{"_id":"QqYFYpC7KH2DtxEno","bibbaseid":"santos-peruma-mirakhorli-galster-vidal-sejfia-understandingsoftwarevulnerabilitiesrelatedtoarchitecturalsecuritytacticsanempiricalinvestigationofchromiumphpandthunderbird-2017","downloads":0,"creationDate":"2018-09-10T20:01:33.723Z","title":"Understanding Software Vulnerabilities Related to Architectural Security Tactics: An Empirical Investigation of Chromium, PHP and Thunderbird","author_short":["Santos, J. C. S.","Peruma, A.","Mirakhorli, M.","Galster, M.","Vidal, J. V.","Sejfia, A."],"year":2017,"bibtype":"inproceedings","biburl":"https://dblp.org/pid/200/2545.bib","bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"firstnames":["Joanna","C.","S."],"propositions":[],"lastnames":["Santos"],"suffixes":[]},{"firstnames":["Anthony"],"propositions":[],"lastnames":["Peruma"],"suffixes":[]},{"firstnames":["Mehdi"],"propositions":[],"lastnames":["Mirakhorli"],"suffixes":[]},{"firstnames":["Matthias"],"propositions":[],"lastnames":["Galster"],"suffixes":[]},{"firstnames":["Jairo","Veloz"],"propositions":[],"lastnames":["Vidal"],"suffixes":[]},{"firstnames":["Adriana"],"propositions":[],"lastnames":["Sejfia"],"suffixes":[]}],"title":"Understanding Software Vulnerabilities Related to Architectural Security Tactics: An Empirical Investigation of Chromium, PHP and Thunderbird","booktitle":"2017 IEEE International Conference on Software Architecture, ICSA 2017, Gothenburg, Sweden, April 3-7, 2017","pages":"69–78","year":"2017","crossref":"DBLP:conf/icsa/2017","url":"https://doi.org/10.1109/ICSA.2017.39","doi":"10.1109/ICSA.2017.39","timestamp":"Thu, 16 Aug 2018 09:44:42 +0200","biburl":"https://dblp.org/rec/bib/conf/icsa/SantosPMGVS17","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@inproceedings{DBLP:conf/icsa/SantosPMGVS17,\n author = {Joanna C. S. Santos and\n Anthony Peruma and\n Mehdi Mirakhorli and\n Matthias Galster and\n Jairo Veloz Vidal and\n Adriana Sejfia},\n title = {Understanding Software Vulnerabilities Related to Architectural Security\n Tactics: An Empirical Investigation of Chromium, {PHP} and Thunderbird},\n booktitle = {2017 {IEEE} International Conference on Software Architecture, {ICSA}\n 2017, Gothenburg, Sweden, April 3-7, 2017},\n pages = {69--78},\n year = {2017},\n crossref = {DBLP:conf/icsa/2017},\n url = {https://doi.org/10.1109/ICSA.2017.39},\n doi = {10.1109/ICSA.2017.39},\n timestamp = {Thu, 16 Aug 2018 09:44:42 +0200},\n biburl = {https://dblp.org/rec/bib/conf/icsa/SantosPMGVS17},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Santos, J. C. S.","Peruma, A.","Mirakhorli, M.","Galster, M.","Vidal, J. V.","Sejfia, A."],"key":"DBLP:conf/icsa/SantosPMGVS17","id":"DBLP:conf/icsa/SantosPMGVS17","bibbaseid":"santos-peruma-mirakhorli-galster-vidal-sejfia-understandingsoftwarevulnerabilitiesrelatedtoarchitecturalsecuritytacticsanempiricalinvestigationofchromiumphpandthunderbird-2017","role":"author","urls":{"Paper":"https://doi.org/10.1109/ICSA.2017.39"},"downloads":0},"search_terms":["understanding","software","vulnerabilities","related","architectural","security","tactics","empirical","investigation","chromium","php","thunderbird","santos","peruma","mirakhorli","galster","vidal","sejfia"],"keywords":[],"authorIDs":[],"dataSources":["TLK44qJCZGYhmiTp6"]}