This first-of-its-kind resource offers a broad and detailed understanding of software systems engineering from both security and safety perspectives. Addressing the overarching issues related to safeguarding public data and intellectual property, the book defines such terms as systems engineering, s
Engineering Secure Software and Systems
β Scribed by Mathias Payer, Awais Rashid, Jose M. Such
- Publisher
- Springer International Publishing
- Year
- 2018
- Tongue
- English
- Leaves
- 143
- Series
- Lecture Notes in Computer Science 10953
- Edition
- 1st ed.
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
This book constitutes the refereed proceedings of the 10th International Symposium on Engineering Secure Software and Systems, ESSoS 2018, held in Paris, France, in June 2018. The 10 papers, consisting of 7 regular and 3 idea papers, were carefully reviewed and selected from 26 submissions. They focus on the construction of secure software, which is becoming an increasingly challenging task due to the complexity of modern applications, the growing sophistication of security requirements, the multitude of available software technologies, and the progress of attack vectors.
β¦ Table of Contents
Front Matter ....Pages I-IX
A Vision for Enhancing Security of Cryptography in Executables (Otto Brechelmacher, Willibald Krenn, Thorsten Tarrach)....Pages 1-8
Enforcing Full-Stack Memory-Safety in Cyber-Physical Systems (Eyasu Getahun Chekole, Sudipta Chattopadhyay, MartΓn Ochoa, Guo Huaqun)....Pages 9-26
Model Checking the Information Flow Security of Real-Time Systems (Christopher Gerking, David Schubert, Eric Bodden)....Pages 27-43
Off-Limits: Abusing Legacy x86 Memory Segmentation to Spy on Enclaved Execution (Jago Gyselinck, Jo Van Bulck, Frank Piessens, Raoul Strackx)....Pages 44-60
One Leak Is Enough to Expose Them All (Mohammadreza Hazhirpasand, Mohammad Ghafari)....Pages 61-76
PrivacyMeter: Designing and Developing a Privacy-Preserving Browser Extension (Oleksii Starov, Nick Nikiforakis)....Pages 77-95
Security Analysis of Drone Communication Protocols (Christian Bunse, Sebastian Plotz)....Pages 96-107
Idea: Automatic Localization of Malicious Behaviors in Android Malware with Hidden Markov Models (Aleieldin Salem, Tabea Schmidt, Alexander Pretschner)....Pages 108-115
Idea: Benchmarking Android Data Leak Detection Tools (Claudio Corrodi, Timo Spring, Mohammad Ghafari, Oscar Nierstrasz)....Pages 116-123
Idea: Visual Analytics for Web Security (Victor Le Pochat, Tom Van Goethem, Wouter Joosen)....Pages 124-132
Back Matter ....Pages 133-133
β¦ Subjects
Computer Science; Computer Communication Networks
π SIMILAR VOLUMES
<p><span>Cybersecurity is broken. Year after year, attackers remain unchallenged and undeterred, while engineering teams feel pressure to design, build, and operate "secure" systems. Failure can't be prevented, mental models of systems are incomplete, and our digital world constantly evolves. How ca
<p><span>Cybersecurity is broken. Year after year, attackers remain unchallenged and undeterred, while engineering teams feel pressure to design, build, and operate "secure" systems. Failure can't be prevented, mental models of systems are incomplete, and our digital world constantly evolves. How ca
Cybersecurity is broken. Year after year, attackers remain unchallenged and undeterred, while engineering teams feel pressure to design, build, and operate "secure" systems. Failure can't be prevented, mental models of systems are incomplete, and our digital world constantly evolves. How can we veri
<p><span>Cybersecurity is broken. Year after year, attackers remain unchallenged and undeterred, while engineering teams feel pressure to design, build, and operate "secure" systems. Failure can't be prevented, mental models of systems are incomplete, and our digital world constantly evolves. How ca
<p><span>Cybersecurity is broken. Year after year, attackers remain unchallenged and undeterred, while engineering teams feel pressure to design, build, and operate "secure" systems. Failure can't be prevented, mental models of systems are incomplete, and our digital world constantly evolves. How ca