UC security realized with setup devices imposes that single instances of these setups are used. In most cases, UC-realization relies further on other properties of the setups devi...
In recent years, many organizations have established bounty programs that attract white hat hackers who contribute vulnerability reports of web systems. In this paper, we collect ...
Current Control-Flow Integrity (CFI) implementations track control edges individually, insensitive to the context of preceding edges. Recent work demonstrates that this leaves suf...
Victor van der Veen, Dennis Andriesse, Enes Gö...
Firewall configuration is a critical activity for the Supervisory Control and Data Acquisition (SCADA) networks that control power stations, water distribution, factory automatio...
Dinesha Ranathunga, Matthew Roughan, Phil Kernick,...
We provide a formal treatment of security of digital signatures against subversion attacks (SAs). Our model of subversion generalizes previous work in several directions, and is i...
Giuseppe Ateniese, Bernardo Magri, Daniele Venturi
Abstract. A formalization of a logical subset of Goal Structuring Notation (GSN) arguments is presented. The aim is to reveal the conditions which must be true in order to guarante...
Abstract. Incremental design is an essential part of engineering. Without it, engineering would not likely be an economic, nor an effective, aid to economic progress. Further, eng...
The intricacy of socio-technical systems requires a careful planning and utilisation of security resources to ensure uninterrupted, secure and reliable services. Even though many s...
Florian Arnold, Dennis Guck, Rajesh Kumar, Mari&eu...