default search action
SecDev 2020: Atlanta, GA, USA
- IEEE Secure Development, SecDev 2020, Atlanta, GA, USA, September 28-30, 2020. IEEE 2020, ISBN 978-1-7281-8388-6
- John Criswell:
Tutorial: LLVM for Security Practitioners. 1 - Tuba Yavuz, Ken Yihang Bai:
Tutorial: Detecting Memory Vulnerabilities in the Components of System Code using PROMPT. 2-3 - Stephen Magill, Thomas DuBuisson:
Tutorial: Static Analysis at Scale with Muse. 4 - Ya Xiao, Miles Frantz, Sharmin Afrose, Sazzadur Rahaman, Danfeng Daphne Yao:
Tutorial: Principles and Practices of Secure Cryptographic Coding in Java. 5-6 - Zhuojia Shen, Komail Dharsee, John Criswell:
Fast Execute-Only Memory for Embedded Systems. 7-14 - Junhan Duan, Yudi Yang, Jie Zhou, John Criswell:
Refactoring the FreeBSD Kernel with Checked C. 15-22 - Andrea Fioraldi, Daniele Cono D'Elia, Leonardo Querzoni:
Fuzzing Binaries for Memory Safety Errors with QASan. 23-30 - Andrew Buttner, Richard Piazza, Rushi Purohit, Alec Summers:
A Secure Code Review Retrospective. 31-32 - Aaron Tomb, Stuart Pernsteiner, Mike Dodds:
Symbolic Testing for C and Rust. 33 - Jaime C. Acosta, Anjon Basak, Christopher Kiekintveld, Nandi Leslie, Charles A. Kamhoua:
Cybersecurity Deception Experimentation System. 34-40 - Md. Mazharul Islam, Ehab Al-Shaer:
Active Deception Framework: An Extensible Development Environment for Adaptive Cyber Deception. 41-48 - Mazharul Islam, Sazzadur Rahaman, Na Meng, Behnaz Hassanshahi, Padmanabhan Krishnan, Danfeng Daphne Yao:
Coding Practices and Recommendations of Spring Security for Enterprise Applications. 49-57 - Md. Shazibul Islam Shamim, Farzana Ahamed Bhuiyan, Akond Rahman:
XI Commandments of Kubernetes Security: A Systematization of Knowledge Related to Kubernetes Security Practices. 58-64 - Shinhae Kim, Sukyoung Ryu:
Analysis of Blockchain Smart Contracts: Techniques and Insights. 65-73 - Douglas Everson, Long Cheng:
Network Attack Surface Simplification for Red and Blue Teams. 74-80 - Thomas Rosenstatter, Kim Strandberg, Rodi Jolak, Riccardo Scandariato, Tomas Olovsson:
REMIND: A Framework for the Resilient Design of Automotive Systems. 81-95 - Sungkeun Kim, Farabi Mahmud, Jiayi Huang, Pritam Majumder, Neophytos Christou, Abdullah Muzahid, Chia-Che Tsai, Eun Jung Kim:
ReViCe: Reusing Victim Cache to Prevent Speculative Cache Leakage. 96-107
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.