software security

Results: 17991



#Item
971Instant messaging clients / Mobile telecommunications / Cross-platform software / Freeware / Portable software / Google Cloud Messaging / Android Cloud to Device Messaging / WhatsApp / Google Play / Google Talk / Skype / Mobile application development

Mayhem in the Push Clouds: Understanding and Mitigating Security Hazards in Mobile Push-Messaging Services Tongxin Li1 , Xiaoyong Zhou2,4 , Luyi Xing2 , Yeonjoon Lee2 , Muhammad Naveed3 , XiaoFeng Wang2 and Xinhui Han1 1

Add to Reading List

Source URL: web.engr.illinois.edu

Language: English - Date: 2015-11-16 12:11:54
972Computing / Cryptography / Cryptographic protocols / Internet / Secure communication / Internet protocols / Cryptographic software / Internet Standards / Transport Layer Security / OpenSSL / GnuTLS / Cipher suite

Implementing TLS with Verified Cryptographic Security Karthikeyan Bhargavan ∗ 1 , C´edric Fournet † 2 , Markulf Kohlweiss ‡ 2 , Alfredo Pironti § 1 , and Pierre-Yves Strub ¶ 3 1

Add to Reading List

Source URL: mitls.org

Language: English - Date: 2016-01-06 06:14:04
973

ReachLocal | Case Study Integrating Security Across the Software Development Lifecycle (SDLC) Security is a top priority

Add to Reading List

Source URL: www.whitehatsec.com

Language: English - Date: 2016-06-16 12:54:07
    974Computing / Computer security / Software / Autobahn / Installation / Proxy server / Firewall

    Microsoft Word - Autobahn Toolbar + Execution Apps Installation Guide v1.3

    Add to Reading List

    Source URL: autobahn.db.com

    Language: English - Date: 2016-05-10 06:39:16
    975Computer security / Cyberwarfare / Cybercrime / Address space layout randomization / Return-oriented programming / Vulnerability / Code injection / Software bugs / JIT spraying / PaX

    String Oriented Programming: When ASLR is not enough Mathias Payer* and Thomas R. Gross Department of Computer Science ETH Zürich, Switzerland

    Add to Reading List

    Source URL: hexhive.github.io

    Language: English - Date: 2016-06-13 11:08:40
    976Software development process / Maturity model / Capability Maturity Model / Information Security Forum / Informa / Capability / Computing / Information technology / Software

    Time to Grow: Using maturity models to create and protect value

    Add to Reading List

    Source URL: www.securityforum.org

    Language: English - Date: 2016-01-22 09:17:44
    977Videotelephony / Computer-mediated communication / Teleconferencing / Technology / Web conferencing / Computing / Remote administration software / WebEx / Cisco Systems / Videoconferencing / Teleconference / Password

    White Paper Web Conferencing: Unleash the Power of Secure, Real-Time Collaboration This paper focuses on security information for Cisco WebEx Meeting Center, Cisco WebEx Training Center, Cisco WebEx Support Center, and

    Add to Reading List

    Source URL: www.webex.com

    Language: English - Date: 2016-04-06 00:43:01
    978Software engineering / Computing / Computer programming / Data types / Software bugs / Pointer / Memory safety / Stack buffer overflow / Dangling pointer / C dynamic memory allocation / Cyclone / Buffer overflow

    IEEE SECURITY& PRIVACY Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page

    Add to Reading List

    Source URL: hexhive.github.io

    Language: English - Date: 2016-06-13 11:08:40
    979Computer security / Cyberwarfare / Computing / Hacking / Computer network security / Software testing / Vulnerability / CERT Coordination Center / Cross-site scripting / SQL injection / CVSS / Benjamin Kunz Mejri

    Reporting Status of Vulnerability-related Information about Software Products and Websites - 1st Quarter ofJanuary – March) - Information-technology Promotion Agency, Japan (IPA) and Japan Computer Emergency Res

    Add to Reading List

    Source URL: www.ipa.go.jp

    Language: English - Date: 2016-05-31 02:00:13
    980Computer architecture / Software / Computing / Operating system kernels / Linux kernel / Computer security / Control-flow integrity / Kernel / System call / Protection ring / MINIX 3 / Microkernel

    Fine-Grained Control-Flow Integrity for Kernel Software Xinyang Ge∗ , Nirupama Talele∗ , Mathias Payer† , and Trent Jaeger∗ ∗ The Pennsylvania State University

    Add to Reading List

    Source URL: hexhive.github.io

    Language: English - Date: 2016-06-13 11:08:40
    UPDATE