Engineering Secure Software and Systems

5th International Symposium, ESSoS 2013, Paris, France, February 27 - March 1, 2013. Proceedings

Editors:

ISBN: 978-3-642-36562-1 (Print) 978-3-642-36563-8 (Online)

Table of contents (16 chapters)

  1. Front Matter

    Pages -

  2. Secure Programming

    1. No Access

      Book Chapter

      Pages 1-16

      Control-Flow Integrity in Web Applications

    2. No Access

      Book Chapter

      Pages 17-32

      Using Security Policies to Automate Placement of Network Intrusion Prevention

    3. No Access

      Book Chapter

      Pages 33-41

      Idea: Callee-Site Rewriting of Sealed System Libraries

  3. Policies

    1. No Access

      Book Chapter

      Pages 42-57

      Towards Unified Authorization for Android

    2. No Access

      Book Chapter

      Pages 58-74

      Model-Based Usage Control Policy Derivation

    3. No Access

      Book Chapter

      Pages 75-90

      Compositional Verification of Application-Level Security Properties

  4. Proving

    1. No Access

      Book Chapter

      Pages 91-106

      Towards Verifying Voter Privacy through Unlinkability

    2. No Access

      Book Chapter

      Pages 107-122

      Confidentiality for Probabilistic Multi-threaded Programs and Its Verification

    3. No Access

      Book Chapter

      Pages 123-138

      A Fully Homomorphic Crypto-Processor Design

  5. Formal Methods

    1. No Access

      Book Chapter

      Pages 139-154

      dkal  ⋆ : Constructing Executable Specifications of Authorization Protocols

    2. No Access

      Book Chapter

      Pages 155-170

      A Formal Approach for Inspecting Privacy and Trust in Advanced Electronic Services

    3. No Access

      Book Chapter

      Pages 171-180

      Idea: Writing Secure C Programs with SecProve

  6. Analyzing

    1. No Access

      Book Chapter

      Pages 181-196

      Anatomy of Exploit Kits

    2. No Access

      Book Chapter

      Pages 197-212

      An Empirical Study on the Effectiveness of Security Code Review

    3. No Access

      Book Chapter

      Pages 213-228

      Eliminating SQL Injection and Cross Site Scripting Using Aspect Oriented Programming

    4. No Access

      Book Chapter

      Pages E1-E1

      Erratum: A Fully Homomorphic Crypto-Processor Design

  7. Back Matter

    Pages -