Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 205,702,575 papers from all fields of science
Search
Sign In
Create Free Account
Application security
Known as:
Software Security
Application security encompasses measures taken throughout the code's life-cycle to prevent gaps in the security policy of an application or the…
Expand
Wikipedia
Create Alert
Alert
Related topics
Related topics
50 relations
Access control
Anti-tamper software
Apache Shiro
AppShield
Expand
Broader (1)
Computer security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2019
Highly Cited
2019
Spectre Attacks: Exploiting Speculative Execution
P. Kocher
,
Daniel Genkin
,
+7 authors
Y. Yarom
IEEE Symposium on Security and Privacy (SP)
2019
Corpus ID: 373888
Modern processors use branch prediction and speculative execution to maximize performance. For example, if the destination of a…
Expand
Review
2012
Review
2012
Cyber–Physical System Security for the Electric Power Grid
S. Sridhar
,
A. Hahn
,
G. Manimaran
Proceedings of the IEEE
2012
Corpus ID: 2141030
The development of a trustworthy smart grid requires a deeper understanding of potential impacts resulting from successful cyber…
Expand
Highly Cited
2011
Highly Cited
2011
A Study of Android Application Security
William Enck
,
Damien Octeau
,
P. Mcdaniel
,
Swarat Chaudhuri
USENIX Security Symposium
2011
Corpus ID: 40095
The fluidity of application markets complicate smartphone security. Although recent efforts have shed light on particular…
Expand
Highly Cited
2009
Highly Cited
2009
Improving application security with data flow assertions
A. Yip
,
Xi Wang
,
N. Zeldovich
,
M. Kaashoek
SOSP '09
2009
Corpus ID: 7189495
Resin is a new language runtime that helps prevent security vulnerabilities, by allowing programmers to specify application-level…
Expand
Review
2006
Review
2006
Software Security: Building Security In
G. McGraw
17th International Symposium on Software…
2006
Corpus ID: 25146846
Summary form only given. Software security has come a long way in the last few years, but we've really only just begun. I will…
Expand
Highly Cited
2004
Highly Cited
2004
Exploiting Software: How to Break Code
G. Hoglund
,
G. McGraw
2004
Corpus ID: 45597425
Attack Patterns. Foreword. Preface. What This Book Is About. How to Use This Book. But Isn't This Too Dangerous? Acknowledgments…
Expand
Highly Cited
2004
Highly Cited
2004
Secure Conjunctive Keyword Search over Encrypted Data
P. Golle
,
Jessica Staddon
,
Brent Waters
ACNS
2004
Corpus ID: 10072679
We study the setting in which a user stores encrypted documents (e.g. e-mails) on an untrusted server. In order to retrieve…
Expand
Review
2004
Review
2004
Static Analysis for Security
B. Chess
,
G. McGraw
IEEE Secur. Priv.
2004
Corpus ID: 38067957
All software projects are guaranteed to have one artifact in common $source code. Together with architectural risk analysis, code…
Expand
Highly Cited
2004
Highly Cited
2004
TrustZone : Integrated Hardware and Software Security
T. Alves
2004
Corpus ID: 58463902
Highly Cited
1998
Highly Cited
1998
Architectural Patterns for Enabling Application Security
J. Yoder
,
J. Barcalow
1998
Corpus ID: 61893914
Making an application secure is much harder than just adding a password protected login screen. This paper contains a collection…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
,
Terms of Service
, and
Dataset License
ACCEPT & CONTINUE