Vyzkoušejte nový nástroj s podporou AI
Summon Research Assistant
BETA
Loading…
KASLR is Dead: Long Live KASLR
Gruss, Daniel, Lipp, Moritz, Schwarz, Michael, Fellner, Richard, Maurice, Clémentine, Mangard, Stefan
Published in Engineering Secure Software and Systems (2017)
Published in Engineering Secure Software and Systems (2017)
Get full text
Book Chapter
Loading…
Defeating Zombie Gadgets by Re-randomizing Code upon Disclosure
Morton, Micah, Koo, Hyungjoon, Li, Forrest, Snow, Kevin Z., Polychronakis, Michalis, Monrose, Fabian
Published in Engineering Secure Software and Systems (01.01.2017)
Published in Engineering Secure Software and Systems (01.01.2017)
Get full text
Book Chapter
Loading…
Idea: A Unifying Theory for Evaluation Systems
Bella, Giampaolo, Giustolisi, Rosario
Published in Engineering Secure Software and Systems (01.01.2017)
Published in Engineering Secure Software and Systems (01.01.2017)
Get full text
Book Chapter
Loading…
Idea-Caution Before Exploitation: The Use of Cybersecurity Domain Knowledge to Educate Software Engineers Against Software Vulnerabilities
Nafees, Tayyaba, Coull, Natalie, Ferguson, Robert Ian, Sampson, Adam
Published in Engineering Secure Software and Systems (01.01.2017)
Published in Engineering Secure Software and Systems (01.01.2017)
Get full text
Book Chapter
Loading…
Loading…
Loading…
Exploring the Relationship Between Architecture Coupling and Software Vulnerabilities
Lagerström, Robert, Baldwin, Carliss, MacCormack, Alan, Sturtevant, Dan, Doolan, Lee
Published in Engineering Secure Software and Systems (2017)
Published in Engineering Secure Software and Systems (2017)
Get full text
Book Chapter
Conference Proceeding
Loading…
Loading…
Loading…
Loading…
Loading…
Supporting the development and documentation of ISO 27001 information security management systems through security requirements engineering approaches
Beckers, Kristian, Faßbender, Stephan, Heisel, Maritta, Küster, Jan-Christoph, Schmidt, Holger
Published in Proceedings of the 4th international conference on Engineering Secure Software and Systems (01.01.2012)
Published in Proceedings of the 4th international conference on Engineering Secure Software and Systems (01.01.2012)
Get full text
Conference Proceeding
Book Chapter
Loading…
Natural Language Insights from Code Reviews that Missed a Vulnerability: A Large Scale Study of Chromium
Munaiah, Nuthan, Meyers, Benjamin S., Alm, Cecilia O., Meneely, Andrew, Murukannaiah, Pradeep K., Prud’hommeaux, Emily, Wolff, Josephine, Yu, Yang
Published in Engineering Secure Software and Systems (24.06.2017)
Published in Engineering Secure Software and Systems (24.06.2017)
Get full text
Book Chapter
Loading…
Loading…
A Systematic Study of Cache Side Channels Across AES Implementations
Mantel, Heiko, Weber, Alexandra, Köpf, Boris
Published in Engineering Secure Software and Systems (2017)
Published in Engineering Secure Software and Systems (2017)
Get full text
Book Chapter
Loading…
Loading…
Idea: Benchmarking Android Data Leak Detection Tools
Corrodi, Claudio, Spring, Timo, Ghafari, Mohammad, Nierstrasz, Oscar
Published in Engineering Secure Software and Systems (2018)
Published in Engineering Secure Software and Systems (2018)
Get full text
Book Chapter
Loading…
Loading…
Loading…