default search action
SecDev 2019: Tysons Corner, VA, USA
- 2019 IEEE Cybersecurity Development, SecDev 2019, Tysons Corner, VA, USA, September 23-25, 2019. IEEE 2019, ISBN 978-1-5386-7289-1
Tutorials
- Benjamin M. Brosgol, Claire Dross, Yannick Moy:
Tutorial: A Practical Introduction to Formal Development and Verification of High-Assurance Software with SPARK. 1-2 - Kinan Dak Albab, Rawane Issa, Andrei Lapets, Peter Flockhart, Lucy Qin, Ira Globus-Harris:
Tutorial: Deploying Secure Multi-Party Computation on the Web Using JIFF. 3
Cryptography and Understanding Insecure Code
- Nicola Tuveri, Billy Bob Brumley:
Start Your ENGINEs: Dynamically Loadable Contemporary Crypto. 4-19 - Kyle Hogan, Hoda Maleki, Reza Rahaeimehr, Ran Canetti, Marten van Dijk, Jason Hennessey, Mayank Varia, Haibin Zhang:
On the Universally Composable Security of OpenStack. 20-33 - Wei Bai, Omer Akgul, Michelle L. Mazurek:
A Qualitative Investigation of Insecure Code Propagation from Online Forums. 34-48 - Sharmin Afrose, Sazzadur Rahaman, Danfeng Yao:
CryptoAPI-Bench: A Comprehensive Benchmark on Java Cryptographic API Misuses. 49-61
Security in Lower-Levels of Abstraction
- Tuba Yavuz:
Detecting Callback Related Deep Vulnerabilities in Linux Device Drivers. 62-75 - Remo Schweizer, Stephan Neuhaus:
Downright: A Framework and Toolchain for Privilege Handling. 76-88 - Vivek V. Menon, Gaurav Kolhe, Andrew G. Schmidt, Joshua S. Monson, Matthew French, Yinghua Hu, Peter A. Beerel, Pierluigi Nuzzo:
System-Level Framework for Logic Obfuscation with Quantified Metrics for Evaluation. 89-100
Data and Information
- Raimil Cruz, Éric Tanter:
Polymorphic Relaxed Noninterference. 101-113 - Long Cheng, Hans Liljestrand, Md. Salman Ahmed, Thomas Nyman, Trent Jaeger, N. Asokan, Danfeng Yao:
Exploitation Techniques and Defenses for Data-Oriented Attacks. 114-128 - Andrei Lapets, Kinan Dak Albab, Rawane Issa, Lucy Qin, Mayank Varia, Azer Bestavros, Frederick Jansen:
Role-Based Ecosystem for the Design, Development, and Deployment of Secure Multi-Party Data Analytics Applications. 129-140
Practitioner Papers
- Abhishek Pathak, Kaarthik Sivakumar, Jin Sheng, Anlu Yan, Mazhar Haque:
Effective Static Analysis Enforcement in Complex Cloud Native Dockerized Systems. 141 - Abdulrahman A. Alnaim:
Using Rules Engine in the Automation of System Security Review. 142 - Yongkui Han, Pankil Shah, Van Nguyen, Ling Ma, Richard Livingston:
OpenOSC: Open Source Object Size Checking Library With Built-in Metrics. 143 - Chien-An Chen:
With Great Abstraction Comes Great Responsibility: Sealing the Microservices Attack Surface. 144 - Abhishek Pathak, Kaarthik Sivakumar, Mazhar Haque, Prasanna Ganesan:
Multi-Cluster Visualization and Live Reporting of Static Analysis Security Testing (SAST) Warnings. 145 - Samuel Denard, Susan A. Mengel, Atila Ertas, Stephen Ekwaro-Osire:
Development Cycle Estimation Modeling. 146
Networking
- Paul Syverson, Matthew Traudt:
Self-Authenticating Traditional Domain Names. 147-160 - Kenneth L. McMillan, Lenore D. Zuck:
Compositional Testing of Internet Protocols. 161-174
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.