Login / Signup
SESS@ICSE
2005
2008
2011
2005
2011
Keyphrases
Publications
2011
Proceedings of the 7th International Workshop on Software Engineering for Secure Systems, SESS 2011, Waikiki, Honolulu, HI, USA, May 22, 2011
SESS@ICSE
(2011)
Yonghee Shin
,
Laurie A. Williams
An initial study on the use of execution complexity metrics as indicators of software vulnerabilities.
SESS@ICSE
(2011)
Fabio Martinelli
,
Ilaria Matteucci
Preserving security properties under refinement.
SESS@ICSE
(2011)
Michael Todd Gamble
,
Rose F. Gamble
,
Matthew L. Hale
Security policy foundations in context UNITY.
SESS@ICSE
(2011)
Michele Co
,
Jack W. Davidson
,
Jason D. Hiser
,
John C. Knight
,
Anh Nguyen-Tuong
,
David Cok
,
Denis Gopan
,
David Melski
,
Wenke Lee
,
Chengyu Song
,
Thomas Bracewell
,
David Hyde
,
Brian Mastropietro
PEASOUP: preventing exploits against software of uncertain provenance (position paper).
SESS@ICSE
(2011)
Koen Buyens
,
Riccardo Scandariato
,
Wouter Joosen
Composition of least privilege analysis results in software architectures (position paper).
SESS@ICSE
(2011)
KiSeok Bae
,
MahnKi Ahn
,
Hoon-Jae Lee
,
JaeCheol Ha
,
Sang-Jae Moon
Power analysis attack and countermeasure on the Rabbit Stream Cipher (position paper).
SESS@ICSE
(2011)
Nadira Lammari
,
Jean-Sylvain Bucumi
,
Jacky Akoka
,
Isabelle Comyn-Wattiau
A conceptual meta-model for secured information systems.
SESS@ICSE
(2011)
Naved Ahmed
,
Raimundas Matulevicius
Towards transformation guidelines from secure tropos to misuse cases (position paper).
SESS@ICSE
(2011)
2010
Sarah Al-Azzani
,
Rami Bahsoon
Using implied scenarios in security testing.
SESS@ICSE
(2010)
ICSE Workshop on Software Engineering for Secure Systems, SESS 2010, May 2, 2010, Cape Town, South Africa
SESS@ICSE
(2010)
Jianning Geng
,
Lin Liu
,
Barrett R. Bryant
Towards a personalized privacy management framework.
SESS@ICSE
(2010)
Yan Wu
,
Robin A. Gandhi
,
Harvey P. Siy
Using semantic templates to study vulnerabilities recorded in large software repositories.
SESS@ICSE
(2010)
Andrea Avancini
,
Mariano Ceccato
Towards security testing with taint analysis and genetic algorithms.
SESS@ICSE
(2010)
Sven Lachmund
Auto-generating access control policies for applications by static analysis with user input recognition.
SESS@ICSE
(2010)
Markus Luckey
,
Andrea Baumann
,
Daniel Méndez Fernández
,
Stefan Wagner
Reusing security requirements using an extended quality model.
SESS@ICSE
(2010)
Angelo Ciampa
,
Corrado Aaron Visaggio
,
Massimiliano Di Penta
A heuristic-based approach for detecting SQL-injection vulnerabilities in web applications.
SESS@ICSE
(2010)
Tanveer Mustafa
,
Michael Drouineaud
,
Karsten Sohr
Towards formal specification and verification of a role-based authorization engine using JML.
SESS@ICSE
(2010)
David Byers
,
Nahid Shahmehri
Unified modeling of attacks, vulnerabilities and security activities.
SESS@ICSE
(2010)
Shamal Faily
,
Ivan Flechais
A meta-model for usable secure requirements engineering.
SESS@ICSE
(2010)