[PDF][PDF] Software-defined Networking: Improving Security for Enterprise and Home Networks
CR Taylor - 2017 - digital.wpi.edu
In enterprise networks, all aspects of the network, such as placement of security devices and
performance, must be carefully considered. Even with forethought, networks operators are …
performance, must be carefully considered. Even with forethought, networks operators are …
A measurement and security analysis of ssl/tls deployment in mobile applications
Y Guo, Z Cao, W Yang, G Xiong - … 24–26, 2016, Proceedings, Part I 11, 2018 - Springer
Abstract Secure Socket Layer (SSL) and Transport Layer Security (TLS) have been widely
used to provide security in communications. With the rapid development of mobile Internet …
used to provide security in communications. With the rapid development of mobile Internet …
Detecting memory life-cycle bugs with extended define-use chain analysis
G Zhang - IEEE Access, 2020 - ieeexplore.ieee.org
OS kernels leverage various memory allocation functions to carry out memory allocation,
and memory data in kernel space of OS should be cautiously handled, eg, allocating with …
and memory data in kernel space of OS should be cautiously handled, eg, allocating with …
[PDF][PDF] SAMBA: Detecting SSL/TLS API Misuses in IoT Binary Applications
IoT devices are increasingly adopting Secure Socket Layer (SSL) and Transport Layer
Security (TLS) protocols. However, the misuse of SSL/TLS libraries still threatens the …
Security (TLS) protocols. However, the misuse of SSL/TLS libraries still threatens the …
The security layer
MT O'Neill - 2019 - search.proquest.com
In this dissertation we argue that the problems described are the result of an improper
placement of security responsibilities. We show that by placing TLS services in the operating …
placement of security responsibilities. We show that by placing TLS services in the operating …
[图书][B] Understanding flaws in the deployment and implementation of web encryption
S Sivakorn - 2018 - search.proquest.com
In recent years, the web has switched from using the unencrypted HTTP protocol to using
encrypted communications. Primarily, this resulted in increasing deployment of TLS to …
encrypted communications. Primarily, this resulted in increasing deployment of TLS to …
[PDF][PDF] On the importance of ecologically valid usable security research for end users and IT workers
S Fahl - 2016 - repo.uni-hannover.de
To the best of my knowledge, my work is the first to reveal the importance of usable security
and privacy research to address human factors for end users, administrators, developers …
and privacy research to address human factors for end users, administrators, developers …
From Theory to Practice: Deployment-grade Tools and Methodologies for Software Security
S Rahaman - 2020 - vtechworks.lib.vt.edu
Following proper guidelines and recommendations are crucial in software security, which is
mostly obstructed by accidental human errors. Automatic screening tools have great …
mostly obstructed by accidental human errors. Automatic screening tools have great …
Systematic Evaluations Of Security Mechanism Deployments
SY Chau - 2019 - search.proquest.com
In a potentially hostile networked environment, a large diversity of security mechanisms with
varying degree of sophistication are being deployed to protect valuable computer systems …
varying degree of sophistication are being deployed to protect valuable computer systems …
[PDF][PDF] THE PURDUE UNIVERSITY GRADUATE SCHOOL STATEMENT OF DISSERTATION APPROVAL
M Payer - 2019 - hexhive.epfl.ch
As computer systems evolve, they become a prominent target for all kinds of attacks. Some
attacks such as control-flow hijacking, can have devastating effects as they force the system …
attacks such as control-flow hijacking, can have devastating effects as they force the system …