Inference of Residual Attack Surface Under Mitigations
KK Ispoglou - 2019 - search.proquest.com
Despite the broad diversity of attacks and the many different ways an adversary can exploit a
system, each attack can be divided into different phases. These phases include the …
system, each attack can be divided into different phases. These phases include the …
[PDF][PDF] Make Crypto Safe Again!
MVX Ferreira, M Möser - matheusvxf.github.io
The codebases of many popular cryptographic libraries are the result of decades of
development and incremental changes. OpenSSL for example, arguably the most important …
development and incremental changes. OpenSSL for example, arguably the most important …
[图书][B] Advanced Security Analysis for Emergent Software Platforms
M Alhanahnah - 2019 - search.proquest.com
Emergent software ecosystems, boomed by the advent of smartphones and the Internet of
Things (IoT) platforms, are perpetually sophisticated, deployed into highly dynamic …
Things (IoT) platforms, are perpetually sophisticated, deployed into highly dynamic …
[PDF][PDF] DETECTION OF GENERALIZABLE CLONE SECURITY CODING BUGS
R Bryce - 2018 - core.ac.uk
System bugs such as faults/errors and security vulnerabilities are significant concerns for
software applications. Any coding operation that causes the system to behave unusually is …
software applications. Any coding operation that causes the system to behave unusually is …
Analyzing TLS interception in middleware network appliances
L Waked - 2018 - spectrum.library.concordia.ca
Network traffic inspection, including TLS traffic, in enterprise environments is widely
practiced. Reasons are primarily related to improving enterprise security (eg, phishing and …
practiced. Reasons are primarily related to improving enterprise security (eg, phishing and …
[PDF][PDF] Poster: The Secure Socket API
Transport Layer Security is the protocol most-responsible for encryption on the Internet
today. Unfortunately, popular TLS security libraries, such as OpenSSL and GnuTLS, while …
today. Unfortunately, popular TLS security libraries, such as OpenSSL and GnuTLS, while …
[图书][B] A Large-Scale Analysis of How OpenSSL Is Used in Open-Source Software
SJ Heidbrink - 2018 - search.proquest.com
As vulnerabilities become more common the security of applications are coming under
increased scrutiny. In regards to Internet security, recent work discovers that many …
increased scrutiny. In regards to Internet security, recent work discovers that many …
[图书][B] Security and Privacy of Single Sign-On Protocols: Vulnerability Analysis and Automated Testing
R Yang - 2017 - search.proquest.com
Abstract Single Sign-On (SSO) protocols like OAuth2. 0 and OpenID Connect (OIDC) have
been widely adopted by mainstream identity providers (eg, Facebook and Google, etc.), to …
been widely adopted by mainstream identity providers (eg, Facebook and Google, etc.), to …
[PDF][PDF] APISAN: Sanitizing API Usages through Semantic Cross-checking
IYCMX Si, YJTKM Naik - cs.toronto.edu
API misuse is a well-known source of bugs. Some of them (eg, incorrect use of SSL API, and
integer overflow of memory allocation size) can cause serious security vulnerabilities (eg …
integer overflow of memory allocation size) can cause serious security vulnerabilities (eg …
THE PURDUE UNIVERSITY GRADUATE SCHOOL STATEMENT OF DISSERTATION APPROVAL
Z Shen - 2020 - search.proquest.com
Although current augmented, virtual, and mixed reality (AR/VR/MR) systems are facing
advanced and immersive experience in the entertainment industry with countless media …
advanced and immersive experience in the entertainment industry with countless media …