default search action
SERE 2013: Gaithersburg, Maryland, USA
- Seventh International Conference on Software Security and Reliability, SERE 2012, Gaithersburg, Maryland, USA, 18-20 June 2013 - Companion Volume. IEEE 2013
Workshop on Trustworthy Computing (TC 2013)
- Xiang Feng, Yonghe Wu, Xueqiang Yan:
Mobile Application Protection Solution Based on 3G Security Architecture and OpenID. 1-7 - Matthias Trojahn, Frank Ortmeier:
Designing an Enterprise Security Strategy for Mobile Intranet Access. 8-15 - Xiaotao Zhang, Hui Li, Shouwen Yang, Shuangshuang Han:
On a High-Performance and Balanced Method of Hardware Implementation for AES. 16-20 - Afzaal Ahmad, Noor Ullah Khan, Arbab Waseem Abbas:
PHP+MySQL Based Online Examination System with Power Failure Handling and Dropbox Capability. 21-25 - Baozeng Ding, Yeping He, Yanjun Wu, Yuqi Lin:
HyperVerify: A VM-assisted Architecture for Monitoring Hypervisor Non-control Data. 26-34 - Antonios Gouglidis, Ioannis Mavridis, Vincent C. Hu:
Verification of Secure Inter-operation Properties in Multi-domain RBAC Systems. 35-44 - Yuqi Lin, Liping Ding, JingZheng Wu, Yalong Xie, Yongji Wang:
Robust and Efficient Covert Channel Communications in Operating Systems: Design, Implementation and Evaluation. 45-52 - Philipp Zech, Michael Felderer, Matthias Farwick, Ruth Breu:
A Concept for Language-Oriented Security Testing. 53-62 - Tarun Sen, Sateesh Kumar Peddoju:
Hierarchal Identity Based Socket for Datacenters. 63-67 - Stanislav Ponomarev, Jan Durand, Nathan Wallace, Travis Atkison:
Evaluation of Random Projection for Malware Classification. 68-73 - Ali Can Atici, Cemal Yilmaz, Erkay Savas:
An Approach for Isolating the Sources of Information Leakage Exploited in Cache-Based Side-Channel Attacks. 74-83 - Farzana Rahman, Md. Endadul Hoque, Sheikh Iqbal Ahamed, Mohammad Arif Ul Alam:
Preserving User Privacy in Pervasive Environments with a Collaborative Model. 84-93
Workshop on Information Assurance (IA 2013)
- Ali Kanso, Maria Toeroe, Ferhat Khendek:
Automating Service Availability Analysis: An Application to a Highly Available Media-Streaming Service. 94-101 - Dave Larson, Jigang Liu:
A New Security Metric for SOA Implementations. 102-108 - Yichen Wang, Xinsheng Lan, Yikun Wang:
Modeling Embedded Software Test Requirement Based on MARTE. 109-115 - Xuan Hu, Chunhui Yang, Dong Li, Yi Zhu, Mengyue Liu:
The Time/State-based Software-Intensive Systems Failure Mode Researches. 116-124 - Zheng Wei, Bai Han:
Multiple-Bug Oriented Fault Localization: A Parameter-Based Combination Approach. 125-130 - Wei Chang, Xiaohong Bao, Xuefei Li:
A Study on Airborne Software Safety Requirements Patterns. 131-136 - Hong Zhang, Lili Xu:
Application of Software Safety Analysis Using Event-B. 137-144 - Fevzi Belli:
Dependability and Software Reuse - Coupling Them by an Industrial Standard. 145-154 - Sonia Meskini, Ali Bou Nassif, Luiz Fernando Capretz:
Reliability Models Applied to Mobile Applications. 155-162 - Aurélien Delaitre, Vadim Okun, Elizabeth Fong:
Of Massive Static Analysis Data. 163-167 - Xiang Ling:
A Categorical Approach for Modeling and Verifying Dynamic Software Architecture. 168-175
Student Doctoral Program
- Baozeng Ding, Yeping He, Qiming Zhou, Yanjun Wu, JingZheng Wu:
hGuard: A Framework to Measure Hypervisor Critical Files. 176-181 - Mohammad Karami, Mohamed Elsabagh, Parnian Najafiborazjani, Angelos Stavrou:
Behavioral Analysis of Android Applications Using Automated Instrumentation. 182-187 - Ryan Johnson, Angelos Stavrou:
Forced-Path Execution for Android Applications on x86 Platforms. 188-197
SSCPS Workshop - Software Assurance and Reliable Communication Application
- Xiaona Wu, Yunwei Dong, Yongqi Ge, Hongbin Zhao:
A High Reliable Communication Technology in Electric Vehicle Charging Station. 198-203 - Xueguang Wu, Yanjun Wen, Liqian Chen, Wei Dong, Ji Wang:
Data Race Detection for Interrupt-Driven Programs via Bounded Model Checking. 204-210 - Jiantao He, Linzhang Wang, Jianhua Zhao:
Supporting Automatic Code Review via Design. 211-218 - Lewen Zhang, Yong Zhou, Yixiang Chen, Min Zhang, Juyang Zhang:
Stability of Software Trustworthiness Measurements Models. 219-224
Fast Abstracts
- JingZheng Wu, Yanjun Wu, Zhifei Wu, Mutian Yang, Yongji Wang:
Vulcloud: Scalable and Hybrid Vulnerability Detection in Cloud Computing. 225-226 - Mutian Yang, JingZheng Wu, Yanjun Wu, Zhifei Wu:
Policykeeper: Recommending Proper Security Mechanisms Based on the Severity of Vulnerability Considering User Experience. 227-228 - Amiangshu Bosu, Jeffrey C. Carver:
Peer Code Review to Prevent Security Vulnerabilities: An Empirical Evaluation. 229-230 - Haiyun Xu, Jeroen Heijmans, Joost Visser:
A Practical Model for Rating Software Security. 231-232
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.