Invited Talks |
Analyzing Explicit Information Flow / Sriram K. Rajamani |
WebAppArmor: A Framework for Robust Prevention of Attacks on Web Applications (Invited Paper) / V.N. Venkatakrishnan ; Prithvi Bisht ; Mike Ter Louw ; Michelle Zhou ; Kalpana Gondi ; Karthik Thotta Ganesh |
Toward Securely Programming the Internet / Andrew C. Myers |
Attribution of Malicious Behavior / Jonathon Giffin ; Abhinav Srivastava |
Integrity and Verifiability |
Unifying Facets of Information Integrity / Arnar Birgisson ; Alejandro Russo ; Andrei Sabelfeld |
Determining the Integrity of Application Binaries on Unsecure Legacy Machines Using Software Based Remote Attestation / Raghunathan Srinivasan ; Partha Dasgupta ; Tushar Gohad ; Amiya Bhattacharya |
Stamp-It: A Method for Enhancing the Universal Verifiability of E2E Voting Systems / Mridul Nandi ; Stefan Popoveniuc ; Poorvi L. Vora |
Web and Data Security |
Strengthening XSRF Defenses for Legacy Web Applications Using Whitebox Analysis and Transformation |
Coverage Criteria for Automatic Security Testing of Web Applications / Thanh Binh Dao ; Etsuya Shibayama |
A Practical Generic Privacy Language / Moritz Y. Becker ; Alexander Malkis ; Laurent Bussard |
Efficient Detection of the Return-Oriented Programming Malicious Code / Ping Chen ; Xiao Xing ; Hao Han ; Bing Mao ; Li Xie |
ValueGuard: Protection of Native Applications against Data-Only Buffer Overflows / Steven Van Acker ; Nick Nikiforakis ; Pieter Philippaerts ; Yves Younan ; Frank Piessens |
Access Control and Auditing |
Mining RBAC Roles under Cardinality Constraint / Ravi Kumar ; Shamik Sural ; Arobinda Gupta |
Specification of History Based Constraints for Access Control in Conceptual Level / Fathiyeh Faghih ; Morteza Amini ; Rasool Jalili |
Abstracting Audit Data for Lightweight Intrusion Detection / Wei Wang ; Xiangliang Zhang ; Georgios Pitsilis |
System Security |
A Persistent Public Watermarking of Relational Databases / Raju Halder ; Agostino Cortesi |
Security Rules versus Security Properties / Mathieu Jaume |
Protecting and Restraining the Third Party in RFID-Enabled 3PL Supply Chains / Shaoying Cai ; Chunhua Su ; Yingjiu Li ; Robert Deng ; Tieyan Li |
Author Index |
Invited Talks |
Analyzing Explicit Information Flow / Sriram K. Rajamani |
WebAppArmor: A Framework for Robust Prevention of Attacks on Web Applications (Invited Paper) / V.N. Venkatakrishnan ; Prithvi Bisht ; Mike Ter Louw ; Michelle Zhou ; Kalpana Gondi ; Karthik Thotta Ganesh |
Toward Securely Programming the Internet / Andrew C. Myers |
Attribution of Malicious Behavior / Jonathon Giffin ; Abhinav Srivastava |
Integrity and Verifiability |