[PDF][PDF] Software-defined Networking: Improving Security for Enterprise and Home Networks

CR Taylor - 2017 - digital.wpi.edu
In enterprise networks, all aspects of the network, such as placement of security devices and
performance, must be carefully considered. Even with forethought, networks operators are …

A measurement and security analysis of ssl/tls deployment in mobile applications

Y Guo, Z Cao, W Yang, G Xiong - … 24–26, 2016, Proceedings, Part I 11, 2018 - Springer
Abstract Secure Socket Layer (SSL) and Transport Layer Security (TLS) have been widely
used to provide security in communications. With the rapid development of mobile Internet …

Detecting memory life-cycle bugs with extended define-use chain analysis

G Zhang - IEEE Access, 2020 - ieeexplore.ieee.org
OS kernels leverage various memory allocation functions to carry out memory allocation,
and memory data in kernel space of OS should be cautiously handled, eg, allocating with …

[PDF][PDF] SAMBA: Detecting SSL/TLS API Misuses in IoT Binary Applications

K Liu, M Yang, Z Ling, Y Zhang, C Lei, L Luo, X Fu - yuanxzhang.github.io
IoT devices are increasingly adopting Secure Socket Layer (SSL) and Transport Layer
Security (TLS) protocols. However, the misuse of SSL/TLS libraries still threatens the …

The security layer

MT O'Neill - 2019 - search.proquest.com
In this dissertation we argue that the problems described are the result of an improper
placement of security responsibilities. We show that by placing TLS services in the operating …

[图书][B] Understanding flaws in the deployment and implementation of web encryption

S Sivakorn - 2018 - search.proquest.com
In recent years, the web has switched from using the unencrypted HTTP protocol to using
encrypted communications. Primarily, this resulted in increasing deployment of TLS to …

[PDF][PDF] On the importance of ecologically valid usable security research for end users and IT workers

S Fahl - 2016 - repo.uni-hannover.de
To the best of my knowledge, my work is the first to reveal the importance of usable security
and privacy research to address human factors for end users, administrators, developers …

From Theory to Practice: Deployment-grade Tools and Methodologies for Software Security

S Rahaman - 2020 - vtechworks.lib.vt.edu
Following proper guidelines and recommendations are crucial in software security, which is
mostly obstructed by accidental human errors. Automatic screening tools have great …

Systematic Evaluations Of Security Mechanism Deployments

SY Chau - 2019 - search.proquest.com
In a potentially hostile networked environment, a large diversity of security mechanisms with
varying degree of sophistication are being deployed to protect valuable computer systems …

[PDF][PDF] THE PURDUE UNIVERSITY GRADUATE SCHOOL STATEMENT OF DISSERTATION APPROVAL

M Payer - 2019 - hexhive.epfl.ch
As computer systems evolve, they become a prominent target for all kinds of attacks. Some
attacks such as control-flow hijacking, can have devastating effects as they force the system …