Verification of Application-Level Security Properties
  • Towards Verifying Voter Privacy through Unlinkability
  • Confidentiality for Probabilistic Multi-threaded Programs and Its Verification
  • A Fully Homomorphic Crypto-Processor Design: Correctness of a Secret Computer
  • DKAL: Constructing Executable Specifications of Authorization Protocols
  • A Formal Approach for Inspecting Privacy and Trust in Advanced Electronic services
  • Idea: Writing Secure C Programs with SecProve
  • Anatomy of Exploit Kits: Preliminary Analysis of Exploit Kits as Software Artefacts
  • An Empirical Study on the Effectiveness of Security Code Review
  • Eliminating SQL Injection and Cross Site Scripting Using Aspect Oriented Programming.