default search action
SecDev 2023: Atlanta, GA, USA
- IEEE Secure Development Conference, SecDev 2023, Atlanta, GA, USA, October 18-20, 2023. IEEE 2023, ISBN 979-8-3503-3132-5
- Mingxuan Yao, Jonathan Fuller, Ranjita Pai Sridhar, Saumya Agarwal, Amit Kumar Sikder, Brendan Saltaformaggio:
Invited Tutorial: Counteracting Web Application Abuse in Malware. 1-2 - Wenjia Song, Arianna Schuler Scott:
Tutorial: Crypto-Ransomware: Analysis, Defense, and Criminal Negotiation. 3-4 - Alexander Senier:
Tutorial: The End of Binary Protocol Parser Vulnerabilities : Using RecordFlux and SPARK to implement formally-verified binary formats and communication protocols. 5-6 - Hanyang Hu, Yani Bu, Kristen Wong, Gaurav Sood, Karen Smiley, Akond Rahman:
Characterizing Static Analysis Alerts for Terraform Manifests: An Experience Report. 7-13 - Stefan Krüger, Michael Reif, Anna-Katharina Wickert, Sarah Nadi, Karim Ali, Eric Bodden, Yasemin Acar, Mira Mezini, Sascha Fahl:
Securing Your Crypto-API Usage Through Tool Support - A Usability Study. 14-25 - Justin Tracey, Ian Goldberg:
Grading on a Curve: How Rust can Facilitate New Contributors while Decreasing Vulnerabilities. 26-36 - Michal Kepkowski, Maciej Machulak, Ian D. Wood, Dali Kaafar:
Challenges with Passwordless FIDO2 in an Enterprise Setting: A Usability Study. 37-48 - Pranshu Bajpai, Raghudeep Kannavara:
Misplaced Trust: The Security Flaw in Modern Code Signing Process. 49-50 - Yuvaraj Madheswaran:
11 things about Securing Microservice. 51-53 - Merve Gülmez, Thomas Nyman, Christoph Baumann, Jan Tobias Mühlberg:
Friend or Foe Inside? Exploring In-Process Isolation to Maintain Memory Safety for Unsafe Rust. 54-66 - Kaiming Huang, Jack Sampson, Trent Jaeger:
Assessing the Impact of Efficiently Protecting Ten Million Stack Objects from Memory Errors Comprehensively. 67-74 - Muaz Ali, Rumaisa Habib, Ashish Gehani, Sazzadur Rahaman, Zartash Afzal Uzmi:
BLADE: Towards Scalable Source Code Debloating. 75-87 - Muhammad Hassan, Talha Tahir, Muhammad Farrukh, Abdullah Naveed, Anas Naeem, Fareed Zaffar, Fahad Shaon, Ashish Gehani, Sazzadur Rahaman:
Evaluating Container Debloaters. 88-98 - Hussain M. J. Almohri, Layne T. Watson:
Model-Agnostic Federated Learning for Privacy-Preserving Systems. 99-105 - Ramyapandian Vijayakanthan, Karley M. Waguespack, Irfan Ahmed, Aisha I. Ali-Gombe:
Fortifying IoT Devices: AI-Driven Intrusion Detection via Memory-Encoded Audio Signals. 106-117 - Denley Lam, Letitia W. Li, Anthony Gabrielson:
Parser Weakness Enumeration: Definition and Preliminary Assessment. 118-125 - Eric Bond, Matthew Heimerdinger:
Curbing the Vulnerable Parser: Graded Modal Guardrails for Secure Input Handling. 126-132 - Timothée Riom, Alexandre Bartel:
An In-Depth Analysis of Android's Java Class Library: its Evolution and Security Impact. 133-144 - Sinnott Murphy, Richard Macwan, Vivek Kumar Singh, Chin-Yao Chang:
A randomization-based, zero-trust cyberattack detection method for hierarchical systems. 145-155 - Charles Weir, Anna Dyson, Daniel Prince:
A Lot Less Likely Than I Thought: Introducing Evidence-Based Security Risk Assessment for Healthcare Software. 156-170 - Yu Tsung Lee, Rahul George, Haining Chen, Kevin Chan, Trent Jaeger:
Triaging Android Systems Using Bayesian Attack Graphs. 171-183 - Mert D. Pesé, Jay W. Schauer, Murali Mohan, Cassandra Joseph, Kang G. Shin, John Moore:
PRICAR: Privacy Framework for Vehicular Data Sharing with Third Parties. 184-195 - Omid Mirzamohammadi, Kristof Jannes, Laurens Sion, Dimitri Van Landuyt, Aysajan Abidin, Dave Singelée:
Security and Privacy Threat Analysis for Solid. 196-206 - Rasha Kashef, Monika Freunek, Jeff Schwartzentruber, Reza Samavi, Burcu Bulgurcu, A. J. Khan, Marcus Santos:
Bridging the Bubbles: Connecting Academia and Industry in Cybersecurity Research. 207-213 - Sunil Joshi, Kenneth G. Crowther, Jarvis Robinson:
Adaptive Security: Certificate and Key Rotation for Firmware Integrity. 214-215
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.