托人看管 发表于 2025-3-26 22:06:56

User-Centric Security Assessment of Software Configurations: A Case Studythe system’s security goals and, . a method to rank available configurations with respect to security. This paper demonstrates the feasibility and usefulness of our approach in a real-world case study based on the Amazon EC2 service. Over 2000 publicly available Amazon Machine Images are analyzed an

并入 发表于 2025-3-27 02:29:03

Detecting Code Reuse Attacks with a Model of Conformant Program Execution Existing techniques to defend against these attacks provide ad hoc solutions or lack in features necessary to provide comprehensive and adoptable solutions. We present a systematic approach based on first principles for the efficient, robust detection of these attacks; our work enforces expected pr

acheon 发表于 2025-3-27 07:46:58

: A Flexible MDE Approach to Enforce Fine-grained Security Policiesicular, we introduce an expressive Domain Specific modeling Language (.), called ., for the specification of . of targeted systems. The .. supports the expression of ., . and . policies, covering many of the security requirements of modern applications. Security requirements specified in security co

thrombus 发表于 2025-3-27 13:21:43

http://reply.papertrans.cn/32/3110/310934/310934_34.png

Myocyte 发表于 2025-3-27 14:45:48

Automated Formal Verification of Application-specific Security Propertiesy properties, like confidentiality and authenticity..At ESSOS 2010, Moebius et. al. presented an approach for developing Java applications with formally verified application-specific security properties. That method, however, is based on an interactive theorem prover, which is not automatic and requ

正式通知 发表于 2025-3-27 20:18:31

Fault-Tolerant Non-interferencelues to be corrupted. The classic problem of fault tolerance is to modify a system so that it works despite a limited number of faults. We introduce a novel variant of this problem. Instead of demanding that the system works despite faults, we simply require that it remains secure: wrong answers may

Carcinogen 发表于 2025-3-28 01:50:37

http://reply.papertrans.cn/32/3110/310934/310934_37.png

Distribution 发表于 2025-3-28 02:33:23

http://reply.papertrans.cn/32/3110/310934/310934_38.png

我要威胁 发表于 2025-3-28 08:11:34

http://reply.papertrans.cn/32/3110/310934/310934_39.png

Latency 发表于 2025-3-28 11:58:07

http://reply.papertrans.cn/32/3110/310934/310934_40.png
页: 1 2 3 [4] 5 6
查看完整版本: Titlebook: Engineering Secure Software and Systems; 6th International Sy Jan Jürjens,Frank Piessens,Nataliia Bielova Conference proceedings 2014 Sprin