default search action
SecDev 2024: Pittsburgh, PA, USA
- IEEE Secure Development Conference, SecDev 2024, Pittsburgh, PA, USA, October 7-9, 2024. IEEE 2024, ISBN 979-8-3503-9193-0
- Thomas Lavaur, Déborah Conforto Nedelmann, Corentin Chauffaut, Jérôme Lacan, Caroline P. C. Chanel:
Verifiable Multi-Agent Multi-Task Assignment. 1-12 - Simon Schneider, Ananya Saha, Emanuele Mezzi, Katja Tuma, Riccardo Scandariato:
Designing Secure AI-based Systems: a Multi-Vocal Literature Review. 13-19 - En Low, Carmen Cheh, Binbin Chen:
Repairing Infrastructure-as-Code using Large Language Models. 20-27 - Arjun E. R. R, Pavan Kulkarni, Yuvaraj Govindarajulu, Harshit Shah, Manojkumar Parmar:
Evasion Attacks on Object Detection Models using Attack Transferability. 28-34 - Dimitri Van Landuyt, Laurens Sion, Walewein Philips, Wouter Joosen:
From automation to CI/CD: a comparative evaluation of threat modeling tools. 35-45 - Hossam ElAtali, Xiaohe Duan, Hans Liljestrand, Meng Xu, N. Asokan:
BliMe Linter. 46-53 - Diane B. Stephens, Kawkab Aldoshan, Mustakimur Rahman Khandaker:
Understanding the Challenges in Detecting Vulnerabilities of Rust Applications. 54-63 - Sideeq Bello, Babangida Bappah, Nicholas R. Tanet, Arabelle S. Betzwieser, Aisha I. Ali-Gombe:
User Privacy in the Digital Playground: An In-Depth Investigation of Facebook Instant Games. 64-75 - Mahbub Alam, Siwei Zhang, Eric Rodriguez, Akib Nafis, Endadul Hoque:
iConPAL: LLM-guided Policy Authoring Assistant for Configuring IoT Defenses. 76-92 - Partha Das Chowdhury, Mohammad Tahaei, Matthew Edwards, Claudia Peersman, Lata Nautiyal, Kopo Marvin Ramokapane, Awais Rashid:
Community Security Champions: Studying the Most Influential Users on Security Stack Exchange. 93-104 - Marcus Birgersson, Cyrille Artho, Musard Balliu:
Sharing without Showing: Secure Cloud Analytics with Trusted Execution Environments. 105-116 - Matías F. Gobbi, Johannes Kinder:
GENIE: Guarding the npm Ecosystem with Semantic Malware Detection. 117-128 - Biniyam Mengist Tiruye, Lauren Biernacki, Tersiteab Adem, Petros Mola, Todd M. Austin:
Octal: Efficient Automatic Data-Oblivious Program Transformations to Eliminate Side-Channel Leakage. 129-139 - Md Rabbi Alam, Jinpeng Wei, Md Sajidul Islam Sajid, Qingyang Wang, Chenglong Fu:
Moving from the Developer Machine to IoT Devices: An Empirical Study. 140-152 - Sabine Houy, Alexandre Bartel:
Lessons Learned and Challenges of Deploying Control Flow Integrity in Complex Software: the Case of OpenJDK's Java Virtual Machine. 153-165 - Isaac Richter, Jie Zhou, John Criswell:
DeTRAP: RISC-V Return Address Protection With Debug Triggers. 166-177 - Timothy Fraser, Xuwei Liu, Qingkai Shi, Xiangyu Zhang, Mark Wutka, Daniel Balasubramanian, Hao Chen, Zhong Shao:
A NAND Use Case for Cybersecurity Experiments. 178-179 - Jonathan Brossard:
Toward Partial Proofs of Vulnerabilities. 180-182 - Rodrigo Branco, Ben Lee:
Reverse Engineering Branch Prediction Capabilities in Modern Micro-Architectures. 183-185 - Carol Woody, Scott Hissam:
Open Source Software (OSS) Transparency Tutorial. 186-187
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.