default search action
SecDev 2021: Atlanta, GA, USA
- IEEE Secure Development Conference, SecDev 2021, Atlanta, GA, USA, October 18-20, 2021. IEEE 2021, ISBN 978-1-6654-3170-5
- Ina Schaefer, Tobias Runge, Loek Cleophas, Bruce W. Watson:
Tutorial: The Correctness-by-Construction Approach to Programming Using CorC. 1-2 - Salman Ahmed, Long Cheng, Hans Liljestrand, N. Asokan, Danfeng Daphne Yao:
Tutorial: Investigating Advanced Exploits for System Security Assurance. 3-4 - David Lee, Brandon Steed, Yi Liu, Onyeka Ezenwoye:
Tutorial: A Lightweight Web Application for Software Vulnerability Demonstration. 5-6 - David Svoboda:
Hands-on Tutorial: How Exploitable is Insecure C Code? 7-8 - John Criswell, Ethan Johnson, Colin Pronovost:
Tutorial: LLVM for Security Practitioners. 9-10 - Shravan Narayan, Craig Disselkoen, Deian Stefan:
Tutorial: Sandboxing (unsafe) C code with RLBox. 11-12 - Jie Zhou, Michael Hicks, Yudi Yang, John Criswell:
Tutorial: Making C Programs Safer with Checked C. 13-14 - Carmen Cheh, Binbin Chen:
Analyzing OpenAPI Specifications for Security Design Issues. 15-22 - Douglas Everson, Long Cheng:
Compressing Network Attack Surfaces for Practical Security Analysis. 23-29 - Laurens Sion, Dimitri Van Landuyt, Koen Yskout, Stef Verreydt, Wouter Joosen:
Automated Threat Analysis and Management in a Continuous Integration Pipeline. 30-37 - Michael Reeves, Dave Jing Tian, Antonio Bianchi, Z. Berkay Celik:
Towards Improving Container Security by Preventing Runtime Escapes. 38-46 - Partha Das Chowdhury, Joseph Hallett, Nikhil Patnaik, Mohammad Tahaei, Awais Rashid:
Developers Are Neither Enemies Nor Users: They Are Collaborators. 47-55 - Akond Rahman, Farhat Lamia Barsha, Patrick Morrison:
Shhh!: 12 Practices for Secret Management in Infrastructure as Code. 56-62 - Sungmin Lee, Yoonkyo Jung, Jaehyun Lee, Byoungyoung Lee, Ted "Taekyoung" Kwon:
Android Remote Unlocking Service using Synthetic Password: A Hardware Security-preserving Approach. 63-70 - Aditya Oak, Amir M. Ahmadian, Musard Balliu, Guido Salvaneschi:
Enclave-Based Secure Programming with JE. 71-78 - Jason Lowdermilk, Simha Sethumadhavan:
Towards Zero Trust: An Experience Report. 79-85 - Guillaume Cluzel, Kyriakos Georgiou, Yannick Moy, Clément Zeller:
Layered Formal Verification of a TCP Stack. 86-93 - Rodothea-Myrsini Tsoupidi, Musard Balliu, Benoit Baudry:
Vivienne: Relational Verification of Cryptographic Implementations in WebAssembly. 94-102
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.