By Topic

Software Security and Reliability-Companion (SERE-C), 2013 IEEE 7th International Conference on

Date 18-20 June 2013

Filter Results

Displaying Results 1 - 25 of 50
  • [Front cover]

    Publication Year: 2013 , Page(s): C4
    Save to Project icon | Request Permissions | PDF file iconPDF (529 KB)  
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2013 , Page(s): i
    Save to Project icon | Request Permissions | PDF file iconPDF (113 KB)  
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2013 , Page(s): iii
    Save to Project icon | Request Permissions | PDF file iconPDF (147 KB)  
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2013 , Page(s): iv
    Save to Project icon | Request Permissions | PDF file iconPDF (122 KB)  
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2013 , Page(s): v - viii
    Save to Project icon | Request Permissions | PDF file iconPDF (173 KB)  
    Freely Available from IEEE
  • Message from the Steering Committee Chairs

    Publication Year: 2013 , Page(s): ix
    Save to Project icon | Request Permissions | PDF file iconPDF (165 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Message from the General Chair

    Publication Year: 2013 , Page(s): x
    Save to Project icon | Request Permissions | PDF file iconPDF (92 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Message from the Program Chair

    Publication Year: 2013 , Page(s): xi
    Save to Project icon | Request Permissions | PDF file iconPDF (69 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Message from the TC Workshop Chairs - The First International Workshop on Trustworthy Computing

    Publication Year: 2013 , Page(s): xii
    Save to Project icon | Request Permissions | PDF file iconPDF (116 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Message from the IA Workshop Chair

    Publication Year: 2013 , Page(s): xiii
    Save to Project icon | Request Permissions | PDF file iconPDF (98 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • SERE 2013 Steering Committee

    Publication Year: 2013 , Page(s): xiv
    Save to Project icon | Request Permissions | PDF file iconPDF (118 KB)  
    Freely Available from IEEE
  • SERE 2013 Organizing Committee

    Publication Year: 2013 , Page(s): xv
    Save to Project icon | Request Permissions | PDF file iconPDF (117 KB)  
    Freely Available from IEEE
  • SERE 2013 TC Workshop Committee

    Publication Year: 2013 , Page(s): xvi
    Save to Project icon | Request Permissions | PDF file iconPDF (154 KB)  
    Freely Available from IEEE
  • SERE 2013 SSCPS Workshop Committee

    Publication Year: 2013 , Page(s): xvii
    Save to Project icon | Request Permissions | PDF file iconPDF (155 KB)  
    Freely Available from IEEE
  • Mobile Application Protection Solution Based on 3G Security Architecture and OpenID

    Publication Year: 2013 , Page(s): 1 - 7
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1296 KB) |  | HTML iconHTML  

    Copyright attacks on mobile application is a critical issue for mobile network operators (MNOs) and application and content providers who have deployed AS. This paper proposes a solution for this issue that leverages 3G security architecture. A trusted mobile software runtime is designed to control the execution of the mobile application. A dynamic Software ID and security key are created and depl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Designing an Enterprise Security Strategy for Mobile Intranet Access

    Publication Year: 2013 , Page(s): 8 - 15
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (185 KB) |  | HTML iconHTML  

    Modern IT allows new markets and business process for many enterprises. One aspect is that new networks tolerate intranet access from almost any location. Some examples include completing health insurance contracts online at the customer or supporting a maintenance team with company expertise while working at customers. However, the increasing mobility of employees brings also high risk from a sec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On a High-Performance and Balanced Method of Hardware Implementation for AES

    Publication Year: 2013 , Page(s): 16 - 20
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (2322 KB) |  | HTML iconHTML  

    Hardware implementation provides a higher level of security and cryptography speed at some lower resource cost, compared to software implementation of AES. In this paper, we present a balanced hardware design and implementation for AES, considering several existing implementations. FPGA implementation offers higher speed solution and can be easily adapted to protocol changes, although the AES can ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • PHP+MySQL Based Online Examination System with Power Failure Handling and Dropbox Capability

    Publication Year: 2013 , Page(s): 21 - 25
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (406 KB) |  | HTML iconHTML  

    This paper presents the development of PHP and MySQL based online examination system with power failure handling and drop box capability. To the best of author's knowledge these shortcomings were not properly addressed in the previous systems developed in PHP and MySQL. Power failure is an important factor that directly affects the efficiency of the online examination system in most of the develop... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • HyperVerify: A VM-assisted Architecture for Monitoring Hypervisor Non-control Data

    Publication Year: 2013 , Page(s): 26 - 34
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (436 KB) |  | HTML iconHTML  

    Continuing bug reports and exploits in hyper visors indicate that hyper visors face similar integrity threats as tradition software. Previous approaches to protect a hyper visor that utilize hardware features are not easy to be extended. Besides, they mainly focus on code or control data integrity, without pay much attention to protecting non-control data. In this paper, we present Hyper Verify, a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Verification of Secure Inter-operation Properties in Multi-domain RBAC Systems

    Publication Year: 2013 , Page(s): 35 - 44
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (518 KB) |  | HTML iconHTML  

    The increased complexity of modern access control (AC) systems stems partly from the need to support diverse and multiple administrative domains. Systems engineering is a key technology to manage this complexity since it is capable of assuring that an operational system will adhere to the initial conceptual design and defined requirements. Specifically, the verification stage of an AC system shoul... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Robust and Efficient Covert Channel Communications in Operating Systems: Design, Implementation and Evaluation

    Publication Year: 2013 , Page(s): 45 - 52
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (491 KB) |  | HTML iconHTML  

    Covert channel has been studied for years due to its ability to divulge sensitive information in computer systems. Constructing covert communication scenarios is the first step to learn the threat of a channel. There are several challenges in the existing design of covert channel communications: lacking general communicating model description, low transmission accuracy and weak anti-interference a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Concept for Language-Oriented Security Testing

    Publication Year: 2013 , Page(s): 53 - 62
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (191 KB) |  | HTML iconHTML  

    Today's ongoing trend towards intense usage of web service based applications in daily business and everybody's daily life poses new challenges for security testing. Additionally, such applications mostly not execute in their own runtime environment but instead are deployed in some data center, run alongside multiple other applications, and serve different purposes for sundry user domains with div... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hierarchal Identity Based Socket for Datacenters

    Publication Year: 2013 , Page(s): 63 - 67
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (205 KB) |  | HTML iconHTML  

    Now a days more and more companies are moving towards cloud computing, there are several services provided by them. But at the same time there are several security issues. Secure Socket Layer (SSL) key generation and distribution can not cope with the scale of the cloud data center also the authentication is slow. The other security solution is Kerberos which is not scalable. Identity based crypto... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluation of Random Projection for Malware Classification

    Publication Year: 2013 , Page(s): 68 - 73
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (381 KB) |  | HTML iconHTML  

    Research efforts to develop malicious application detection algorithms have been a priority ever since the discovery of the first "viruses". Various methods are used to search and identify these malicious applications. One such method, n-gram analysis, can be implemented to extract features from binary files. These features are then be used by machine learning algorithms to classify them as malici... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Approach for Isolating the Sources of Information Leakage Exploited in Cache-Based Side-Channel Attacks

    Publication Year: 2013 , Page(s): 74 - 83
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (224 KB) |  | HTML iconHTML  

    We demonstrate that a certain class of side-channel attacks is feasible due to unintentional cache contentions between code segments in cryptographic applications. These inadvertent contentions should be considered as a flaw in the implementation of cryptographic applications, which necessitates a software analysis framework to identify their primary cause and check the effectiveness of proposed c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.