ESSoS 2016 April 6, 2016 to April 8, 2016, london,uk

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Security Testing beyond Functional Tests David Basin N/A
PAPER SESSION: FLOW ANALYSIS Awais Rahid N/A
Progress-Sensitive Security for SPARK Deepak Garg , Andrei Sabelfeld , Willard Rafnsson N/A
Sound and Precise Cross-Layer Data Flow Tracking Alexander Pretschner , Enrico Lovat , Martin Ochoa N/A
Automatically Extracting Threats from Extended Data Flow Diagrams Karsten Sohr , Bernhard J. Berger , Rainer Koschke N/A
How much security is too much? Karsten Nohl N/A
PAPER SESSION: ATTACKS Roberto Giacobazzi N/A
POODLEs, More POODLEs, FREAK Attacks too: How Server Administrators Responded to Three Serious Web Vulnerabilities Benjamin Fogel , Shane Farmer , Hamza Alkofahi , Anthony Skjellum , Munawar Hafiz N/A
star HexPADS: a platform to detect stealth attacks Mathias Payer N/A
star Analyzing the Gadgets - Towards a Metric to Measure Gadget Quality Alexandre Bartel , Eric Bodden , Andreas Follner N/A
PAPER SESSION: MOBILE Johannes Kinder N/A
On the Static Analyse of Hybrid Mobile Apps Achim D. Brucker , Michael Herzberg N/A
Semantics-based Repackaging Detection for Mobile Apps Sencun Zhu , Weiqi Luo , Heqing Huang , Quanlong Guan N/A
Accelerometer-based Device Fingerprinting for Multi-factor Mobile Authentication Wouter Joosen , Tom Van Goethem , Wout Scheepers , Davy Preuveneers N/A
Delivering secure and usable systems - who needs to know what Angela Sasse N/A
PAPER SESSION: VULNERABILITIES Mathias Payer N/A
star Empirical Analysis and Modeling of Black-Box Mutational Fuzzing Peng Liu , Mingyi Zhao N/A
On the Security Cost of Using a Free and Open Source Component in a Proprietary Product Fabio Massacci , Achim D. Brucker , Stanislav Dashevskyi N/A
Idea: Usable Platforms for Secure Programming -- Mining Unix for Insight and Guidelines Sven Türpe N/A
PAPER SESSION: POLICIES Achim D. Brucker N/A
AppPAL for Android: Capturing and Checking Mobile App Policies David Aspinall , Joseph Hallett N/A
Inferring Semantic Mapping Between Policies and Code: The Clue is in the Language Matthew Edwards , Awais Rashid , Pauline Anthonysamy , Christian Weichel N/A
Idea: Supporting Policy-Based Access Control on Database Systems Wouter Joosen , Bert Lagaisse , Jasper Bogaerts N/A