


default search action
SecDev 2018: Cambridge, MA, USA
- 2018 IEEE Cybersecurity Development, SecDev 2018, Cambridge, MA, USA, September 30 - October 2, 2018. IEEE Computer Society 2018, ISBN 978-1-5386-7662-2

Paper Session 1: Best Practices of Security
- Toby C. Murray, Paul C. van Oorschot:

BP: Formal Proofs, the Fine Print and Side Effects. 1-10 - Lok K. Yan, Benjamin Price, Michael Zhivich, Brian Caswell, Christopher Eagle, Michael Frantzen, Holt Sorenson, Michael Thompson, Timothy Vidas, Jason Wright, Vernon Rivet, Samuel Colt VanWinkle, Clark Wood:

BP: DECREE: A Platform for Repeatable and Reproducible Security Experiments. 11-20 - Vaishnavi Mohan, Lotfi Ben Othmane, Andre Kres:

BP: Security Concerns and Best Practices for Automation of Software Deployment Processes: An Industrial Case Study. 21-28
Paper Session 2: Data Access Security
- Amir Rahmati

, Earlence Fernandes, Kevin Eykholt
, Atul Prakash
:
Tyche: A Risk-Based Permission Model for Smart Homes. 29-36 - Xiaoyu Hu, Jie Zhou, Spyridoula Gravani

, John Criswell
:
Transforming Code to Drop Dead Privileges. 45-52
Paper Session 3: Secure Coding and Analysis
- Archibald Samuel Elliott, Andrew Ruef, Michael Hicks, David Tarditi:

Checked C: Making C Safe by Extension. 53-60 - Darius Foo, Ming Yi Ang, Jason Yeo, Asankhaya Sharma:

SGL: A Domain-Specific Language for Large-Scale Analysis of Open-Source Code. 61-68 - Alexander van Den Berghe, Koen Yskout

, Riccardo Scandariato, Wouter Joosen:
A Lingua Franca for Security by Design. 69-76
Paper Session 4: Software and System Development
- Sonja Glumich, Juanita Riley, E. Paul Ratazzi

, Amanda Ozanam:
BP: Integrating Cyber Vulnerability Assessments Earlier into the Systems Development Lifecycle: A Methodology to Conduct Early-Cycle Cyber Vulnerability Assessments. 77-84 - Charles Weir, Lynne Blair, Ingolf Becker, M. Angela Sasse

, James Noble
:
Light-Touch Interventions to Improve Software Development Security. 85-93
Paper Session 5: Vulnerability Assessment
- Hang Hu, Peng Peng, Gang Wang:

Towards Understanding the Adoption of Anti-Spoofing Protocols in Email Systems. 94-101 - Ronald Gil, Hamed Okhravi

, Howard E. Shrobe:
There's a Hole in the Bottom of the C: On the Effectiveness of Allocation Protection. 102-109 - Christopher Theisen, Hyunwoo Sohn, Dawson Tripp, Laurie A. Williams:

BP: Profiling Vulnerabilities on the Attack Surface. 110-119
Tutorial Session
- Chengjun Cai

, Huayi Duan
, Cong Wang:
Tutorial: Building Secure and Trustworthy Blockchain Applications. 120-121 - Sazzadur Rahaman, Na Meng, Danfeng Yao

:
Tutorial: Principles and Practices of Secure Crypto Coding in Java. 122-123 - Elisa Heymann, Barton P. Miller:

Tutorial: Secure Coding Practices, Automated Assessment Tools and the SWAMP. 124-125 - Allan Blanchard, Nikolai Kosmatov, Frédéric Loulergue

:
Tutorial: Secure Your Things: Secure Development of IoT Software with Frama-C. 126-127 - Mike Dodds, Stephen Magill, Aaron Tomb:

Tutorial: Continuous Verification of Critical Software. 128-129 - Peter Goodman

, Gustavo Grieco, Alex Groce:
Tutorial: DeepState: Bringing Vulnerability Detection Tools into the Development Cycle. 130-131 - Fabian Monrose, Jan Werner:

Tutorial: Parry and RIPOSTE: Honing Cybersecurity Skills with Challenge-Based Exercises. 132-133
Practitioners' Session 1: Enterprise Threat Modeling
- François Gauthier, Nathan Keynes, Nicholas Allen, Diane Corney, Padmanabhan Krishnan:

Scalable Static Analysis to Detect Security Vulnerabilities: Challenges and Solutions. 134 - Danny Dhillon, Vishal Mishra:

Applied Threat Driven Security Verification. 135 - Altaz Valani:

Rethinking Secure DevOps Threat Modeling: The Need for a Dual Velocity Approach. 136
Practitioners' Session 2: New Security Needs and Approaches
- J. Sukarno Mertoguno, Ryan Craven, Daniel Koller, Matthew S. Mickelson:

Reducing Attack Surface via Executable Transformation. 138 - Jason H. Li, Douglas Schafer, David Whelihan, Stefano Lassini, Nicholas Evancich, Kyung Joon Kwak, Michael Vai, Haley Whitman:

Designing Secure and Resilient Embedded Avionics Systems. 139 - Tim McBride, Anne Townsend, Michael Ekstrom, Lauren Lusty, Julian Sexton:

Data Integrity: Recovering from Ransomware and Other Destructive Events. 140 - Andrea Arbelaez, Sallie Edwards, Kevin Littlefield, Sue Wang, Kangmin Zheng:

Securing Wireless Infusion Pumps. 141 - Xuan Tang:

Best Practice for Developing Secure and Trusted Enterprise Storage & Computing Products. 142 - Hasan Yasar:

Experiment: Sizing Exposed Credentials in GitHub Public Repositories for CI/CD. 143

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














