There are several ways to mitigate security breaches proactively. This thesis introduces portable security methods that can be adapted in any Unix-like oper- ating system. These methods can help to mitigate the harm done by a malicious attacker who has already gained a partial access into the system. The main focus in the thesis is to give an idea how attacks can be pursued and how to protect against them. The first research question is: What proactive steps can be done to reduce errors and vulnerabilities in code before it is released? What methods can be adapted to harden the code and make it less penetrable? I examine a few design principles which are known to be good against malicious activities. The second research question is: ...
We have to face a simple, yet, disturbing fact: current computing is inherently insecure. The system...
This research examines how software specifications could be used to build more-secure software. For ...
The project focuses on developing a static code analyser which processes source code into relational...
There are several ways to mitigate security breaches proactively. This thesis introduces portable se...
Software vulnerabilities are added into programs during its development. Architectural flaws are int...
This thesis contributes to three research areas in software security, namely security requirements a...
The goal of the research presented in this dissertation is to prevent, detect, and mitigate maliciou...
Software vulnerabilities are added into programs during its development. Architectural flaws are i...
Malicious code detection is a crucial component of any defense mechanism. In this paper, we present ...
This paper describes the design and implementation of a lightweight static security analyzer that ex...
Computer program analysis refers to the automatic analysis of the behavior of a user defined program...
Programs often run under strict usage conditions (e.g., license restrictions) that could be broken i...
Abstract Many teams at CERN, develop their own software to solve their tasks. This software may be...
Organizations that implement open source software in their system before they verify the software fo...
Researchers are always looking for better ways to improve their vulnerabilities detection and analys...
We have to face a simple, yet, disturbing fact: current computing is inherently insecure. The system...
This research examines how software specifications could be used to build more-secure software. For ...
The project focuses on developing a static code analyser which processes source code into relational...
There are several ways to mitigate security breaches proactively. This thesis introduces portable se...
Software vulnerabilities are added into programs during its development. Architectural flaws are int...
This thesis contributes to three research areas in software security, namely security requirements a...
The goal of the research presented in this dissertation is to prevent, detect, and mitigate maliciou...
Software vulnerabilities are added into programs during its development. Architectural flaws are i...
Malicious code detection is a crucial component of any defense mechanism. In this paper, we present ...
This paper describes the design and implementation of a lightweight static security analyzer that ex...
Computer program analysis refers to the automatic analysis of the behavior of a user defined program...
Programs often run under strict usage conditions (e.g., license restrictions) that could be broken i...
Abstract Many teams at CERN, develop their own software to solve their tasks. This software may be...
Organizations that implement open source software in their system before they verify the software fo...
Researchers are always looking for better ways to improve their vulnerabilities detection and analys...
We have to face a simple, yet, disturbing fact: current computing is inherently insecure. The system...
This research examines how software specifications could be used to build more-secure software. For ...
The project focuses on developing a static code analyser which processes source code into relational...