Security is an integral part of most software systems but it is not considered as an explicit part in the development process yet. Input validation is the most critical part of so...
Pedram Hayati, Nastaran Jafari, S. Mohammad Rezaei...
Secure communication in distributed systems is notoriously hard to achieve due to the variety of attacks an adversary can mount, based on message interception, modification, redi...
—The group signature based security scheme is a promising approach to provision privacy in vehicular ad hoc networks (VANETs). In this paper, we propose a novel distributed key m...
This paper describes the design of a test suite for thorough evaluation of web application scanners. Web application scanners are automated, black-box testing tools that examine w...
Elizabeth Fong, Romain Gaucher, Vadim Okun, Paul E...
Installing various hooks into the victim system is an important attacking strategy employed by malware, including spyware, rootkits, stealth backdoors, and others. In order to def...