Inference of Residual Attack Surface Under Mitigations

KK Ispoglou - 2019 - search.proquest.com
Despite the broad diversity of attacks and the many different ways an adversary can exploit a
system, each attack can be divided into different phases. These phases include the …

[PDF][PDF] Make Crypto Safe Again!

MVX Ferreira, M Möser - matheusvxf.github.io
The codebases of many popular cryptographic libraries are the result of decades of
development and incremental changes. OpenSSL for example, arguably the most important …

[图书][B] Advanced Security Analysis for Emergent Software Platforms

M Alhanahnah - 2019 - search.proquest.com
Emergent software ecosystems, boomed by the advent of smartphones and the Internet of
Things (IoT) platforms, are perpetually sophisticated, deployed into highly dynamic …

[PDF][PDF] DETECTION OF GENERALIZABLE CLONE SECURITY CODING BUGS

R Bryce - 2018 - core.ac.uk
System bugs such as faults/errors and security vulnerabilities are significant concerns for
software applications. Any coding operation that causes the system to behave unusually is …

Analyzing TLS interception in middleware network appliances

L Waked - 2018 - spectrum.library.concordia.ca
Network traffic inspection, including TLS traffic, in enterprise environments is widely
practiced. Reasons are primarily related to improving enterprise security (eg, phishing and …

[PDF][PDF] Poster: The Secure Socket API

M O'Neill, S Heidbrink, K Seamons, D Zappala - ieee-security.org
Transport Layer Security is the protocol most-responsible for encryption on the Internet
today. Unfortunately, popular TLS security libraries, such as OpenSSL and GnuTLS, while …

[图书][B] A Large-Scale Analysis of How OpenSSL Is Used in Open-Source Software

SJ Heidbrink - 2018 - search.proquest.com
As vulnerabilities become more common the security of applications are coming under
increased scrutiny. In regards to Internet security, recent work discovers that many …

[图书][B] Security and Privacy of Single Sign-On Protocols: Vulnerability Analysis and Automated Testing

R Yang - 2017 - search.proquest.com
Abstract Single Sign-On (SSO) protocols like OAuth2. 0 and OpenID Connect (OIDC) have
been widely adopted by mainstream identity providers (eg, Facebook and Google, etc.), to …

[PDF][PDF] APISAN: Sanitizing API Usages through Semantic Cross-checking

IYCMX Si, YJTKM Naik - cs.toronto.edu
API misuse is a well-known source of bugs. Some of them (eg, incorrect use of SSL API, and
integer overflow of memory allocation size) can cause serious security vulnerabilities (eg …

THE PURDUE UNIVERSITY GRADUATE SCHOOL STATEMENT OF DISSERTATION APPROVAL

Z Shen - 2020 - search.proquest.com
Although current augmented, virtual, and mixed reality (AR/VR/MR) systems are facing
advanced and immersive experience in the entertainment industry with countless media …