𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Engineering Secure Software and Systems

✍ Scribed by Mathias Payer, Awais Rashid, Jose M. Such


Publisher
Springer International Publishing
Year
2018
Tongue
English
Leaves
143
Series
Lecture Notes in Computer Science 10953
Edition
1st ed.
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


This book constitutes the refereed proceedings of the 10th International Symposium on Engineering Secure Software and Systems, ESSoS 2018, held in Paris, France, in June 2018. The 10 papers, consisting of 7 regular and 3 idea papers, were carefully reviewed and selected from 26 submissions. They focus on the construction of secure software, which is becoming an increasingly challenging task due to the complexity of modern applications, the growing sophistication of security requirements, the multitude of available software technologies, and the progress of attack vectors.

✦ Table of Contents


Front Matter ....Pages I-IX
A Vision for Enhancing Security of Cryptography in Executables (Otto Brechelmacher, Willibald Krenn, Thorsten Tarrach)....Pages 1-8
Enforcing Full-Stack Memory-Safety in Cyber-Physical Systems (Eyasu Getahun Chekole, Sudipta Chattopadhyay, MartΓ­n Ochoa, Guo Huaqun)....Pages 9-26
Model Checking the Information Flow Security of Real-Time Systems (Christopher Gerking, David Schubert, Eric Bodden)....Pages 27-43
Off-Limits: Abusing Legacy x86 Memory Segmentation to Spy on Enclaved Execution (Jago Gyselinck, Jo Van Bulck, Frank Piessens, Raoul Strackx)....Pages 44-60
One Leak Is Enough to Expose Them All (Mohammadreza Hazhirpasand, Mohammad Ghafari)....Pages 61-76
PrivacyMeter: Designing and Developing a Privacy-Preserving Browser Extension (Oleksii Starov, Nick Nikiforakis)....Pages 77-95
Security Analysis of Drone Communication Protocols (Christian Bunse, Sebastian Plotz)....Pages 96-107
Idea: Automatic Localization of Malicious Behaviors in Android Malware with Hidden Markov Models (Aleieldin Salem, Tabea Schmidt, Alexander Pretschner)....Pages 108-115
Idea: Benchmarking Android Data Leak Detection Tools (Claudio Corrodi, Timo Spring, Mohammad Ghafari, Oscar Nierstrasz)....Pages 116-123
Idea: Visual Analytics for Web Security (Victor Le Pochat, Tom Van Goethem, Wouter Joosen)....Pages 124-132
Back Matter ....Pages 133-133

✦ Subjects


Computer Science; Computer Communication Networks


πŸ“œ SIMILAR VOLUMES


Engineering safe and secure software sys
✍ C. Warren Axelrod πŸ“‚ Library πŸ“… 2012 πŸ› Artech House 🌐 English

This first-of-its-kind resource offers a broad and detailed understanding of software systems engineering from both security and safety perspectives. Addressing the overarching issues related to safeguarding public data and intellectual property, the book defines such terms as systems engineering, s

Security Chaos Engineering: Sustaining R
✍ Kelly Shortridge, Aaron Rinehart πŸ“‚ Library πŸ“… 2023 πŸ› O'Reilly Media 🌐 English

<p><span>Cybersecurity is broken. Year after year, attackers remain unchallenged and undeterred, while engineering teams feel pressure to design, build, and operate "secure" systems. Failure can't be prevented, mental models of systems are incomplete, and our digital world constantly evolves. How ca

Security Chaos Engineering: Sustaining R
✍ Kelly Shortridge, Aaron Rinehart πŸ“‚ Library πŸ“… 2023 πŸ› O'Reilly Media 🌐 English

<p><span>Cybersecurity is broken. Year after year, attackers remain unchallenged and undeterred, while engineering teams feel pressure to design, build, and operate "secure" systems. Failure can't be prevented, mental models of systems are incomplete, and our digital world constantly evolves. How ca

Security Chaos Engineering: Sustaining R
✍ Kelly Shortridge πŸ“‚ Library πŸ“… 2023 πŸ› O'Reilly Media 🌐 English

Cybersecurity is broken. Year after year, attackers remain unchallenged and undeterred, while engineering teams feel pressure to design, build, and operate "secure" systems. Failure can't be prevented, mental models of systems are incomplete, and our digital world constantly evolves. How can we veri

Security Chaos Engineering: Sustaining R
✍ Kelly Shortridge, Aaron Rinehart πŸ“‚ Library πŸ“… 2023 πŸ› O'Reilly Media 🌐 English

<p><span>Cybersecurity is broken. Year after year, attackers remain unchallenged and undeterred, while engineering teams feel pressure to design, build, and operate "secure" systems. Failure can't be prevented, mental models of systems are incomplete, and our digital world constantly evolves. How ca

Security Chaos Engineering: Sustaining R
✍ Kelly Shortridge, Aaron Rinehart πŸ“‚ Library πŸ› O'Reilly Media 🌐 English

<p><span>Cybersecurity is broken. Year after year, attackers remain unchallenged and undeterred, while engineering teams feel pressure to design, build, and operate "secure" systems. Failure can't be prevented, mental models of systems are incomplete, and our digital world constantly evolves. How ca