Skip to main content
  • Conference proceedings
  • © 2013

Engineering Secure Software and Systems

5th International Symposium, ESSoS 2013, Paris, France, February 27 - March 1, 2013. Proceedings

  • State of the art research
  • Up to date results
  • Fast track conference proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 7781)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ESSoS: International Symposium on Engineering Secure Software and Systems

Conference proceedings info: ESSoS 2013.

Buy it now

Buying options

eBook USD 54.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 72.00
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (16 papers)

  1. Front Matter

  2. Secure Programming

    1. Control-Flow Integrity in Web Applications

      • Bastian Braun, Patrick Gemein, Hans P. Reiser, Joachim Posegga
      Pages 1-16
    2. Using Security Policies to Automate Placement of Network Intrusion Prevention

      • Nirupama Talele, Jason Teutsch, Trent Jaeger, Robert F. Erbacher
      Pages 17-32
    3. Idea: Callee-Site Rewriting of Sealed System Libraries

      • Philipp von Styp-Rekowsky, Sebastian Gerling, Michael Backes, Christian Hammer
      Pages 33-41
  3. Policies

    1. Towards Unified Authorization for Android

      • Michael J. May, Karthikeyan Bhargavan
      Pages 42-57
    2. Model-Based Usage Control Policy Derivation

      • Prachi Kumari, Alexander Pretschner
      Pages 58-74
    3. Compositional Verification of Application-Level Security Properties

      • Linda Ariani Gunawan, Peter Herrmann
      Pages 75-90
  4. Proving

    1. Towards Verifying Voter Privacy through Unlinkability

      • Denis Butin, David Gray, Giampaolo Bella
      Pages 91-106
    2. Confidentiality for Probabilistic Multi-threaded Programs and Its Verification

      • Tri Minh Ngo, Mariëlle Stoelinga, Marieke Huisman
      Pages 107-122
    3. A Fully Homomorphic Crypto-Processor Design

      • Peter T. Breuer, Jonathan P. Bowen
      Pages 123-138
  5. Formal Methods

    1. dkal  ⋆ : Constructing Executable Specifications of Authorization Protocols

      • Jean-Baptiste Jeannin, Guido de Caso, Juan Chen, Yuri Gurevich, Prasad Naldurg, Nikhil Swamy
      Pages 139-154
    2. A Formal Approach for Inspecting Privacy and Trust in Advanced Electronic Services

      • Koen Decroix, Jorn Lapon, Bart De Decker, Vincent Naessens
      Pages 155-170
    3. Idea: Writing Secure C Programs with SecProve

      • Myla M. Archer, Elizabeth I. Leonard, Constance L. Heitmeyer
      Pages 171-180
  6. Analyzing

    1. Anatomy of Exploit Kits

      • Vadim Kotov, Fabio Massacci
      Pages 181-196
    2. An Empirical Study on the Effectiveness of Security Code Review

      • Anne Edmundson, Brian Holtkamp, Emanuel Rivera, Matthew Finifter, Adrian Mettler, David Wagner
      Pages 197-212
    3. Erratum: A Fully Homomorphic Crypto-Processor Design

      • Peter T. Breuer, Jonathan P. Bowen
      Pages E1-E1
  7. Back Matter

Other Volumes

  1. Engineering Secure Software and Systems

About this book

This book constitutes the refereed proceedings of the 5th International Symposium on Engineering Secure Software and Systems, ESSoS 2013, held in Paris, France, in February/March 2013. The 13 revised full papers presented together with two idea papers were carefully reviewed and selected from 62 submissions. The papers are organized in topical sections on secure programming, policies, proving, formal methods, and analyzing.

Editors and Affiliations

  • Department of Computer Science, TU Dortmund und Fraunhofer ISST, Dortmund, Germany

    Jan Jürjens

  • One Microsoft Way, Microsoft Research, Redmond, USA

    Benjamin Livshits

  • Department of Computer Science, Katholieke Universiteit Leuven, Heverlee, Belgium

    Riccardo Scandariato

Bibliographic Information

Buy it now

Buying options

eBook USD 54.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 72.00
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access