did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9783642117466

Engineering Secure Software and Systems : Second International Symposium, ESSoS 2010, Pisa, Italy, February 3-4, 2010, Proceedings

by ; ;
  • ISBN13:

    9783642117466

  • ISBN10:

    3642117465

  • Edition: 1st
  • Format: Paperback
  • Copyright: 2010-02-25
  • Publisher: Springer Verlag
  • Purchase Benefits
List Price: $99.00 Save up to $80.44
  • Digital
    $40.22
    Add to Cart

    DURATION
    PRICE

Supplemental Materials

What is included with this book?

Summary

This book constitutes the refereed proceedings of the Second International Symposium on Engineering Secure Software and Systems, ESSoS 2010, held in Pisa, Italy, in February 2010.The 9 revised full papers presented together with 8 ideas papers were carefully reviewed and selected from 58 submissions. The papers are organized in topical sections on attack analysis and prevention, policy verification and enforcement, and secure system and software development.

Table of Contents

Attack Analysis and Prevention I
BuBBle: A Javascript Engine Level Countermeasure against Heap-Spraying Attacksp. 1
CsFire: Transparent Client-Side Mitigation of Malicious Cross-Domain Requestsp. 18
Idea: Opcode-Sequence-Based Malware Detectionp. 35
Attack Analysis and Prevention II
Experiences with PDG-Based IFCp. 44
Idea: Java vs. PHP: Security Implications of Language Choice for Web Applicationsp. 61
Idea: Towards Architecture-Centric Security Analysis of Softwarep. 70
Policy Verification and Enforcement I
Formally-Based Black-Box Monitoring of Security Protocolsp. 79
Secure Code Generation for Web Applicationsp. 96
Idea: Reusability of Threat Models - Two Approaches with an Experimental Evaluationp. 114
Policy Verification and Enforcement II
Model-Driven Security Policy Deployment: Property Oriented Approachp. 123
Category-Based Authorisation Models: Operational Semantics and Expressive Powerp. 140
Idea: Efficient Evaluation of Access Control Constraintsp. 157
Secure System and Software Development I
Formal Verification of Application-Specific Security Properties in a Model-Driven Approachp. 166
Idea: Enforcing Consumer-Specified Security Properties for Modular Softwarep. 182
Idea: Using System Level Testing for Revealing SQL Injection-Related Error Message Information Leaksp. 192
Secure System and Software Development II
Automatic Generation of Smart, Security-Aware GUI Modelsp. 201
Report: Modular Safeguards to Create Holistic Security Requirement Specifications for System of Systemsp. 218
Idea: A Feasibility Study in Model Based Prediction of Impact of Changes on System Qualityp. 231
Author Indexp. 241
Table of Contents provided by Ingram. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program