Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 224,708,360 papers from all fields of science
Search
Sign In
Create Free Account
Security bug
Known as:
Security bugs
, Software security bug
A security bug or security defect is a software bug that can be exploited to gain unauthorized access or privileges on a computer system. Security…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
39 relations
Access control
Authentication
Authorization
Backporting
Expand
Broader (2)
Computer security
Software testing
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Embedded Partitioning Real-Time Operating System Based on Microkernel
Tanhong Chen
,
Huiyong Li
,
J. Niu
,
Tao Ren
,
Guizhou Xu
IEEE International Conference on Computational…
2019
Corpus ID: 208883763
The embedded partitioning operating system is active in security-related fields such as avionics and automotive embedded software…
Expand
2017
2017
Textual analysis of security bug reports
C. R. Peeples
,
Pete Rotella
,
M. McLaughlin
IEEE International Conference on Technologies for…
2017
Corpus ID: 43042403
SIR alone appears to explain the bulk of the correlation between Incident Responder ratings and the Risk Index model. However, it…
Expand
Review
2017
Review
2017
Secure integration of multiprotocol instant messenger
Sebastian Bala
,
Tomasz Wasilczyk
International Symposium on INnovations in…
2017
Corpus ID: 25155079
Pidgin communicator is a multiprotocol instant messenger client, developed by open source community. It was originally a third…
Expand
2016
2016
The Impact of Process Visibility on Process Performance
Martin Berner
,
Jino Augustine
,
A. Maedche
Business & Information Systems Engineering
2016
Corpus ID: 207433419
Successful monitoring is essential for managing security-critical or business-critical processes. The paper seeks to understand…
Expand
2015
2015
Verifying Linearizability of Intel® Software Guard Extensions
Rebekah Leslie-Hurd
,
Dror Caspi
,
M. Fernandez
International Conference on Computer Aided…
2015
Corpus ID: 20523428
Intel® Software Guard Extensions (SGX) is a collection of CPU instructions that enable an application to create secure containers…
Expand
2012
2012
Incremental development of large, secure smart card applications
Nina Moebius
,
Kurt Stenzel
,
M. Borek
,
W. Reif
MDsec '12
2012
Corpus ID: 17759091
SecureMDD is a model-driven approach to develop security-critical applications. The focus lies on the development of smart card…
Expand
2011
2011
Model checking dataflow for malicious input
A. Fehnker
,
Ralf Huuck
,
Wolf Rödiger
2011
Corpus ID: 15153107
Many embedded systems today are no longer isolated control units, but are fully fledged miniature desktops with their own kernel…
Expand
2010
2010
Residue objects: a challenge to web browser security
Shuo Chen
,
Hong Chen
,
Manuel Caballero
European Conference on Computer Systems
2010
Corpus ID: 10962550
A complex software system typically has a large number of objects in the memory, holding references to each other to implement an…
Expand
2003
2003
Phobos: An Agent-Based User Authentication System
R. Ghanea-Hercock
IEEE Intelligent Systems
2003
Corpus ID: 19236692
Managing the necessary public and private keys in a large organization is a serious challenge. Software agents can be an adaptive…
Expand
1999
1999
A User's and Programmer's View of the New JavaScript Security Model
V. Anupam
,
D. Kristol
,
Alain J. Mayer
USENIX Symposium on Internet Technologies and…
1999
Corpus ID: 878771
In this paper we introduce a new security model for JavaScript in Mozilla, as well as its programming interface. We present…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE