Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Nadira Lammari, Jean-Sylvain Bucumi, Jacky Akoka, Isabelle Comyn-Wattiau |
A conceptual meta-model for secured information systems. |
SESS@ICSE |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Fabio Martinelli, Ilaria Matteucci |
Preserving security properties under refinement. |
SESS@ICSE |
2011 |
DBLP DOI BibTeX RDF |
|
1 | KiSeok Bae, MahnKi Ahn, Hoon-Jae Lee 0001, JaeCheol Ha, Sang-Jae Moon |
Power analysis attack and countermeasure on the Rabbit Stream Cipher (position paper). |
SESS@ICSE |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Yonghee Shin, Laurie A. Williams |
An initial study on the use of execution complexity metrics as indicators of software vulnerabilities. |
SESS@ICSE |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Michele Co, Jack W. Davidson, Jason D. Hiser, John C. Knight, Anh Nguyen-Tuong, David R. Cok, Denis Gopan, David Melski, Wenke Lee, Chengyu Song, Thomas Bracewell, David Hyde 0002, Brian Mastropietro |
PEASOUP: preventing exploits against software of uncertain provenance (position paper). |
SESS@ICSE |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Jan Jürjens, Seok-Won Lee, Mattia Monga (eds.) |
Proceedings of the 7th International Workshop on Software Engineering for Secure Systems, SESS 2011, Waikiki, Honolulu, HI, USA, May 22, 2011 |
SESS@ICSE |
2011 |
DBLP BibTeX RDF |
|
1 | Michael Todd Gamble, Rose F. Gamble, Matthew L. Hale |
Security policy foundations in context UNITY. |
SESS@ICSE |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Koen Buyens, Riccardo Scandariato, Wouter Joosen |
Composition of least privilege analysis results in software architectures (position paper). |
SESS@ICSE |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Naved Ahmed, Raimundas Matulevicius |
Towards transformation guidelines from secure tropos to misuse cases (position paper). |
SESS@ICSE |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Shamal Faily, Ivan Flechais |
A meta-model for usable secure requirements engineering. |
SESS@ICSE |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Sven Lachmund |
Auto-generating access control policies for applications by static analysis with user input recognition. |
SESS@ICSE |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Seok-Won Lee, Mattia Monga, Jan Jürjens (eds.) |
ICSE Workshop on Software Engineering for Secure Systems, SESS 2010, May 2, 2010, Cape Town, South Africa |
SESS@ICSE |
2010 |
DBLP BibTeX RDF |
|
1 | Yan Wu 0018, Robin A. Gandhi, Harvey P. Siy |
Using semantic templates to study vulnerabilities recorded in large software repositories. |
SESS@ICSE |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Tanveer Mustafa, Michael Drouineaud, Karsten Sohr |
Towards formal specification and verification of a role-based authorization engine using JML. |
SESS@ICSE |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Markus Luckey, Andrea Baumann, Daniel Méndez Fernández, Stefan Wagner 0001 |
Reusing security requirements using an extended quality model. |
SESS@ICSE |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Angelo Ciampa, Corrado Aaron Visaggio, Massimiliano Di Penta |
A heuristic-based approach for detecting SQL-injection vulnerabilities in web applications. |
SESS@ICSE |
2010 |
DBLP DOI BibTeX RDF |
|
1 | David Byers, Nahid Shahmehri |
Unified modeling of attacks, vulnerabilities and security activities. |
SESS@ICSE |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Jianning Geng, Lin Liu 0001, Barrett R. Bryant |
Towards a personalized privacy management framework. |
SESS@ICSE |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Sarah Al-Azzani, Rami Bahsoon |
Using implied scenarios in security testing. |
SESS@ICSE |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Andrea Avancini, Mariano Ceccato |
Towards security testing with taint analysis and genetic algorithms. |
SESS@ICSE |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Hossain Shahriar, Mohammad Zulkernine |
MUTEC: Mutation-based testing of Cross Site Scripting. |
SESS@ICSE |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Munawar Hafiz, Ralph E. Johnson |
Improving perimeter security with security-oriented program transformations. |
SESS@ICSE |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Hrvoje Belani, Zeljka Car, Antun Caric |
RUP-based process model for security requirements engineering in value-added service development. |
SESS@ICSE |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Peter Würzinger, Christian Platzer, Christian Ludl, Engin Kirda, Christopher Kruegel |
SWAP: Mitigating XSS attacks using a reverse proxy. |
SESS@ICSE |
2009 |
DBLP DOI BibTeX RDF |
|
1 | David S. Allison, Hany F. El Yamany, Miriam A. M. Capretz |
Metamodel for privacy policies within SOA. |
SESS@ICSE |
2009 |
DBLP DOI BibTeX RDF |
|
1 | |
ICSE Workshop on Software Engineering for Secure Systems, SESS 2009, Vancouver, BC, Canada, May 19, 2009 |
SESS@ICSE |
2009 |
DBLP BibTeX RDF |
|
1 | Mattia Monga, Roberto Paleari, Emanuele Passerini |
A hybrid analysis framework for detecting web application vulnerabilities. |
SESS@ICSE |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Koen Buyens, Bart De Win, Wouter Joosen |
Resolving least privilege violations in software architectures. |
SESS@ICSE |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Nina Moebius, Kurt Stenzel, Wolfgang Reif |
Generating formal specifications for security-critical applications - A model-driven approach. |
SESS@ICSE |
2009 |
DBLP DOI BibTeX RDF |
|
1 | David Garcia Rosado, Eduardo Fernández-Medina, Javier López 0001 |
Reusable security use cases for mobile grid environments. |
SESS@ICSE |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Marwa El-Ghali, Wes Masri |
Intrusion detection using signatures extracted from execution profiles. |
SESS@ICSE |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Linzhang Wang, W. Eric Wong, Dianxiang Xu |
A Threat Model Driven Approach for Security Testing. |
SESS@ICSE |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Thomas Heyman, Koen Yskout, Riccardo Scandariato, Wouter Joosen |
An Analysis of the Security Patterns Landscape. |
SESS@ICSE |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Thomas Raffetseder, Engin Kirda, Christopher Kruegel |
Building Anti-Phishing Browser Plug-Ins: An Experience Report. |
SESS@ICSE |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Dries Vanoverberghe, Frank Piessens |
Supporting Security Monitor-Aware Development. |
SESS@ICSE |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Kun Xiao, Nianen Chen, Shangping Ren, Limin Shen, Xianhe Sun, Kevin A. Kwiat, Michael Macalik |
A Workflow-Based Non-intrusive Approach for Enhancing the Survivability of Critical Infrastructures in Cyber Environment. |
SESS@ICSE |
2007 |
DBLP DOI BibTeX RDF |
|
1 | |
Third International Workshop on Software Engineering for Secure Systems, SESS 2007, Minneapolis, MN, USA, May 20-26, 2007 |
SESS@ICSE |
2007 |
DBLP BibTeX RDF |
|
1 | Stephen Thomas, Laurie A. Williams |
Using Automated Fix Generation to Secure SQL Statements. |
SESS@ICSE |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Johan Grégoire, Koen Buyens, Bart De Win, Riccardo Scandariato, Wouter Joosen |
On the Secure Software Development Process: CLASP and SDL Compared. |
SESS@ICSE |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Seok Won Lee, Robin A. Gandhi, Siddharth J. Wagle |
Towards a Requirements-Driven Workbench for Supporting Software Certification and Accreditation. |
SESS@ICSE |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Andrea Lanzi, Lorenzo Martignoni, Mattia Monga, Roberto Paleari |
A Smart Fuzzer for x86 Executables. |
SESS@ICSE |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Evan Martin, Tao Xie 0001 |
Automated Test Generation for Access Control Policies via Change-Impact Analysis. |
SESS@ICSE |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Bart De Win, Frank Piessens, Wouter Joosen |
How secure is AOP and what can we do about it? |
SESS@ICSE |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Danilo Bruschi, Bart De Win, Mattia Monga (eds.) |
Proceedings of the 2006 international workshop on Software engineering for secure systems, SESS 2006, Shanghai, China, May 20-21, 2006 |
SESS@ICSE |
2006 |
DBLP BibTeX RDF |
|
1 | Danilo Bruschi, Bart De Win, Mattia Monga |
Introduction to software engineering for secure systems: SESS06 - secure by design. |
SESS@ICSE |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Marco Rolando, Matteo Rossi 0001, Niccolò Sanarico, Dino Mandrioli |
A formal approach to sensor placement and configuration in a network intrusion detection system. |
SESS@ICSE |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Gustav Boström, Jaana Wäyrynen, Marine Bodén, Konstantin Beznosov, Philippe Kruchten |
Extending XP practices to support security requirements engineering. |
SESS@ICSE |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Seok Won Lee, Robin A. Gandhi, Divya Muthurajan, Deepak S. Yavagal, Gail-Joon Ahn |
Building problem domain ontology from security requirements in regulatory documents. |
SESS@ICSE |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Shin Nakajima 0001, Tetsuo Tamai |
Formal specification and analysis of JAAS framework. |
SESS@ICSE |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Kung Chen, Ju-Bing Chen |
On instrumenting obfuscated java bytecode with aspects. |
SESS@ICSE |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Charles B. Haley, Jonathan D. Moffett, Robin C. Laney, Bashar Nuseibeh |
A framework for security requirements engineering. |
SESS@ICSE |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Shanai Ardi, David Byers, Nahid Shahmehri |
Towards a structured unified process for software security. |
SESS@ICSE |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Martin Naedele, Thomas E. Koch |
Trust and tamper-proof software delivery. |
SESS@ICSE |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Sam Weber, Paul A. Karger, Amit M. Paradkar |
A software flaw taxonomy: aiming tools at security. |
SESS@ICSE |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Michael Gegick, Laurie A. Williams |
Matching attack patterns to security vulnerabilities in software-intensive system designs. |
SESS@ICSE |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Ömer Erdem Demir, Premkumar T. Devanbu, Nenad Medvidovic, Eric Wohlstadter |
DISCOA: architectural adaptations for security and QoS. |
SESS@ICSE |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Maarten Rits, Benjamin De Boe, Andreas Schaad |
XacT: a bridge between resource management and access control in multi-layered applications. |
SESS@ICSE |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Tine Verhanneman, Frank Piessens, Bart De Win, Wouter Joosen |
Requirements traceability to support evolution of access control. |
SESS@ICSE |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Bart De Win, Frank Piessens, Jan Smans, Wouter Joosen |
Towards a unifying view on security contracts. |
SESS@ICSE |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Karsten Sohr, Gail-Joon Ahn, Lars Migge |
Articulating and enforcing authorisation policies with UML and OCL. |
SESS@ICSE |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Mike Jochen, Anteneh Addis Anteneh, Lori L. Pollock, Lisa M. Marvel |
Enabling control over adaptive program transformation for dynamically evolving mobile software validation. |
SESS@ICSE |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Seok Won Lee, Robin A. Gandhi, Gail-Joon Ahn |
Establishing trustworthiness in services of the critical infrastructure through certification and accreditation. |
SESS@ICSE |
2005 |
DBLP DOI BibTeX RDF |
|
1 | John Viega |
Building security requirements with CLASP. |
SESS@ICSE |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Ben Breech, Lori L. Pollock |
A framework for testing security mechanisms for program-based attacks. |
SESS@ICSE |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Wes Masri, Andy Podgurski |
Using dynamic information flow analysis to detect attacks against applications. |
SESS@ICSE |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Somo Banerjee, Chris A. Mattmann, Nenad Medvidovic, Leana Golubchik |
Leveraging architectural models to inject trust into software systems. |
SESS@ICSE |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Nancy R. Mead, Ted Stehney |
Security quality requirements engineering (SQUARE) methodology. |
SESS@ICSE |
2005 |
DBLP DOI BibTeX RDF |
|
1 | |
Proceedings of the 2005 Workshop on Software Engineering for Secure Systems - Building Trustworthy Applications, SESS 2005, St. Louis, Missouri, USA, May 15-16, 2005 |
SESS@ICSE |
2005 |
DBLP BibTeX RDF |
|
1 | Jie Ren 0001, Richard N. Taylor, Paul Dourish, David F. Redmiles |
Towards an architectural treatment of software security: a connector-centric approach. |
SESS@ICSE |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Zaid Dwaikat, Francesco Parisi-Presicce |
Risky trust: risk-based analysis of software systems. |
SESS@ICSE |
2005 |
DBLP DOI BibTeX RDF |
|