Guest Editors' Introduction: Why Attacking Systems Is a Good Idea
IEEE Security and Privacy
Beyond Stack Smashing: Recent Advances in Exploiting Buffer Overruns
IEEE Security and Privacy
Bridging the Gap between Software Development and Information Security
IEEE Security and Privacy
Towards a structured unified process for software security
Proceedings of the 2006 international workshop on Software engineering for secure systems
Improving self defense by learning from limited experience
Proceedings of the 4th annual workshop on Cyber security and information intelligence research: developing strategies to meet the cyber security and information intelligence challenges ahead
Proceedings of the eighteenth international symposium on Software testing and analysis
Heap Taichi: exploiting memory allocation granularity in heap-spraying attacks
Proceedings of the 26th Annual Computer Security Applications Conference
Using labeling to prevent cross-service attacks against smart phones
DIMVA'06 Proceedings of the Third international conference on Detection of Intrusions and Malware & Vulnerability Assessment
HackSim: an automation of penetration testing for remote buffer overflow vulnerabilities
ICOIN'05 Proceedings of the 2005 international conference on Information Networking: convergence in broadband and mobile networking
Environment-sensitive intrusion detection
RAID'05 Proceedings of the 8th international conference on Recent Advances in Intrusion Detection
Improving Memory Management Security for C and C++
International Journal of Secure Software Engineering
A methodology for testing CPU emulators
ACM Transactions on Software Engineering and Methodology (TOSEM) - Testing, debugging, and error handling, formal methods, lifecycle concerns, evolution and maintenance
Hi-index | 0.00 |