Skip to main content
  • Conference proceedings
  • © 2013

Engineering Secure Software and Systems

5th International Symposium, ESSoS 2013, Paris, France, February 27 - March 1, 2013. Proceedings

Editors:

(view affiliations)
  • State of the art research

  • Up to date results

  • Fast track conference proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 7781)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ESSoS: International Symposium on Engineering Secure Software and Systems

Conference proceedings info: ESSoS 2013.

Buying options

eBook
USD 54.99
Price excludes VAT (USA)
  • ISBN: 978-3-642-36563-8
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book
USD 72.00
Price excludes VAT (USA)

This is a preview of subscription content, access via your institution.

Table of contents (16 papers)

  1. Front Matter

  2. Secure Programming

    1. Control-Flow Integrity in Web Applications

      • Bastian Braun, Patrick Gemein, Hans P. Reiser, Joachim Posegga
      Pages 1-16
    2. Using Security Policies to Automate Placement of Network Intrusion Prevention

      • Nirupama Talele, Jason Teutsch, Trent Jaeger, Robert F. Erbacher
      Pages 17-32
    3. Idea: Callee-Site Rewriting of Sealed System Libraries

      • Philipp von Styp-Rekowsky, Sebastian Gerling, Michael Backes, Christian Hammer
      Pages 33-41
  3. Policies

    1. Towards Unified Authorization for Android

      • Michael J. May, Karthikeyan Bhargavan
      Pages 42-57
    2. Model-Based Usage Control Policy Derivation

      • Prachi Kumari, Alexander Pretschner
      Pages 58-74
    3. Compositional Verification of Application-Level Security Properties

      • Linda Ariani Gunawan, Peter Herrmann
      Pages 75-90
  4. Proving

    1. Towards Verifying Voter Privacy through Unlinkability

      • Denis Butin, David Gray, Giampaolo Bella
      Pages 91-106
    2. Confidentiality for Probabilistic Multi-threaded Programs and Its Verification

      • Tri Minh Ngo, Mariëlle Stoelinga, Marieke Huisman
      Pages 107-122
    3. A Fully Homomorphic Crypto-Processor Design

      • Peter T. Breuer, Jonathan P. Bowen
      Pages 123-138
  5. Formal Methods

    1. dkal  ⋆ : Constructing Executable Specifications of Authorization Protocols

      • Jean-Baptiste Jeannin, Guido de Caso, Juan Chen, Yuri Gurevich, Prasad Naldurg, Nikhil Swamy
      Pages 139-154
    2. A Formal Approach for Inspecting Privacy and Trust in Advanced Electronic Services

      • Koen Decroix, Jorn Lapon, Bart De Decker, Vincent Naessens
      Pages 155-170
    3. Idea: Writing Secure C Programs with SecProve

      • Myla M. Archer, Elizabeth I. Leonard, Constance L. Heitmeyer
      Pages 171-180
  6. Analyzing

    1. Anatomy of Exploit Kits

      • Vadim Kotov, Fabio Massacci
      Pages 181-196
    2. An Empirical Study on the Effectiveness of Security Code Review

      • Anne Edmundson, Brian Holtkamp, Emanuel Rivera, Matthew Finifter, Adrian Mettler, David Wagner
      Pages 197-212
    3. Erratum: A Fully Homomorphic Crypto-Processor Design

      • Peter T. Breuer, Jonathan P. Bowen
      Pages E1-E1
  7. Back Matter

Other Volumes

  1. Engineering Secure Software and Systems

    5th International Symposium, ESSoS 2013, Paris, France, February 27 - March 1, 2013. Proceedings

About this book

This book constitutes the refereed proceedings of the 5th International Symposium on Engineering Secure Software and Systems, ESSoS 2013, held in Paris, France, in February/March 2013. The 13 revised full papers presented together with two idea papers were carefully reviewed and selected from 62 submissions. The papers are organized in topical sections on secure programming, policies, proving, formal methods, and analyzing.

Keywords

  • authorization protocols
  • privacy
  • program verification
  • security policies
  • security-critical systems

Editors and Affiliations

  • Department of Computer Science, TU Dortmund und Fraunhofer ISST, Dortmund, Germany

    Jan Jürjens

  • One Microsoft Way, Microsoft Research, Redmond, USA

    Benjamin Livshits

  • Department of Computer Science, Katholieke Universiteit Leuven, Heverlee, Belgium

    Riccardo Scandariato

Bibliographic Information

Buying options

eBook
USD 54.99
Price excludes VAT (USA)
  • ISBN: 978-3-642-36563-8
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book
USD 72.00
Price excludes VAT (USA)