


default search action
SecDev 2023: Atlanta, GA, USA
- IEEE Secure Development Conference, SecDev 2023, Atlanta, GA, USA, October 18-20, 2023. IEEE 2023, ISBN 979-8-3503-3132-5

- Mingxuan Yao, Jonathan Fuller, Ranjita Pai Sridhar, Saumya Agarwal, Amit Kumar Sikder, Brendan Saltaformaggio:

Invited Tutorial: Counteracting Web Application Abuse in Malware. 1-2 - Wenjia Song, Arianna Schuler Scott:

Tutorial: Crypto-Ransomware: Analysis, Defense, and Criminal Negotiation. 3-4 - Alexander Senier:

Tutorial: The End of Binary Protocol Parser Vulnerabilities : Using RecordFlux and SPARK to implement formally-verified binary formats and communication protocols. 5-6 - Hanyang Hu, Yani Bu, Kristen Wong, Gaurav Sood, Karen Smiley, Akond Rahman

:
Characterizing Static Analysis Alerts for Terraform Manifests: An Experience Report. 7-13 - Stefan Krüger, Michael Reif, Anna-Katharina Wickert, Sarah Nadi, Karim Ali, Eric Bodden, Yasemin Acar, Mira Mezini, Sascha Fahl:

Securing Your Crypto-API Usage Through Tool Support - A Usability Study. 14-25 - Justin Tracey, Ian Goldberg:

Grading on a Curve: How Rust can Facilitate New Contributors while Decreasing Vulnerabilities. 26-36 - Michal Kepkowski, Maciej Machulak, Ian D. Wood

, Dali Kaafar
:
Challenges with Passwordless FIDO2 in an Enterprise Setting: A Usability Study. 37-48 - Pranshu Bajpai, Raghudeep Kannavara:

Misplaced Trust: The Security Flaw in Modern Code Signing Process. 49-50 - Yuvaraj Madheswaran

:
11 things about Securing Microservice. 51-53 - Merve Gülmez

, Thomas Nyman
, Christoph Baumann, Jan Tobias Mühlberg
:
Friend or Foe Inside? Exploring In-Process Isolation to Maintain Memory Safety for Unsafe Rust. 54-66 - Kaiming Huang, Jack Sampson, Trent Jaeger:

Assessing the Impact of Efficiently Protecting Ten Million Stack Objects from Memory Errors Comprehensively. 67-74 - Muaz Ali, Rumaisa Habib

, Ashish Gehani, Sazzadur Rahaman, Zartash Afzal Uzmi:
BLADE: Towards Scalable Source Code Debloating. 75-87 - Muhammad Hassan, Talha Tahir, Muhammad Farrukh, Abdullah Naveed, Anas Naeem, Fareed Zaffar, Fahad Shaon, Ashish Gehani, Sazzadur Rahaman:

Evaluating Container Debloaters. 88-98 - Hussain M. J. Almohri, Layne T. Watson:

Model-Agnostic Federated Learning for Privacy-Preserving Systems. 99-105 - Ramyapandian Vijayakanthan, Karley M. Waguespack, Irfan Ahmed

, Aisha I. Ali-Gombe
:
Fortifying IoT Devices: AI-Driven Intrusion Detection via Memory-Encoded Audio Signals. 106-117 - Denley Lam, Letitia W. Li, Anthony Gabrielson:

Parser Weakness Enumeration: Definition and Preliminary Assessment. 118-125 - Eric Bond

, Matthew Heimerdinger:
Curbing the Vulnerable Parser: Graded Modal Guardrails for Secure Input Handling. 126-132 - Timothée Riom

, Alexandre Bartel:
An In-Depth Analysis of Android's Java Class Library: its Evolution and Security Impact. 133-144 - Sinnott Murphy, Richard Macwan, Vivek Kumar Singh, Chin-Yao Chang:

A randomization-based, zero-trust cyberattack detection method for hierarchical systems. 145-155 - Charles Weir, Anna Dyson, Daniel Prince:

A Lot Less Likely Than I Thought: Introducing Evidence-Based Security Risk Assessment for Healthcare Software. 156-170 - Yu Tsung Lee, Rahul George, Haining Chen, Kevin Chan, Trent Jaeger:

Triaging Android Systems Using Bayesian Attack Graphs. 171-183 - Mert D. Pesé, Jay W. Schauer, Murali Mohan, Cassandra Joseph, Kang G. Shin, John Moore:

PRICAR: Privacy Framework for Vehicular Data Sharing with Third Parties. 184-195 - Omid Mirzamohammadi, Kristof Jannes

, Laurens Sion
, Dimitri Van Landuyt
, Aysajan Abidin
, Dave Singelée
:
Security and Privacy Threat Analysis for Solid. 196-206 - Rasha Kashef, Monika Freunek, Jeff Schwartzentruber, Reza Samavi, Burcu Bulgurcu, A. J. Khan, Marcus Santos:

Bridging the Bubbles: Connecting Academia and Industry in Cybersecurity Research. 207-213 - Sunil Joshi, Kenneth G. Crowther, Jarvis Robinson:

Adaptive Security: Certificate and Key Rotation for Firmware Integrity. 214-215

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














