Sciweavers

97
Voted
ESSOS
2010
Springer
15 years 11 months ago
CsFire: Transparent Client-Side Mitigation of Malicious Cross-Domain Requests
Protecting users in the ubiquitous online world is becoming more and more important, as shown by web application security – or the lack thereof – making the mainstream news. On...
Philippe De Ryck, Lieven Desmet, Thomas Heyman, Fr...
110
Voted
ESSOS
2010
Springer
15 years 11 months ago
Model-Driven Security Policy Deployment: Property Oriented Approach
Stere Preda, Nora Cuppens-Boulahia, Fréd&ea...
81
Voted
ESSOS
2010
Springer
15 years 11 months ago
Secure Code Generation for Web Applications
Martin Johns, Christian Beyerlein, Rosemaria Giese...
104
Voted
ESSOS
2010
Springer
15 years 11 months ago
Experiences with PDG-Based IFC
Information flow control systems provide the guarantees that are required in today’s security-relevant systems. While the literature has produced a wealth of techniques to ensur...
Christian Hammer
123
Voted
ESSOS
2010
Springer
15 years 11 months ago
Idea: Opcode-Sequence-Based Malware Detection
Malware is every malicious code that has the potential to harm any computer or network. The amount of malware is increasing faster every year and poses a serious security threat. H...
Igor Santos, Felix Brezo, Javier Nieves, Yoseba K....
115
Voted
ESSOS
2010
Springer
15 years 11 months ago
Automatic Generation of Smart, Security-Aware GUI Models
In many software applications, users access application data using graphical user interfaces (GUIs). There is an important, but little explored, link between visualization and secu...
David A. Basin, Manuel Clavel, Marina Egea, Michae...
111
Voted
ESSOS
2010
Springer
15 years 11 months ago
Formally-Based Black-Box Monitoring of Security Protocols
In the challenge of ensuring the correct behaviour of legacy implementations of security protocols, a formally-based approach is presented to design and implement monitors that sto...
Alfredo Pironti, Jan Jürjens
127
Voted
ESSOS
2010
Springer
15 years 11 months ago
Idea: Towards Architecture-Centric Security Analysis of Software
Static security analysis of software has made great progress over the last years. In particular, this applies to the detection of lowlevel security bugs such as buffer overflows,...
Karsten Sohr, Bernhard Berger
119
Voted
IUI
2009
ACM
15 years 11 months ago
Learning to generalize for complex selection tasks
Selection tasks are common in modern computer interfaces: we are often required to select a set of files, emails, data entries, and the like. File and data browsers have sorting a...
Alan Ritter, Sumit Basu
120
Voted
IUI
2009
ACM
15 years 11 months ago
Predictive text input in a mobile shopping assistant: methods and interface design
The fundamental nature of grocery shopping makes it an interesting domain for intelligent mobile assistants. Even though the central role of shopping lists is widely recognized, r...
Petteri Nurmi, Andreas Forsblom, Patrik Flor&eacut...