Journal: it - Information Technology

Volume 59, Issue 2

57 -- 0Konrad Rieck. Vulnerability analysis
59 -- 0Collin Mulliner, William K. Robertson, Engin Kirda. On the misuse of graphical user interface elements to implement security controls
67 -- 0Sai Prashanth Chandramouli, Ziming Zhao, Adam Doupé, Gail-Joon Ahn. E-mail Header Injection Vulnerabilities
73 -- 0Christian Wressnegger, Fabian Yamaguchi, Alwin Maier, Konrad Rieck. 64-Bit Migration Vulnerabilities
83 -- 0Jannik Pewny, Behrad Garmany, Robert Gawlik, Christian Rossow, Thorsten Holz. Cross-architecture bug search in binary executables
93 -- 0Sergey Bratus, Anna Shubina. Exploitation as code reuse: On the need of formalization
101 -- 0Fabian Yamaguchi. Pattern-based methods for vulnerability discovery