


default search action
9. ESSoS 2017: Bonn, Germany
- Eric Bodden, Mathias Payer, Elias Athanasopoulos:

Engineering Secure Software and Systems - 9th International Symposium, ESSoS 2017, Bonn, Germany, July 3-5, 2017, Proceedings. Lecture Notes in Computer Science 10379, Springer 2017, ISBN 978-3-319-62104-3 - Jasper Bogaerts, Bert Lagaisse

, Wouter Joosen:
SEQUOIA: Scalable Policy-Based Access Control for Search Operations in Data-Driven Applications. 1-18 - Emad Heydari Beni

, Bert Lagaisse
, Ren Zhang, Danny De Cock, Filipe Beato, Wouter Joosen:
A Voucher-Based Security Middleware for Secure Business Process Outsourcing. 19-35 - Anhtuan Le, Utz Roedig

, Awais Rashid
:
LASARUS: Lightweight Attack Surface Reduction for Legacy Industrial Control Systems. 36-52 - Robert Lagerström

, Carliss Y. Baldwin, Alan MacCormack, Daniel J. Sturtevant, Lee Doolan:
Exploring the Relationship Between Architecture Coupling and Software Vulnerabilities. 53-69 - Nuthan Munaiah, Benjamin S. Meyers, Cecilia Ovesdotter Alm

, Andrew Meneely, Pradeep K. Murukannaiah
, Emily Prud'hommeaux, Josephine Wolff, Yang Yu:
Natural Language Insights from Code Reviews that Missed a Vulnerability - A Large Scale Study of Chromium. 70-86 - Gebrehiwet Biyane Welearegai

, Christian Hammer
:
Idea: Optimized Automatic Sanitizer Placement. 87-96 - Pierre Laperdrix, Benoit Baudry, Vikas Mishra:

FPRandom: Randomizing Core Browser Objects to Break Advanced Device Fingerprinting Techniques. 97-114 - Dolière Francis Somé, Nataliia Bielova

, Tamara Rezk:
Control What You Include! - Server-Side Protection Against Third Party Web Tracking. 115-132 - Tayyaba Nafees, Natalie Coull

, Robert Ian Ferguson
, Adam T. Sampson:
Idea-Caution Before Exploitation: The Use of Cybersecurity Domain Knowledge to Educate Software Engineers Against Software Vulnerabilities. 133-142 - Micah Morton, Hyungjoon Koo

, Forrest Li, Kevin Z. Snow, Michalis Polychronakis, Fabian Monrose:
Defeating Zombie Gadgets by Re-randomizing Code upon Disclosure. 143-160 - Daniel Gruss

, Moritz Lipp, Michael Schwarz, Richard Fellner, Clémentine Maurice
, Stefan Mangard
:
KASLR is Dead: Long Live KASLR. 161-176 - Lucian Cojocar

, Taddeus Kroes
, Herbert Bos
:
JTR: A Binary Solution for Switch-Case Recovery. 177-195 - Federico De Meo, Luca Viganò:

A Formal Approach to Exploiting Multi-stage Attacks Based on File-System Vulnerabilities of Web Applications. 196-212 - Heiko Mantel, Alexandra Weber, Boris Köpf:

A Systematic Study of Cache Side Channels Across AES Implementations. 213-230 - Giampaolo Bella

, Rosario Giustolisi
:
Idea: A Unifying Theory for Evaluation Systems. 231-239

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














