Pub Date : 2014-02-26DOI: 10.1007/978-3-319-04897-0_15
Maël Berthier, J. Bringer, H. Chabanne, Thanh-Ha Le, L. Rivière, V. Servant
{"title":"Idea: Embedded Fault Injection Simulator on Smartcard","authors":"Maël Berthier, J. Bringer, H. Chabanne, Thanh-Ha Le, L. Rivière, V. Servant","doi":"10.1007/978-3-319-04897-0_15","DOIUrl":"https://doi.org/10.1007/978-3-319-04897-0_15","url":null,"abstract":"","PeriodicalId":273207,"journal":{"name":"Engineering Secure Software and Systems","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124004566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-02-27DOI: 10.1007/978-3-642-36563-8_12
M. Archer, Elizabeth I. Leonard, C. Heitmeyer
{"title":"Idea: Writing Secure C Programs with SecProve","authors":"M. Archer, Elizabeth I. Leonard, C. Heitmeyer","doi":"10.1007/978-3-642-36563-8_12","DOIUrl":"https://doi.org/10.1007/978-3-642-36563-8_12","url":null,"abstract":"","PeriodicalId":273207,"journal":{"name":"Engineering Secure Software and Systems","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131789578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-02-27DOI: 10.1007/978-3-642-36563-8_10
Jean-Baptiste Jeannin, Guido de Caso, Juan Chen, Y. Gurevich, P. Naldurg, N. Swamy
{"title":"dkal ⋆ : Constructing Executable Specifications of Authorization Protocols","authors":"Jean-Baptiste Jeannin, Guido de Caso, Juan Chen, Y. Gurevich, P. Naldurg, N. Swamy","doi":"10.1007/978-3-642-36563-8_10","DOIUrl":"https://doi.org/10.1007/978-3-642-36563-8_10","url":null,"abstract":"","PeriodicalId":273207,"journal":{"name":"Engineering Secure Software and Systems","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114379195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-02-27DOI: 10.1007/978-3-642-36563-8_5
Prachi Kumari, A. Pretschner
{"title":"Model-Based Usage Control Policy Derivation","authors":"Prachi Kumari, A. Pretschner","doi":"10.1007/978-3-642-36563-8_5","DOIUrl":"https://doi.org/10.1007/978-3-642-36563-8_5","url":null,"abstract":"","PeriodicalId":273207,"journal":{"name":"Engineering Secure Software and Systems","volume":"216 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122385719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-02-27DOI: 10.1007/978-3-642-36563-8_13
V. Kotov, F. Massacci
{"title":"Anatomy of Exploit Kits - Preliminary Analysis of Exploit Kits as Software Artefacts","authors":"V. Kotov, F. Massacci","doi":"10.1007/978-3-642-36563-8_13","DOIUrl":"https://doi.org/10.1007/978-3-642-36563-8_13","url":null,"abstract":"","PeriodicalId":273207,"journal":{"name":"Engineering Secure Software and Systems","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127624750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-02-27DOI: 10.1007/978-3-642-36563-8_2
Nirupama Talele, Jason Teutsch, T. Jaeger, R. Erbacher
{"title":"Using Security Policies to Automate Placement of Network Intrusion Prevention","authors":"Nirupama Talele, Jason Teutsch, T. Jaeger, R. Erbacher","doi":"10.1007/978-3-642-36563-8_2","DOIUrl":"https://doi.org/10.1007/978-3-642-36563-8_2","url":null,"abstract":"","PeriodicalId":273207,"journal":{"name":"Engineering Secure Software and Systems","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126143144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-02-27DOI: 10.1007/978-3-642-36563-8_4
Michael J. May, K. Bhargavan
{"title":"Towards Unified Authorization for Android","authors":"Michael J. May, K. Bhargavan","doi":"10.1007/978-3-642-36563-8_4","DOIUrl":"https://doi.org/10.1007/978-3-642-36563-8_4","url":null,"abstract":"","PeriodicalId":273207,"journal":{"name":"Engineering Secure Software and Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130014887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-02-27DOI: 10.1007/978-3-642-36563-8_14
A. Edmundson, B. Holtkamp, E. Rivera, Matthew Finifter, A. Mettler, D. Wagner
{"title":"An Empirical Study on the Effectiveness of Security Code Review","authors":"A. Edmundson, B. Holtkamp, E. Rivera, Matthew Finifter, A. Mettler, D. Wagner","doi":"10.1007/978-3-642-36563-8_14","DOIUrl":"https://doi.org/10.1007/978-3-642-36563-8_14","url":null,"abstract":"","PeriodicalId":273207,"journal":{"name":"Engineering Secure Software and Systems","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116438576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-02-27DOI: 10.1007/978-3-642-36563-8_15
Bojan Simic, J. Walden
{"title":"Eliminating SQL Injection and Cross Site Scripting Using Aspect Oriented Programming","authors":"Bojan Simic, J. Walden","doi":"10.1007/978-3-642-36563-8_15","DOIUrl":"https://doi.org/10.1007/978-3-642-36563-8_15","url":null,"abstract":"","PeriodicalId":273207,"journal":{"name":"Engineering Secure Software and Systems","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114152294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}