Engineering Secure Software and Systems

5th International Symposium, ESSoS 2013, Paris, France, February 27 - March 1, 2013. Proceedings

  • Jan Jürjens
  • Benjamin Livshits
  • Riccardo Scandariato
Conference proceedings ESSoS 2013

DOI: 10.1007/978-3-642-36563-8

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7781)

Table of contents (16 papers)

  1. Front Matter
  2. Secure Programming

    1. Control-Flow Integrity in Web Applications
      Bastian Braun, Patrick Gemein, Hans P. Reiser, Joachim Posegga
      Pages 1-16
    2. Using Security Policies to Automate Placement of Network Intrusion Prevention
      Nirupama Talele, Jason Teutsch, Trent Jaeger, Robert F. Erbacher
      Pages 17-32
    3. Idea: Callee-Site Rewriting of Sealed System Libraries
      Philipp von Styp-Rekowsky, Sebastian Gerling, Michael Backes, Christian Hammer
      Pages 33-41
  3. Policies

    1. Towards Unified Authorization for Android
      Michael J. May, Karthikeyan Bhargavan
      Pages 42-57
    2. Model-Based Usage Control Policy Derivation
      Prachi Kumari, Alexander Pretschner
      Pages 58-74
    3. Compositional Verification of Application-Level Security Properties
      Linda Ariani Gunawan, Peter Herrmann
      Pages 75-90
  4. Proving

    1. Towards Verifying Voter Privacy through Unlinkability
      Denis Butin, David Gray, Giampaolo Bella
      Pages 91-106
    2. Confidentiality for Probabilistic Multi-threaded Programs and Its Verification
      Tri Minh Ngo, Mariëlle Stoelinga, Marieke Huisman
      Pages 107-122
    3. A Fully Homomorphic Crypto-Processor Design
      Peter T. Breuer, Jonathan P. Bowen
      Pages 123-138
  5. Formal Methods

    1. dkal ⋆ : Constructing Executable Specifications of Authorization Protocols
      Jean-Baptiste Jeannin, Guido de Caso, Juan Chen, Yuri Gurevich, Prasad Naldurg, Nikhil Swamy
      Pages 139-154
    2. A Formal Approach for Inspecting Privacy and Trust in Advanced Electronic Services
      Koen Decroix, Jorn Lapon, Bart De Decker, Vincent Naessens
      Pages 155-170
    3. Idea: Writing Secure C Programs with SecProve
      Myla M. Archer, Elizabeth I. Leonard, Constance L. Heitmeyer
      Pages 171-180
  6. Analyzing

    1. Anatomy of Exploit Kits
      Vadim Kotov, Fabio Massacci
      Pages 181-196
    2. An Empirical Study on the Effectiveness of Security Code Review
      Anne Edmundson, Brian Holtkamp, Emanuel Rivera, Matthew Finifter, Adrian Mettler, David Wagner
      Pages 197-212
    3. Erratum: A Fully Homomorphic Crypto-Processor Design
      Peter T. Breuer, Jonathan P. Bowen
      Pages E1-E1
  7. Back Matter

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 5th International Symposium on Engineering Secure Software and Systems, ESSoS 2013, held in Paris, France, in February/March 2013. The 13 revised full papers presented together with two idea papers were carefully reviewed and selected from 62 submissions. The papers are organized in topical sections on secure programming, policies, proving, formal methods, and analyzing.

Keywords

authorization protocols privacy program verification security policies security-critical systems

Editors and affiliations

  • Jan Jürjens
    • 1
  • Benjamin Livshits
    • 2
  • Riccardo Scandariato
    • 3
  1. 1.Department of Computer ScienceTU Dortmund und Fraunhofer ISSTDortmundGermany
  2. 2.One Microsoft WayMicrosoft ResearchRedmondUSA
  3. 3.Department of Computer ScienceKatholieke Universiteit LeuvenHeverleeBelgium

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2013
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-36562-1
  • Online ISBN 978-3-642-36563-8
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349