000754525 000__ 04199cam\a2200529Ii\4500 000754525 001__ 754525 000754525 005__ 20230306141712.0 000754525 006__ m\\\\\o\\d\\\\\\\\ 000754525 007__ cr\cn\nnnunnun 000754525 008__ 160404s2016\\\\sz\a\\\\o\\\\\101\0\eng\d 000754525 020__ $$a9783319308067$$q(electronic book) 000754525 020__ $$a3319308068$$q(electronic book) 000754525 020__ $$z9783319308050 000754525 035__ $$aSP(OCoLC)ocn945923998 000754525 035__ $$aSP(OCoLC)945923998 000754525 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dAZU$$dOCLCO$$dYDXCP 000754525 049__ $$aISEA 000754525 050_4 $$aQA76.9.A25$$bE77 2016eb 000754525 08204 $$a005.8$$223 000754525 1112_ $$aESSoS (Symposium)$$n(8th :$$d2016 :$$cLondon, England) 000754525 24510 $$aEngineering secure software and systems$$h[electronic resource] :$$b8th International Symposium, ESSoS 2016, London, UK, April 6-8, 2016. Proceedings /$$cJuan Caballero, Eric Bodden, Elias Athanasopoulos (eds.). 000754525 2463_ $$aESSoS 2016 000754525 264_1 $$aCham :$$bSpringer,$$c2016. 000754525 300__ $$a1 online resource (x, 269 pages) :$$billustrations. 000754525 336__ $$atext$$btxt$$2rdacontent 000754525 337__ $$acomputer$$bc$$2rdamedia 000754525 338__ $$aonline resource$$bcr$$2rdacarrier 000754525 4901_ $$aLecture notes in computer science,$$x0302-9743 ;$$v9639 000754525 4901_ $$aLNCS sublibrary. SL 4, Security and cryptology 000754525 500__ $$aInternational conference proceedings. 000754525 500__ $$aIncludes author index. 000754525 5050_ $$aSecurity Testing beyond Functional Tests -- Progress-Sensitive Security for SPARK -- Sound and Precise Cross-Layer Data Flow Tracking -- Automatically Extracting Threats from Extended Data Flow Diagrams -- On the Static Analysis of Hybrid Mobile Apps -- Semantics-based Repackaging Detection for Mobile Apps -- Accelerometer-based Device Fingerprinting for Multi-factor Mobile Authentication -- POODLEs, More POODLEs, FREAK Attacks too: How Server Administrators Responded to Three Serious Web Vulnerabilities -- PADS: a platform to detect stealth attacks -- Analyzing the Gadgets -- Towards a Metric to Measure Gadget Quality -- Empirical Analysis and Modeling of Black-Box Mutational Fuzzing -- On the Security Cost of Using a Free and Open Source Component in a Proprietary Product -- Idea: Usable Platforms for Secure Programming { Mining Unix for Insight and Guidelines -- AppPAL for Android: Capturing and Checking Mobile App Policies -- Inferring Semantic Mapping Between Policies and Code: The Clue is in the Language -- Idea: Supporting Policy-Based Access Control on Database Systems -- Idea: Enforcing Security Properties by Solving Behavioural Equations. 000754525 506__ $$aAccess limited to authorized users. 000754525 520__ $$aThis book constitutes the refereed proceedings of the 8th International Symposium on Engineering Secure Software and Systems, ESSoS 2016, held in London, UK, in April 2016. The 13 full papers presented together with 3 short papers and 1 invited talk were carefully reviewed and selected from 50 submissions. The goal of this symposium, is to bring together researchers and practitioners to advance the states of the art and practice in secure software engineering. The presentations and associated publications at ESSoS 2016 contribute to this goal in several directions: First, by improving methodologies for secure software engineering (such as flow analysis and policy compliance). Second, with results for the detection and analysis of software vulnerabilities and the attacks they enable. Finally, for securing software for specific application domains (such as mobile devices and access control). 000754525 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed April 4, 2016). 000754525 650_0 $$aComputer security$$vCongresses. 000754525 650_0 $$aSoftware engineering$$vCongresses. 000754525 650_0 $$aData encryption (Computer science)$$vCongresses. 000754525 7001_ $$aCaballero, Juan$$c(Software engineer),$$eeditor. 000754525 7001_ $$aBodden, Eric,$$eeditor. 000754525 7001_ $$aAthanasopoulos, Elias,$$eeditor. 000754525 830_0 $$aLecture notes in computer science ;$$v9639. 000754525 830_0 $$aLNCS sublibrary.$$nSL 4,$$pSecurity and cryptology. 000754525 852__ $$bebk 000754525 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-30806-7$$zOnline Access$$91397441.1 000754525 909CO $$ooai:library.usi.edu:754525$$pGLOBAL_SET 000754525 980__ $$aEBOOK 000754525 980__ $$aBIB 000754525 982__ $$aEbook 000754525 983__ $$aOnline 000754525 994__ $$a92$$bISE