Pub Date : 2017-07-03DOI: 10.1007/978-3-319-62105-0_2
Emad Heydari Beni, B. Lagaisse, Ren Zhang, D. D. Cock, Filipe Beato, W. Joosen
{"title":"A Voucher-Based Security Middleware for Secure Business Process Outsourcing","authors":"Emad Heydari Beni, B. Lagaisse, Ren Zhang, D. D. Cock, Filipe Beato, W. Joosen","doi":"10.1007/978-3-319-62105-0_2","DOIUrl":"https://doi.org/10.1007/978-3-319-62105-0_2","url":null,"abstract":"","PeriodicalId":273207,"journal":{"name":"Engineering Secure Software and Systems","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122081157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-07-03DOI: 10.1007/978-3-319-62105-0_5
Nuthan Munaiah, Benjamin S. Meyers, Cecilia Ovesdotter Alm, Andrew Meneely, Pradeep K. Murukannaiah, Emily Tucker Prud'hommeaux, Josephine Wolff, Yang Yu
{"title":"Natural Language Insights from Code Reviews that Missed a Vulnerability - A Large Scale Study of Chromium","authors":"Nuthan Munaiah, Benjamin S. Meyers, Cecilia Ovesdotter Alm, Andrew Meneely, Pradeep K. Murukannaiah, Emily Tucker Prud'hommeaux, Josephine Wolff, Yang Yu","doi":"10.1007/978-3-319-62105-0_5","DOIUrl":"https://doi.org/10.1007/978-3-319-62105-0_5","url":null,"abstract":"","PeriodicalId":273207,"journal":{"name":"Engineering Secure Software and Systems","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124480138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-03-21DOI: 10.1007/978-3-319-62105-0_4
Robert Lagerström, Carliss Y. Baldwin, Alan MacCormack, Daniel J. Sturtevant, L. Doolan
{"title":"Exploring the Relationship Between Architecture Coupling and Software Vulnerabilities","authors":"Robert Lagerström, Carliss Y. Baldwin, Alan MacCormack, Daniel J. Sturtevant, L. Doolan","doi":"10.1007/978-3-319-62105-0_4","DOIUrl":"https://doi.org/10.1007/978-3-319-62105-0_4","url":null,"abstract":"","PeriodicalId":273207,"journal":{"name":"Engineering Secure Software and Systems","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132133410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-04-06DOI: 10.1007/978-3-319-30806-7_14
Joseph Hallett, David Aspinall
{"title":"AppPAL for Android - Capturing and Checking Mobile App Policies","authors":"Joseph Hallett, David Aspinall","doi":"10.1007/978-3-319-30806-7_14","DOIUrl":"https://doi.org/10.1007/978-3-319-30806-7_14","url":null,"abstract":"","PeriodicalId":273207,"journal":{"name":"Engineering Secure Software and Systems","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121583667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-04-06DOI: 10.1007/978-3-319-30806-7_4
Bernhard J. Berger, K. Sohr, R. Koschke
{"title":"Automatically Extracting Threats from Extended Data Flow Diagrams","authors":"Bernhard J. Berger, K. Sohr, R. Koschke","doi":"10.1007/978-3-319-30806-7_4","DOIUrl":"https://doi.org/10.1007/978-3-319-30806-7_4","url":null,"abstract":"","PeriodicalId":273207,"journal":{"name":"Engineering Secure Software and Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124523265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-04-06DOI: 10.1007/978-3-319-30806-7_13
Sven Türpe
{"title":"Idea: Usable Platforms for Secure Programming - Mining Unix for Insight and Guidelines","authors":"Sven Türpe","doi":"10.1007/978-3-319-30806-7_13","DOIUrl":"https://doi.org/10.1007/978-3-319-30806-7_13","url":null,"abstract":"","PeriodicalId":273207,"journal":{"name":"Engineering Secure Software and Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116088653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-04-06DOI: 10.1007/978-3-319-30806-7_10
Andreas Follner, Alexandre Bartel, E. Bodden
{"title":"Analyzing the Gadgets - Towards a Metric to Measure Gadget Quality","authors":"Andreas Follner, Alexandre Bartel, E. Bodden","doi":"10.1007/978-3-319-30806-7_10","DOIUrl":"https://doi.org/10.1007/978-3-319-30806-7_10","url":null,"abstract":"","PeriodicalId":273207,"journal":{"name":"Engineering Secure Software and Systems","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126863800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-04-06DOI: 10.1007/978-3-319-30806-7_7
Tom van Goethem, Wout Scheepers, D. Preuveneers, W. Joosen
{"title":"Accelerometer-Based Device Fingerprinting for Multi-factor Mobile Authentication","authors":"Tom van Goethem, Wout Scheepers, D. Preuveneers, W. Joosen","doi":"10.1007/978-3-319-30806-7_7","DOIUrl":"https://doi.org/10.1007/978-3-319-30806-7_7","url":null,"abstract":"","PeriodicalId":273207,"journal":{"name":"Engineering Secure Software and Systems","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122212692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-04-06DOI: 10.1007/978-3-319-30806-7_12
Stanislav Dashevskyi, Achim D. Brucker, F. Massacci
{"title":"On the Security Cost of Using a Free and Open Source Component in a Proprietary Product","authors":"Stanislav Dashevskyi, Achim D. Brucker, F. Massacci","doi":"10.1007/978-3-319-30806-7_12","DOIUrl":"https://doi.org/10.1007/978-3-319-30806-7_12","url":null,"abstract":"","PeriodicalId":273207,"journal":{"name":"Engineering Secure Software and Systems","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127982633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}