Advertisement

Engineering Secure Software and Systems

8th International Symposium, ESSoS 2016, London, UK, April 6–8, 2016. Proceedings

  • Juan Caballero
  • Eric Bodden
  • Elias Athanasopoulos

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9639)

Also part of the Security and Cryptology book sub series (LNSC, volume 9639)

Table of contents

  1. Front Matter
    Pages I-X
  2. Mohammad Torabi Dashti , David Basin
    Pages 1-19
  3. Willard Rafnsson, Deepak Garg, Andrei Sabelfeld
    Pages 20-37
  4. Enrico Lovat, Martín Ochoa, Alexander Pretschner
    Pages 38-55
  5. Bernhard J. Berger, Karsten Sohr, Rainer Koschke
    Pages 56-71
  6. Achim D. Brucker, Michael Herzberg
    Pages 72-88
  7. Quanlong Guan, Heqing Huang, Weiqi Luo, Sencun Zhu
    Pages 89-105
  8. Tom Van Goethem, Wout Scheepers, Davy Preuveneers, Wouter Joosen
    Pages 106-121
  9. Benjamin Fogel, Shane Farmer, Hamza Alkofahi, Anthony Skjellum, Munawar Hafiz
    Pages 122-137
  10. Andreas Follner, Alexandre Bartel, Eric Bodden
    Pages 155-172
  11. Stanislav Dashevskyi, Achim D. Brucker, Fabio Massacci
    Pages 190-206
  12. Joseph Hallett, David Aspinall
    Pages 216-232
  13. Pauline Anthonysamy, Matthew Edwards, Chris Weichel, Awais Rashid
    Pages 233-250
  14. Jasper Bogaerts, Bert Lagaisse, Wouter Joosen
    Pages 251-259
  15. Eric Rothstein Morris, Joachim Posegga
    Pages 260-268
  16. Back Matter

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 8th International Symposium on Engineering Secure Software and Systems, ESSoS 2016, held in London, UK, in April 2016. The 13 full papers presented together with 3 short papers and 1 invited talk were carefully reviewed and selected from 50 submissions. 
The goal of this symposium, is to bring together researchers and practitioners to advance the states of the art and practice in secure software engineering. 
The presentations and associated publications at ESSoS 2016 contribute to this goal in several directions: First, by improving methodologies for secure software engineering (such as flow analysis and policy
compliance). Second, with results for the detection and analysis of software vulnerabilities and the attacks they enable. Finally, for securing software for specific application domains (such as mobile devices and access control).

Keywords

Cloud security Embedded software security Malware detection Security measurements Web applications security Code analysis for security Computer forensics Domain-specific languages Mobile devices security Model checking for security Operating system security Program rewriting Programming models Programming paradigms Reverse-engineering Secure software engineering Security testing Security-oriented software reconfiguration Verification techniques Vulnerability analysis

Editors and affiliations

  • Juan Caballero
    • 1
  • Eric Bodden
    • 2
  • Elias Athanasopoulos
    • 3
  1. 1.IMDEA Software InstituteMadridSpain
  2. 2.Paderborn University & Fraunhofer IEMPaderbornGermany
  3. 3.VU UniversityAmsterdamThe Netherlands

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-30806-7
  • Copyright Information Springer International Publishing Switzerland 2016
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-30805-0
  • Online ISBN 978-3-319-30806-7
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Pharma
Automotive
Biotechnology
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Energy, Utilities & Environment
Aerospace
Engineering