Login / Signup
SESS@ICSE
Publications
2011
Proceedings of the 7th International Workshop on Software Engineering for Secure Systems, SESS 2011, Waikiki, Honolulu, HI, USA, May 22, 2011
SESS@ICSE
(2011)
Yonghee Shin
,
Laurie A. Williams
An initial study on the use of execution complexity metrics as indicators of software vulnerabilities.
SESS@ICSE
(2011)
Fabio Martinelli
,
Ilaria Matteucci
Preserving security properties under refinement.
SESS@ICSE
(2011)
Michael Todd Gamble
,
Rose F. Gamble
,
Matthew L. Hale
Security policy foundations in context UNITY.
SESS@ICSE
(2011)
Michele Co
,
Jack W. Davidson
,
Jason D. Hiser
,
John C. Knight
,
Anh Nguyen-Tuong
,
David Cok
,
Denis Gopan
,
David Melski
,
Wenke Lee
,
Chengyu Song
,
Thomas Bracewell
,
David Hyde
,
Brian Mastropietro
PEASOUP: preventing exploits against software of uncertain provenance (position paper).
SESS@ICSE
(2011)
Koen Buyens
,
Riccardo Scandariato
,
Wouter Joosen
Composition of least privilege analysis results in software architectures (position paper).
SESS@ICSE
(2011)
KiSeok Bae
,
MahnKi Ahn
,
Hoon-Jae Lee
,
JaeCheol Ha
,
Sang-Jae Moon
Power analysis attack and countermeasure on the Rabbit Stream Cipher (position paper).
SESS@ICSE
(2011)
Nadira Lammari
,
Jean-Sylvain Bucumi
,
Jacky Akoka
,
Isabelle Comyn-Wattiau
A conceptual meta-model for secured information systems.
SESS@ICSE
(2011)
Naved Ahmed
,
Raimundas Matulevicius
Towards transformation guidelines from secure tropos to misuse cases (position paper).
SESS@ICSE
(2011)
2010
Sarah Al-Azzani
,
Rami Bahsoon
Using implied scenarios in security testing.
SESS@ICSE
(2010)
ICSE Workshop on Software Engineering for Secure Systems, SESS 2010, May 2, 2010, Cape Town, South Africa
SESS@ICSE
(2010)
Jianning Geng
,
Lin Liu
,
Barrett R. Bryant
Towards a personalized privacy management framework.
SESS@ICSE
(2010)
Yan Wu
,
Robin A. Gandhi
,
Harvey P. Siy
Using semantic templates to study vulnerabilities recorded in large software repositories.
SESS@ICSE
(2010)
Andrea Avancini
,
Mariano Ceccato
Towards security testing with taint analysis and genetic algorithms.
SESS@ICSE
(2010)
Sven Lachmund
Auto-generating access control policies for applications by static analysis with user input recognition.
SESS@ICSE
(2010)
Markus Luckey
,
Andrea Baumann
,
Daniel Méndez Fernández
,
Stefan Wagner
Reusing security requirements using an extended quality model.
SESS@ICSE
(2010)
Angelo Ciampa
,
Corrado Aaron Visaggio
,
Massimiliano Di Penta
A heuristic-based approach for detecting SQL-injection vulnerabilities in web applications.
SESS@ICSE
(2010)
Tanveer Mustafa
,
Michael Drouineaud
,
Karsten Sohr
Towards formal specification and verification of a role-based authorization engine using JML.
SESS@ICSE
(2010)
David Byers
,
Nahid Shahmehri
Unified modeling of attacks, vulnerabilities and security activities.
SESS@ICSE
(2010)
Shamal Faily
,
Ivan Flechais
A meta-model for usable secure requirements engineering.
SESS@ICSE
(2010)