- Rasha Kashef, Monika Freunek, Jeff Schwartzentruber, Reza Samavi, Burcu Bulgurcu, A. J. Khan, Marcus Santos:
Bridging the Bubbles: Connecting Academia and Industry in Cybersecurity Research. SecDev 2023: 207-213 - Michal Kepkowski, Maciej Machulak, Ian D. Wood, Dali Kaafar:
Challenges with Passwordless FIDO2 in an Enterprise Setting: A Usability Study. SecDev 2023: 37-48 - Stefan Krüger, Michael Reif, Anna-Katharina Wickert, Sarah Nadi, Karim Ali, Eric Bodden, Yasemin Acar, Mira Mezini, Sascha Fahl:
Securing Your Crypto-API Usage Through Tool Support - A Usability Study. SecDev 2023: 14-25 - Denley Lam, Letitia W. Li, Anthony Gabrielson:
Parser Weakness Enumeration: Definition and Preliminary Assessment. SecDev 2023: 118-125 - Yu Tsung Lee, Rahul George, Haining Chen, Kevin Chan, Trent Jaeger:
Triaging Android Systems Using Bayesian Attack Graphs. SecDev 2023: 171-183 - Yuvaraj Madheswaran:
11 things about Securing Microservice. SecDev 2023: 51-53 - Omid Mirzamohammadi, Kristof Jannes, Laurens Sion, Dimitri Van Landuyt, Aysajan Abidin, Dave Singelée:
Security and Privacy Threat Analysis for Solid. SecDev 2023: 196-206 - Sinnott Murphy, Richard Macwan, Vivek Kumar Singh, Chin-Yao Chang:
A randomization-based, zero-trust cyberattack detection method for hierarchical systems. SecDev 2023: 145-155 - Mert D. Pesé, Jay W. Schauer, Murali Mohan, Cassandra Joseph, Kang G. Shin, John Moore:
PRICAR: Privacy Framework for Vehicular Data Sharing with Third Parties. SecDev 2023: 184-195 - Timothée Riom, Alexandre Bartel:
An In-Depth Analysis of Android's Java Class Library: its Evolution and Security Impact. SecDev 2023: 133-144 - Alexander Senier:
Tutorial: The End of Binary Protocol Parser Vulnerabilities : Using RecordFlux and SPARK to implement formally-verified binary formats and communication protocols. SecDev 2023: 5-6 - Wenjia Song, Arianna Schuler Scott:
Tutorial: Crypto-Ransomware: Analysis, Defense, and Criminal Negotiation. SecDev 2023: 3-4 - Justin Tracey, Ian Goldberg:
Grading on a Curve: How Rust can Facilitate New Contributors while Decreasing Vulnerabilities. SecDev 2023: 26-36 - Ramyapandian Vijayakanthan, Karley M. Waguespack, Irfan Ahmed, Aisha I. Ali-Gombe:
Fortifying IoT Devices: AI-Driven Intrusion Detection via Memory-Encoded Audio Signals. SecDev 2023: 106-117 - Charles Weir, Anna Dyson, Daniel Prince:
A Lot Less Likely Than I Thought: Introducing Evidence-Based Security Risk Assessment for Healthcare Software. SecDev 2023: 156-170 - Mingxuan Yao, Jonathan Fuller, Ranjita Pai Sridhar, Saumya Agarwal, Amit Kumar Sikder, Brendan Saltaformaggio:
Invited Tutorial: Counteracting Web Application Abuse in Malware. SecDev 2023: 1-2 - IEEE Secure Development Conference, SecDev 2023, Atlanta, GA, USA, October 18-20, 2023. IEEE 2023, ISBN 979-8-3503-3132-5 [contents]
- 2022
- Kaled M. Alshmrany, Ahmed Bhayat, Franz Brauße, Lucas C. Cordeiro, Konstantin Korovin, Tom Melham, Mustafa A. Mustafa, Pierre Olivier, Giles Reger, Fedor Shmarov:
Position Paper: Towards a Hybrid Approach to Protect Against Memory Safety Vulnerabilities. SecDev 2022: 52-58 - Pranshu Bajpai, Adam Lewis:
Secure Development Workflows in CI/CD Pipelines. SecDev 2022: 65-66 - Setu Kumar Basak, Lorenzo Neil, Bradley Reaves, Laurie A. Williams:
What are the Practices for Secret Management in Software Artifacts? SecDev 2022: 69-76 - Carmen Cheh, Nicholas Tay, Binbin Chen:
Design and User Study of a Constraint-based Framework for Business Logic Flaw Discovery. SecDev 2022: 91-99 - Tobias Cloosters, Sebastian Surminski, Gerrit Sangel, Lucas Davi:
Salsa: SGX Attestation for Live Streaming Applications. SecDev 2022: 45-51 - John Criswell, Ethan Johnson, Colin Pronovost:
Tutorial: LLVM for Security Practitioners. SecDev 2022: 1-2 - Douglas Everson, Ashish Bastola, Rajat Mittal, Siddheshwar Munde, Long Cheng:
A Comparative Study of Log4Sheil Test Tools. SecDev 2022: 16-22 - Setareh Ghorshi, Lachlan J. Gunn, Hans Liljestrand, N. Asokan:
Towards cryptographically-authenticated in-memory data structures. SecDev 2022: 30-44 - Jens-Rene Giesen, Sébastien Andreina, Michael Rodler, Ghassan O. Karame, Lucas Davi:
Tutorial: Analyzing, Exploiting, and Patching Smart Contracts in Ethereum. SecDev 2022: 3-4 - Emmanouil Gionanidis, Petros S. Karvelis, George K. Georgoulas, Konstantinos Stamos, Purvi Garg:
Evaluating Text Augmentation for Boosting the Automatic Mapping of Vulnerability Information to Adversary Techniques. SecDev 2022: 23-29 - Jack B. Harrison, Joseph R. Harrison, Madison G. Boswell, Alan J. Michaels:
A Hierarchical Database of One Million Websites. SecDev 2022: 67-68 - Md Mahir Asef Kabir, Ying Wang, Danfeng Yao, Na Meng:
How Do Developers Follow Security-Relevant Best Practices When Using NPM Packages? SecDev 2022: 77-83 - Lotfi Ben Othmane, Heinrich Gantenbein, Hasan Yasar, Simone Curzi, Altaz Valani, Arun Prabhakar, Robert Cuddy:
Tutorial: Threat Modeling of Cloud-based Solutions. SecDev 2022: 5-6