researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
Links
Filter by Year
OR
AND
NOT
1
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
Filter by Tag
[+]
OR
AND
NOT
1
Java
Meta-Environment
access control
access control policies
analysis
architecture
constraints
data-flow
data-flow programming
design
e-science
meta-model
protocol
refinement
rule-based
security
software engineering
systematic-approach
testing
web applications
Filter by Author
[+]
OR
AND
NOT
1
Achim D. Brucker
Alexander Pretschner
Awais Rashid
Bert Lagaisse
Christian Hammer
David A. Basin
David Aspinall 0001
Eric Bodden
Fabio Massacci
Frank Piessens
Holger Schmidt
Jacques Klein
James Walden
Jasper Bogaerts
Joachim Posegga
Jonathan P. Bowen
Karsten Sohr
Martín Ochoa
Wouter Joosen
Yves Le Traon
Filter by Top terms
[+]
OR
AND
NOT
1
access
analysis
applications
approach
control
engineering
essos
idea
international
model
policies
privacy
proceedings
secure
security
software
symposium
systems
towards
web
ESSoS (ESSoS)
Editions
Publications
Viewing Publication 1 - 100 from 204
2018
A Vision for Enhancing Security of Cryptography in Executables
Otto Brechelmacher
,
Willibald Krenn
,
Thorsten Tarrach
.
ESSoS 2018
:
1-8
[doi]
Security Analysis of Drone Communication Protocols
Christian Bunse
,
Sebastian Plotz
.
ESSoS 2018
:
96-107
[doi]
Enforcing Full-Stack Memory-Safety in Cyber-Physical Systems
Eyasu Getahun Chekole
,
Sudipta Chattopadhyay
,
Martín Ochoa
,
Huaqun Guo
.
ESSoS 2018
:
9-26
[doi]
Idea: Benchmarking Android Data Leak Detection Tools
Claudio Corrodi
,
Timo Spring
,
Mohammad Ghafari
,
Oscar Nierstrasz
.
ESSoS 2018
:
116-123
[doi]
Model Checking the Information Flow Security of Real-Time Systems
Christopher Gerking
,
David Schubert
,
Eric Bodden
.
ESSoS 2018
:
27-43
[doi]
Off-Limits: Abusing Legacy x86 Memory Segmentation to Spy on Enclaved Execution
Jago Gyselinck
,
Jo Van Bulck
,
Frank Piessens
,
Raoul Strackx
.
ESSoS 2018
:
44-60
[doi]
One Leak Is Enough to Expose Them All - From a WebRTC IP Leak to Web-Based Network Scanning
Mohammadreza Hazhirpasand
,
Mohammad Ghafari
.
ESSoS 2018
:
61-76
[doi]
Engineering Secure Software and Systems - 10th International Symposium, ESSoS 2018, Paris, France, June 26-27, 2018, Proceedings
Mathias Payer
,
Awais Rashid
,
Jose M. Such
, editors,
Volume 10953 of
Lecture Notes in Computer Science
, Springer,
2018.
[doi]
Idea: Visual Analytics for Web Security
Victor Le Pochat
,
Tom van Goethem
,
Wouter Joosen
.
ESSoS 2018
:
124-132
[doi]
Idea: Automatic Localization of Malicious Behaviors in Android Malware with Hidden Markov Models
Aleieldin Salem
,
Tabea Schmidt
,
Alexander Pretschner
.
ESSoS 2018
:
108-115
[doi]
PrivacyMeter: Designing and Developing a Privacy-Preserving Browser Extension
Oleksii Starov
,
Nick Nikiforakis
.
ESSoS 2018
:
77-95
[doi]
2017
Idea: A Unifying Theory for Evaluation Systems
Giampaolo Bella
,
Rosario Giustolisi
.
ESSoS 2017
:
231-239
[doi]
A Voucher-Based Security Middleware for Secure Business Process Outsourcing
Emad Heydari Beni
,
Bert Lagaisse
,
Ren Zhang
,
Danny De Cock
,
Filipe Beato
,
Wouter Joosen
.
ESSoS 2017
:
19-35
[doi]
Engineering Secure Software and Systems - 9th International Symposium, ESSoS 2017, Bonn, Germany, July 3-5, 2017, Proceedings
Eric Bodden
,
Mathias Payer
,
Elias Athanasopoulos
, editors,
Volume 10379 of
Lecture Notes in Computer Science
, Springer,
2017.
[doi]
SEQUOIA: Scalable Policy-Based Access Control for Search Operations in Data-Driven Applications
Jasper Bogaerts
,
Bert Lagaisse
,
Wouter Joosen
.
ESSoS 2017
:
1-18
[doi]
JTR: A Binary Solution for Switch-Case Recovery
Lucian Cojocar
,
Taddeus Kroes
,
Herbert Bos
.
ESSoS 2017
:
177-195
[doi]
KASLR is Dead: Long Live KASLR
Daniel Gruss
,
Moritz Lipp
,
Michael Schwarz
,
Richard Fellner
,
Clémentine Maurice
,
Stefan Mangard
.
ESSoS 2017
:
161-176
[doi]
Exploring the Relationship Between Architecture Coupling and Software Vulnerabilities
Robert Lagerström
,
Carliss Y. Baldwin
,
Alan MacCormack
,
Daniel J. Sturtevant
,
Lee Doolan
.
ESSoS 2017
:
53-69
[doi]
FPRandom: Randomizing Core Browser Objects to Break Advanced Device Fingerprinting Techniques
Pierre Laperdrix
,
Benoit Baudry
,
Vikas Mishra
.
ESSoS 2017
:
97-114
[doi]
LASARUS: Lightweight Attack Surface Reduction for Legacy Industrial Control Systems
Anhtuan Le
,
Utz Roedig
,
Awais Rashid
.
ESSoS 2017
:
36-52
[doi]
A Systematic Study of Cache Side Channels Across AES Implementations
Heiko Mantel
,
Alexandra Weber
,
Boris Köpf
.
ESSoS 2017
:
213-230
[doi]
A Formal Approach to Exploiting Multi-stage Attacks Based on File-System Vulnerabilities of Web Applications
Federico De Meo
,
Luca Viganò 0001
.
ESSoS 2017
:
196-212
[doi]
Defeating Zombie Gadgets by Re-randomizing Code upon Disclosure
Micah Morton
,
Hyungjoon Koo
,
Forrest Li
,
Kevin Z. Snow
,
Michalis Polychronakis
,
Fabian Monrose
.
ESSoS 2017
:
143-160
[doi]
Natural Language Insights from Code Reviews that Missed a Vulnerability - A Large Scale Study of Chromium
Nuthan Munaiah
,
Benjamin S. Meyers
,
Cecilia Ovesdotter Alm
,
Andrew Meneely
,
Pradeep K. Murukannaiah
,
Emily Prud'hommeaux
,
Josephine Wolff
,
Yang Yu
.
ESSoS 2017
:
70-86
[doi]
Idea-Caution Before Exploitation: The Use of Cybersecurity Domain Knowledge to Educate Software Engineers Against Software Vulnerabilities
Tayyaba Nafees
,
Natalie Coull
,
Robert Ian Ferguson
,
Adam Sampson
.
ESSoS 2017
:
133-142
[doi]
Control What You Include! - Server-Side Protection Against Third Party Web Tracking
Dolière Francis Somé
,
Nataliia Bielova
,
Tamara Rezk
.
ESSoS 2017
:
115-132
[doi]
Idea: Optimized Automatic Sanitizer Placement
Gebrehiwet Biyane Welearegai
,
Christian Hammer
.
ESSoS 2017
:
87-96
[doi]
2016
Proceedings of the 1st International Workshop on Innovations in Mobile Privacy and Security, IMPS 2016, co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2016), London, UK, April 6, 2016
David Aspinall 0001
,
Lorenzo Cavallaro
,
Mohamed Nassim Seghir
,
Melanie Volkamer
, editors,
Volume 1575 of
CEUR Workshop Proceedings
, CEUR-WS.org,
2016.
[doi]
Inferring Semantic Mapping Between Policies and Code: The Clue is in the Language
Pauline Anthonysamy
,
Matthew John Edwards
,
Chris Weichel
,
Awais Rashid
.
ESSoS 2016
:
233-250
[doi]
Towards Automated Android App Collusion Detection
Irina Mariuca Asavoae
,
Jorge Blasco
,
Thomas M. Chen
,
Harsha Kumara Kalutarage
,
Igor Muttik
,
Hoang Nga Nguyen
,
Markus Roggenbach
,
Siraj Ahmed Shaikh
.
ESSoS 2016
:
29-37
[doi]
Whack-A-Mole Security: Incentivising the Production, Delivery and Installation of Security Updates (invited paper)
Alastair R. Beresford
.
ESSoS 2016
:
9-10
[doi]
Automatically Extracting Threats from Extended Data Flow Diagrams
Bernhard J. Berger
,
Karsten Sohr
,
Rainer Koschke
.
ESSoS 2016
:
56-71
[doi]
Idea: Supporting Policy-Based Access Control on Database Systems
Jasper Bogaerts
,
Bert Lagaisse
,
Wouter Joosen
.
ESSoS 2016
:
251-259
[doi]
On the Static Analysis of Hybrid Mobile Apps - A Report on the State of Apache Cordova Nation
Achim D. Brucker
,
Michael Herzberg
.
ESSoS 2016
:
72-88
[doi]
Engineering Secure Software and Systems - 8th International Symposium, ESSoS 2016, London, UK, April 6-8, 2016. Proceedings
Juan Caballero
,
Eric Bodden
,
Elias Athanasopoulos
, editors,
Volume 9639 of
Lecture Notes in Computer Science
, Springer,
2016.
[doi]
Explaining Unwanted Behaviours in Context
Wei Chen
,
David Aspinall 0001
,
Andrew D. Gordon
,
Charles A. Sutton
,
Igor Muttik
.
ESSoS 2016
:
38-45
[doi]
ARTDroid: A Virtual-Method Hooking Framework on Android ART Runtime
Valerio Costamagna
,
Cong Zheng
.
ESSoS 2016
:
20-28
[doi]
On the Security Cost of Using a Free and Open Source Component in a Proprietary Product
Stanislav Dashevskyi
,
Achim D. Brucker
,
Fabio Massacci
.
ESSoS 2016
:
190-206
[doi]
Security Testing Beyond Functional Tests
Mohammad Torabi Dashti
,
David A. Basin
.
ESSoS 2016
:
1-19
[doi]
POODLEs, More POODLEs, FREAK Attacks Too: How Server Administrators Responded to Three Serious Web Vulnerabilities
Benjamin Fogel
,
Shane Farmer
,
Hamza Alkofahi
,
Anthony Skjellum
,
Munawar Hafiz
.
ESSoS 2016
:
122-137
[doi]
Analyzing the Gadgets - Towards a Metric to Measure Gadget Quality
Andreas Follner
,
Alexandre Bartel
,
Eric Bodden
.
ESSoS 2016
:
155-172
[doi]
PhoneWrap - Injecting the "How Often" into Mobile Apps
Daniel Franzen
,
David Aspinall 0001
.
ESSoS 2016
:
11-19
[doi]
Semantics-Based Repackaging Detection for Mobile Apps
Quanlong Guan
,
Heqing Huang
,
Weiqi Luo
,
Sencun Zhu
.
ESSoS 2016
:
89-105
[doi]
AppPAL for Android - Capturing and Checking Mobile App Policies
Joseph Hallett
,
David Aspinall 0001
.
ESSoS 2016
:
216-232
[doi]
Sound and Precise Cross-Layer Data Flow Tracking
Enrico Lovat
,
Martín Ochoa
,
Alexander Pretschner
.
ESSoS 2016
:
38-55
[doi]
Privacy Friendly Apps - Making Developers Aware of Privacy Violations
Karola Marky
,
Andreas Gutmann
,
Philipp Rack
,
Melanie Volkamer
.
ESSoS 2016
:
46-48
[doi]
Idea: Enforcing Security Properties by Solving Behavioural Equations
Eric Rothstein Morris
,
Joachim Posegga
.
ESSoS 2016
:
260-268
[doi]
HexPADS: A Platform to Detect "Stealth" Attacks
Mathias Payer
.
ESSoS 2016
:
138-154
[doi]
Progress-Sensitive Security for SPARK
Willard Rafnsson
,
Deepak Garg 0001
,
Andrei Sabelfeld
.
ESSoS 2016
:
20-37
[doi]
Reverse Engineering Android Apps With CodeInspect (invited paper)
Siegfried Rasthofer
,
Steven Arzt
,
Marc Miltenberger
,
Eric Bodden
.
ESSoS 2016
:
1-8
[doi]
Idea: Usable Platforms for Secure Programming - Mining Unix for Insight and Guidelines
Sven Türpe
.
ESSoS 2016
:
207-215
[doi]
Accelerometer-Based Device Fingerprinting for Multi-factor Mobile Authentication
Tom van Goethem
,
Wout Scheepers
,
Davy Preuveneers
,
Wouter Joosen
.
ESSoS 2016
:
106-121
[doi]
Early Report: How to Improve Programmers' Expertise at App Security?
Charles Weir
,
Awais Rashid
,
James Noble
.
ESSoS 2016
:
49-50
[doi]
Empirical Analysis and Modeling of Black-Box Mutational Fuzzing
Mingyi Zhao
,
Peng Liu 0005
.
ESSoS 2016
:
173-189
[doi]
2015
Are Your Training Datasets Yet Relevant? - An Investigation into the Importance of Timeline in Machine Learning-Based Malware Detection
Kevin Allix
,
Tegawendé F. Bissyandé
,
Jacques Klein
,
Yves Le Traon
.
ESSoS 2015
:
51-67
[doi]
The Heavy Tails of Vulnerability Exploitation
Luca Allodi
.
ESSoS 2015
:
133-148
[doi]
Idea: Benchmarking Indistinguishability Obfuscation - A Candidate Implementation
Sebastian Banescu
,
Martín Ochoa
,
Nils Kunze
,
Alexander Pretschner
.
ESSoS 2015
:
149-156
[doi]
Formal Verification of Liferay RBAC
Stefano Calzavara
,
Alvise Rabitti
,
Michele Bugliesi
.
ESSoS 2015
:
1-16
[doi]
Improving Reuse of Attribute-Based Access Control Policies Using Policy Templates
Maarten Decat
,
Jasper Moeys
,
Bert Lagaisse
,
Wouter Joosen
.
ESSoS 2015
:
196-210
[doi]
OMEN: Faster Password Guessing Using an Ordered Markov Enumerator
Markus Dürmuth
,
Fabian Angelstorf
,
Claude Castelluccia
,
Daniele Perito
,
Chaabane Abdelberi
.
ESSoS 2015
:
119-132
[doi]
Formal Verification of Privacy Properties in Electric Vehicle Charging
Marouane Fazouane
,
Henning Kopp
,
Rens Wouter van der Heijden
,
Daniel Le Métayer
,
Frank Kargl
.
ESSoS 2015
:
17-33
[doi]
Monitoring Database Access Constraints with an RBAC Metamodel: A Feasibility Study
Lars Hamann
,
Karsten Sohr
,
Martin Gogolla
.
ESSoS 2015
:
211-226
[doi]
Idea: Optimising Multi-Cloud Deployments with Security Controls as Constraints
Philippe Massonet
,
Jesus Luna
,
Alain Pannetrat
,
Rubén Trapero
.
ESSoS 2015
:
102-110
[doi]
Producing Hook Placements to Enforce Expected Access Control Policies
Divya Muthukumaran
,
Nirupama Talele
,
Trent Jaeger
,
Gang Tan
.
ESSoS 2015
:
178-195
[doi]
Re-thinking Kernelized MLS Database Architectures in the Context of Cloud-Scale Data Stores
Thuy D. Nguyen
,
Mark Gondree
,
Jean Khosalim
,
Cynthia E. Irvine
.
ESSoS 2015
:
86-101
[doi]
Idea: Unwinding Based Model-Checking and Testing for Non-Interference on EFSMs
Martín Ochoa
,
Jorge Cuéllar
,
Alexander Pretschner
,
Per Hallgren
.
ESSoS 2015
:
34-42
[doi]
Learning How to Prevent Return-Oriented Programming Efficiently
David Pfaff
,
Sebastian Hack
,
Christian Hammer
.
ESSoS 2015
:
68-85
[doi]
Engineering Secure Software and Systems - 7th International Symposium, ESSoS 2015, Milan, Italy, March 4-6, 2015. Proceedings
Frank Piessens
,
Juan Caballero
,
Nataliia Bielova
, editors,
Volume 8978 of
Lecture Notes in Computer Science
, Springer,
2015.
[doi]
A Security Ontology for Security Requirements Elicitation
Amina Souag
,
Camille Salinesi
,
Raúl Mazo
,
Isabelle Comyn-Wattiau
.
ESSoS 2015
:
157-177
[doi]
Idea: State-Continuous Transfer of State in Protected-Module Architectures
Raoul Strackx
,
Niels Lambrigts
.
ESSoS 2015
:
43-50
[doi]
Idea: Towards an Inverted Cloud
Raoul Strackx
,
Pieter Philippaerts
,
Frédéric Vogels
.
ESSoS 2015
:
111-118
[doi]
2014
Security (Hyper-)properties in Workflow Systems: From Specification to Verification
Thomas Bauereiss
,
Dieter Hutter
.
ESSoS 2014
:
[doi]
Idea: Embedded Fault Injection Simulator on Smartcard
Maël Berthier
,
Julien Bringer
,
Hervé Chabanne
,
Thanh-Ha Le
,
Lionel Rivière
,
Victor Servant
.
ESSoS 2014
:
222-229
[doi]
Idea: Towards a Vision of Engineering Controlled Interaction Execution for Information Services
Joachim Biskup
,
Cornelia Tadros
.
ESSoS 2014
:
35-44
[doi]
Improving Manageability of Access Control Policies
Jasper Bogaerts
,
Bert Lagaisse
.
ESSoS 2014
:
[doi]
Automatic and Robust Client-Side Protection for Cookie-Based Sessions
Michele Bugliesi
,
Stefano Calzavara
,
Riccardo Focardi
,
Wilayat Khan
.
ESSoS 2014
:
161-178
[doi]
Automated Formal Verification of Application-specific Security Properties
Piergiuseppe Bettassa Copet
,
Riccardo Sisto
.
ESSoS 2014
:
45-59
[doi]
On the Relation between Redactable and Sanitizable Signature Schemes
Hermann de Meer
,
Henrich Christopher Pöhls
,
Joachim Posegga
,
Kai Samelin
.
ESSoS 2014
:
113-130
[doi]
Security@Runtime: A Flexible MDE Approach to Enforce Fine-grained Security Policies
Yehia Elrakaiby
,
Moussa Amrani
,
Yves Le Traon
.
ESSoS 2014
:
19-34
[doi]
Idea: Security Engineering Principles for Day Two Car2X Applications
Sibylle B. Fröschle
,
Alexander Stühring
.
ESSoS 2014
:
213-221
[doi]
User-Centric Security Assessment of Software Configurations: A Case Study
Hamza Ghani
,
Jesus Luna Garcia
,
Ivaylo Petkov
,
Neeraj Suri
.
ESSoS 2014
:
196-212
[doi]
Towards an Authorization Framework for App Security Checking
Joseph Hallett
,
David Aspinall
.
ESSoS 2014
:
[doi]
A Modeling and Formal Approach for the Precise Specification of Security Patterns
Brahim Hamid
,
Christian Percebois
.
ESSoS 2014
:
95-112
[doi]
Detecting Code Reuse Attacks with a Model of Conformant Program Execution
Emily R. Jacobson
,
Andrew R. Bernat
,
William R. Williams
,
Barton P. Miller
.
ESSoS 2014
:
1-18
[doi]
Proceedings of the 2014 ESSoS Doctoral Symposium co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2014), Munich, Germany, February 26, 2014
Wouter Joosen
,
Fabio Martinelli
,
Thomas Heyman
, editors,
Volume 1298 of
CEUR Workshop Proceedings
, CEUR-WS.org,
2014.
[doi]
Engineering Secure Software and Systems - 6th International Symposium, ESSoS 2014, Munich, Germany, February 26-28, 2014, Proceedings
Jan Jürjens
,
Frank Piessens
,
Nataliia Bielova
, editors,
Volume 8364 of
Lecture Notes in Computer Science
, Springer,
2014.
[doi]
Evaluation of Adaptive Attacker Models
Leanid Krautsevich
,
Artsiom Yautsiukhin
.
ESSoS 2014
:
[doi]
Model-Based Policy Derivation for Usage Control Enforcement
Prachi Kumari
.
ESSoS 2014
:
[doi]
An Architecture for the Analysis and Management of Security in Industrial Control Systems
Laurens Lemaire
,
Jorn Lapon
,
Vincent Naessens
.
ESSoS 2014
:
[doi]
Detecting Privacy Leaks in Android Apps
Li Li
,
Alexandre Bartel
,
Jacques Klein
,
Yves Le Traon
.
ESSoS 2014
:
[doi]
Cross-Layer Data-Centric Usage Control
Enrico Lovat
.
ESSoS 2014
:
[doi]
Architectures for Inlining Security Monitors in Web Applications
Jonas Magazinius
,
Daniel Hedin
,
Andrei Sabelfeld
.
ESSoS 2014
:
141-160
[doi]
Enforcing Mobile Application Security Through Probabilistic Contracts
Fabio Martinelli
,
Ilaria Matteucci
,
Andrea Saracino
,
Daniele Sgandurra
.
ESSoS 2014
:
[doi]
Quantitative Security Analysis for Programs with Low Input and Noisy Output
Tri Minh Ngo
,
Marieke Huisman
.
ESSoS 2014
:
77-94
[doi]
Enforcing Privacy in Decentralized Mobile Social Networks
Hiep H. Nguyen
,
Abdessamad Imine
,
Michaël Rusinowitch
.
ESSoS 2014
:
[doi]
Modeling, Composing, and Testing of Security Concerns in a Model-Driven Security Approach
Phu Hong Nguyen
,
Jacques Klein
,
Yves Le Traon
.
ESSoS 2014
:
[doi]
The Privacy Issue for Pseudonymized Customers in the Smart Grid
Hartmut Richthammer
.
ESSoS 2014
:
[doi]
Fault-Tolerant Non-interference
Filippo Del Tedesco
,
Alejandro Russo
,
David Sands
.
ESSoS 2014
:
60-76
[doi]
Towards a Reference Architecture for Access Control in Distributed Web Applications
Worachet Uttha
,
Clara Bertolissi
,
Silvio Ranise
.
ESSoS 2014
:
[doi]
Security Testing of GSM Implementations
Fabian van den Broek
,
Brinio Hond
,
Arturo Cedillo Torres
.
ESSoS 2014
:
179-195
[doi]
Sign in
or
sign up
to see more results.