首页 > 最新文献

Engineering Secure Software and Systems最新文献

英文 中文
One Leak Is Enough to Expose Them All - From a WebRTC IP Leak to Web-Based Network Scanning 一次泄漏就足以暴露所有漏洞——从webtc IP泄漏到基于web的网络扫描
Pub Date : 2018-06-26 DOI: 10.1007/978-3-319-94496-8_5
Mohammadreza Hazhirpasand, Mohammad Ghafari
{"title":"One Leak Is Enough to Expose Them All - From a WebRTC IP Leak to Web-Based Network Scanning","authors":"Mohammadreza Hazhirpasand, Mohammad Ghafari","doi":"10.1007/978-3-319-94496-8_5","DOIUrl":"https://doi.org/10.1007/978-3-319-94496-8_5","url":null,"abstract":"","PeriodicalId":273207,"journal":{"name":"Engineering Secure Software and Systems","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117073161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Idea: Benchmarking Android Data Leak Detection Tools 想法:测试Android数据泄漏检测工具
Pub Date : 2018-06-26 DOI: 10.1007/978-3-319-94496-8_9
Claudio Corrodi, Timo Spring, Mohammad Ghafari, Oscar Nierstrasz
{"title":"Idea: Benchmarking Android Data Leak Detection Tools","authors":"Claudio Corrodi, Timo Spring, Mohammad Ghafari, Oscar Nierstrasz","doi":"10.1007/978-3-319-94496-8_9","DOIUrl":"https://doi.org/10.1007/978-3-319-94496-8_9","url":null,"abstract":"","PeriodicalId":273207,"journal":{"name":"Engineering Secure Software and Systems","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129240622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Vision for Enhancing Security of Cryptography in Executables 增强可执行文件加密安全性的展望
Pub Date : 2018-06-26 DOI: 10.1007/978-3-319-94496-8_1
Otto Brechelmacher, Willibald Krenn, Thorsten Tarrach
{"title":"A Vision for Enhancing Security of Cryptography in Executables","authors":"Otto Brechelmacher, Willibald Krenn, Thorsten Tarrach","doi":"10.1007/978-3-319-94496-8_1","DOIUrl":"https://doi.org/10.1007/978-3-319-94496-8_1","url":null,"abstract":"","PeriodicalId":273207,"journal":{"name":"Engineering Secure Software and Systems","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123978891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Model Checking the Information Flow Security of Real-Time Systems 实时系统信息流安全的模型检验
Pub Date : 2018-06-26 DOI: 10.1007/978-3-319-94496-8_3
Christopher Gerking, David Schubert, E. Bodden
{"title":"Model Checking the Information Flow Security of Real-Time Systems","authors":"Christopher Gerking, David Schubert, E. Bodden","doi":"10.1007/978-3-319-94496-8_3","DOIUrl":"https://doi.org/10.1007/978-3-319-94496-8_3","url":null,"abstract":"","PeriodicalId":273207,"journal":{"name":"Engineering Secure Software and Systems","volume":"08 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124466286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Idea: Automatic Localization of Malicious Behaviors in Android Malware with Hidden Markov Models 想法:利用隐马尔可夫模型自动定位Android恶意软件中的恶意行为
Pub Date : 2018-06-26 DOI: 10.1007/978-3-319-94496-8_8
Aleieldin Salem, Tabea Schmidt, A. Pretschner
{"title":"Idea: Automatic Localization of Malicious Behaviors in Android Malware with Hidden Markov Models","authors":"Aleieldin Salem, Tabea Schmidt, A. Pretschner","doi":"10.1007/978-3-319-94496-8_8","DOIUrl":"https://doi.org/10.1007/978-3-319-94496-8_8","url":null,"abstract":"","PeriodicalId":273207,"journal":{"name":"Engineering Secure Software and Systems","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121759417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Idea: Visual Analytics for Web Security 想法:Web安全的可视化分析
Pub Date : 2018-06-26 DOI: 10.1007/978-3-319-94496-8_10
V. Pochat, Tom van Goethem, W. Joosen
{"title":"Idea: Visual Analytics for Web Security","authors":"V. Pochat, Tom van Goethem, W. Joosen","doi":"10.1007/978-3-319-94496-8_10","DOIUrl":"https://doi.org/10.1007/978-3-319-94496-8_10","url":null,"abstract":"","PeriodicalId":273207,"journal":{"name":"Engineering Secure Software and Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129246117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Off-Limits: Abusing Legacy x86 Memory Segmentation to Spy on Enclaved Execution 禁止:滥用传统x86内存分割监视enclave执行
Pub Date : 2018-06-26 DOI: 10.1007/978-3-319-94496-8_4
Jago Gyselinck, Jo Van Bulck, F. Piessens, Raoul Strackx
{"title":"Off-Limits: Abusing Legacy x86 Memory Segmentation to Spy on Enclaved Execution","authors":"Jago Gyselinck, Jo Van Bulck, F. Piessens, Raoul Strackx","doi":"10.1007/978-3-319-94496-8_4","DOIUrl":"https://doi.org/10.1007/978-3-319-94496-8_4","url":null,"abstract":"","PeriodicalId":273207,"journal":{"name":"Engineering Secure Software and Systems","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116022225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Security Analysis of Drone Communication Protocols 无人机通信协议的安全性分析
Pub Date : 2018-06-26 DOI: 10.1007/978-3-319-94496-8_7
C. Bunse, Sebastian Plotz
{"title":"Security Analysis of Drone Communication Protocols","authors":"C. Bunse, Sebastian Plotz","doi":"10.1007/978-3-319-94496-8_7","DOIUrl":"https://doi.org/10.1007/978-3-319-94496-8_7","url":null,"abstract":"","PeriodicalId":273207,"journal":{"name":"Engineering Secure Software and Systems","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114167674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Enforcing Full-Stack Memory-Safety in Cyber-Physical Systems 在网络物理系统中加强全栈内存安全
Pub Date : 2018-06-26 DOI: 10.1007/978-3-319-94496-8_2
Eyasu Getahun Chekole, Sudipta Chattopadhyay, Martín Ochoa, Huaqun Guo
{"title":"Enforcing Full-Stack Memory-Safety in Cyber-Physical Systems","authors":"Eyasu Getahun Chekole, Sudipta Chattopadhyay, Martín Ochoa, Huaqun Guo","doi":"10.1007/978-3-319-94496-8_2","DOIUrl":"https://doi.org/10.1007/978-3-319-94496-8_2","url":null,"abstract":"","PeriodicalId":273207,"journal":{"name":"Engineering Secure Software and Systems","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130252738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
PrivacyMeter: Designing and Developing a Privacy-Preserving Browser Extension PrivacyMeter:设计和开发一个保护隐私的浏览器扩展
Pub Date : 2018-06-26 DOI: 10.1007/978-3-319-94496-8_6
Oleksii Starov, Nick Nikiforakis
{"title":"PrivacyMeter: Designing and Developing a Privacy-Preserving Browser Extension","authors":"Oleksii Starov, Nick Nikiforakis","doi":"10.1007/978-3-319-94496-8_6","DOIUrl":"https://doi.org/10.1007/978-3-319-94496-8_6","url":null,"abstract":"","PeriodicalId":273207,"journal":{"name":"Engineering Secure Software and Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114365054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
期刊
Engineering Secure Software and Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1