Control-Flow Integrity in Web Applications Using Security Policies to Automate Placement of Network Intrusion Prevention.- Idea: Callee-Site Rewriting of Sealed System Libraries.- Towards Unified Authorization for Android.- Model-Based Usage Control Policy Derivation.- Compositional Verification of Application-Level Security Properties.- Towards Verifying Voter Privacy through Unlinkability.- Confidentiality for Probabilistic Multi-threaded Programs and Its Verification.- A Fully Homomorphic Crypto-Processor Design: Correctness of a Secret Computer.- DKAL: Constructing Executable Specifications of Authorization Protocols.- A Formal Approach for Inspecting Privacy and Trust in Advanced Electronic services.- Idea: Writing Secure C Programs with SecProve.- Anatomy of Exploit Kits: Preliminary Analysis of Exploit Kits as Software Artefacts.- An Empirical Study on the Effectiveness of Security Code Review.- Eliminating SQL Injection and Cross Site Scripting Using Aspect Oriented Programming.
ThriftBooks sells millions of used books at the lowest everyday prices. We personally assess every book's quality and offer rare, out-of-print treasures. We deliver the joy of reading in recyclable packaging with free standard shipping on US orders over $15. ThriftBooks.com. Read more. Spend less.