Engineering Secure Software and Systems: 10th International Symposium, ESSoS 2018, Paris, France, June 26-27, 2018, ProceedingsMathias Payer, Awais Rashid, Jose M. Such
This book constitutes the refereed proceedings of the 10th International Symposium on Engineering Secure Software and Systems, ESSoS 2018, held in Paris, France, in June 2018. The 10 papers, consisting of 7 regular and 3 idea papers, were carefully reviewed and selected from 26 submissions. They focus on the construction of secure software, which is becoming an increasingly challenging task due to the complexity of modern applications, the growing sophistication of security requirements, the multitude of available software technologies, and the progress of attack vectors. |
Contents
1 | |
Enforcing FullStack MemorySafety in CyberPhysical Systems | 9 |
Model Checking the Information Flow Security of RealTime Systems | 27 |
Abusing Legacy x86 Memory Segmentation to Spy on Enclaved Execution | 44 |
One Leak Is Enough to Expose Them All | 61 |
Designing and Developing a PrivacyPreserving Browser Extension | 77 |
Security Analysis of Drone Communication Protocols | 96 |
Automatic Localization of Malicious Behaviors in Android Malware with Hidden Markov Models | 108 |
Benchmarking Android Data Leak Detection Tools | 116 |
Visual Analytics for Web Security | 124 |
133 | |
Other editions - View all
Common terms and phrases
actions active additional allows analysis Android API call applications approach apps architecture attacks automata automaton behaviors benign binary browser bytes channel collect communication Comput crowdsourcing data sets detect developed discussed edge enable enclave engineering evaluate example execution extension fault functions identify IEEE implementation information flow inputs instruction interactive International issues known leak limit malicious malicious behaviors measure memory memory-safety method nodes observable operating overhead packet paging performance port practices present PrivacyMeter proposed protection protocol real-time received refer reports request risks running scan scanner score segment sensitive sequence specification Springer step Table techniques traces trackers unit University visual vulnerabilities WebRTC websites Windows