Pub Date : 2016-04-06DOI: 10.1007/978-3-319-30806-7_9
Mathias Payer
{"title":"HexPADS: A Platform to Detect \"Stealth\" Attacks","authors":"Mathias Payer","doi":"10.1007/978-3-319-30806-7_9","DOIUrl":"https://doi.org/10.1007/978-3-319-30806-7_9","url":null,"abstract":"","PeriodicalId":273207,"journal":{"name":"Engineering Secure Software and Systems","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129286910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-04-06DOI: 10.1007/978-3-319-30806-7_5
Achim D. Brucker, M. Herzberg
{"title":"On the Static Analysis of Hybrid Mobile Apps - A Report on the State of Apache Cordova Nation","authors":"Achim D. Brucker, M. Herzberg","doi":"10.1007/978-3-319-30806-7_5","DOIUrl":"https://doi.org/10.1007/978-3-319-30806-7_5","url":null,"abstract":"","PeriodicalId":273207,"journal":{"name":"Engineering Secure Software and Systems","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131478396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-04-06DOI: 10.1007/978-3-319-30806-7_2
Willard Rafnsson, D. Garg, A. Sabelfeld
{"title":"Progress-Sensitive Security for SPARK","authors":"Willard Rafnsson, D. Garg, A. Sabelfeld","doi":"10.1007/978-3-319-30806-7_2","DOIUrl":"https://doi.org/10.1007/978-3-319-30806-7_2","url":null,"abstract":"","PeriodicalId":273207,"journal":{"name":"Engineering Secure Software and Systems","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133130171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-04-06DOI: 10.1007/978-3-319-30806-7_15
Pauline Anthonysamy, M. Edwards, Christian Weichel, A. Rashid
{"title":"Inferring Semantic Mapping Between Policies and Code: The Clue is in the Language","authors":"Pauline Anthonysamy, M. Edwards, Christian Weichel, A. Rashid","doi":"10.1007/978-3-319-30806-7_15","DOIUrl":"https://doi.org/10.1007/978-3-319-30806-7_15","url":null,"abstract":"","PeriodicalId":273207,"journal":{"name":"Engineering Secure Software and Systems","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133441227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-04-06DOI: 10.1007/978-3-319-30806-7_3
Enrico Lovat, Martín Ochoa, A. Pretschner
{"title":"Sound and Precise Cross-Layer Data Flow Tracking","authors":"Enrico Lovat, Martín Ochoa, A. Pretschner","doi":"10.1007/978-3-319-30806-7_3","DOIUrl":"https://doi.org/10.1007/978-3-319-30806-7_3","url":null,"abstract":"","PeriodicalId":273207,"journal":{"name":"Engineering Secure Software and Systems","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128616844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-04-06DOI: 10.1007/978-3-319-30806-7_16
J. Bogaerts, B. Lagaisse, W. Joosen
{"title":"Idea: Supporting Policy-Based Access Control on Database Systems","authors":"J. Bogaerts, B. Lagaisse, W. Joosen","doi":"10.1007/978-3-319-30806-7_16","DOIUrl":"https://doi.org/10.1007/978-3-319-30806-7_16","url":null,"abstract":"","PeriodicalId":273207,"journal":{"name":"Engineering Secure Software and Systems","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123040670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-04-06DOI: 10.1007/978-3-319-30806-7_8
Benjamin N. Fogel, Shane Farmer, Hamza Alkofahi, A. Skjellum, M. Hafiz
{"title":"POODLEs, More POODLEs, FREAK Attacks Too: How Server Administrators Responded to Three Serious Web Vulnerabilities","authors":"Benjamin N. Fogel, Shane Farmer, Hamza Alkofahi, A. Skjellum, M. Hafiz","doi":"10.1007/978-3-319-30806-7_8","DOIUrl":"https://doi.org/10.1007/978-3-319-30806-7_8","url":null,"abstract":"","PeriodicalId":273207,"journal":{"name":"Engineering Secure Software and Systems","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115053634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}