Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Application security

Known as: Software Security 
Application security encompasses measures taken throughout the code's life-cycle to prevent gaps in the security policy of an application or the… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2020
Review
2020
The Internet of Things (IoT) integrates billions of smart devices that can communicate with one another with minimal human… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2019
Highly Cited
2019
Modern processors use branch prediction and speculative execution to maximize performance. For example, if the destination of a… Expand
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Review
2017
Review
2017
Software security vulnerabilities are one of the critical issues in the realm of computer security. Due to their potential high… Expand
  • figure 1
  • table 1
  • table 2
  • table 3
  • table 4
Is this relevant?
Highly Cited
2011
Highly Cited
2011
The fluidity of application markets complicate smartphone security. Although recent efforts have shed light on particular… Expand
  • figure 1
  • figure 2
  • figure 4
  • figure 3
  • figure 5
Is this relevant?
Highly Cited
2009
Highly Cited
2009
Resin is a new language runtime that helps prevent security vulnerabilities, by allowing programmers to specify application-level… Expand
  • table 1
  • table 2
  • figure 1
  • figure 2
  • table 3
Is this relevant?
Highly Cited
2008
Highly Cited
2008
Computers are notoriously insecure, in part because application security policies do not map well onto traditional protection… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2004
Highly Cited
2004
We study the setting in which a user stores encrypted documents (e.g. e-mails) on an untrusted server. In order to retrieve… Expand
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Attack Patterns. Foreword. Preface. What This Book Is About. How to Use This Book. But Isn't This Too Dangerous? Acknowledgments… Expand
  • figure 1-1
  • figure 1-3
  • figure 1-4
  • figure 1-5
  • figure 1-7
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Testing software security is a commonly misunderstood task. Done properly, it goes deeper than simple black-box probing on the… Expand
Is this relevant?
Highly Cited
1998
Highly Cited
1998
Making an application secure is much harder than just adding a password protected login screen. This paper contains a collection… Expand
  • table 1
  • figure 1
  • figure 3
  • figure 4
  • figure 5
Is this relevant?