Search dblp for Publications

export results for "stream:streams/conf/secdev:"

 download as .bib file

@inproceedings{DBLP:conf/secdev/AliHGRU23,
  author       = {Muaz Ali and
                  Rumaisa Habib and
                  Ashish Gehani and
                  Sazzadur Rahaman and
                  Zartash Afzal Uzmi},
  title        = {{BLADE:} Towards Scalable Source Code Debloating},
  booktitle    = {{IEEE} Secure Development Conference, SecDev 2023, Atlanta, GA, USA,
                  October 18-20, 2023},
  pages        = {75--87},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SecDev56634.2023.00022},
  doi          = {10.1109/SECDEV56634.2023.00022},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/AliHGRU23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/AlmohriW23,
  author       = {Hussain M. J. Almohri and
                  Layne T. Watson},
  title        = {Model-Agnostic Federated Learning for Privacy-Preserving Systems},
  booktitle    = {{IEEE} Secure Development Conference, SecDev 2023, Atlanta, GA, USA,
                  October 18-20, 2023},
  pages        = {99--105},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SecDev56634.2023.00024},
  doi          = {10.1109/SECDEV56634.2023.00024},
  timestamp    = {Tue, 21 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/AlmohriW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/BajpaiK23,
  author       = {Pranshu Bajpai and
                  Raghudeep Kannavara},
  title        = {Misplaced Trust: The Security Flaw in Modern Code Signing Process},
  booktitle    = {{IEEE} Secure Development Conference, SecDev 2023, Atlanta, GA, USA,
                  October 18-20, 2023},
  pages        = {49--50},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SecDev56634.2023.00018},
  doi          = {10.1109/SECDEV56634.2023.00018},
  timestamp    = {Tue, 21 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/BajpaiK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/BondH23,
  author       = {Eric Bond and
                  Matthew Heimerdinger},
  title        = {Curbing the Vulnerable Parser: Graded Modal Guardrails for Secure
                  Input Handling},
  booktitle    = {{IEEE} Secure Development Conference, SecDev 2023, Atlanta, GA, USA,
                  October 18-20, 2023},
  pages        = {126--132},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SecDev56634.2023.00027},
  doi          = {10.1109/SECDEV56634.2023.00027},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/BondH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/GulmezNBM23,
  author       = {Merve G{\"{u}}lmez and
                  Thomas Nyman and
                  Christoph Baumann and
                  Jan Tobias M{\"{u}}hlberg},
  title        = {Friend or Foe Inside? Exploring In-Process Isolation to Maintain Memory
                  Safety for Unsafe Rust},
  booktitle    = {{IEEE} Secure Development Conference, SecDev 2023, Atlanta, GA, USA,
                  October 18-20, 2023},
  pages        = {54--66},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SecDev56634.2023.00020},
  doi          = {10.1109/SECDEV56634.2023.00020},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secdev/GulmezNBM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/HassanTFNNZSGR23,
  author       = {Muhammad Hassan and
                  Talha Tahir and
                  Muhammad Farrukh and
                  Abdullah Naveed and
                  Anas Naeem and
                  Fareed Zaffar and
                  Fahad Shaon and
                  Ashish Gehani and
                  Sazzadur Rahaman},
  title        = {Evaluating Container Debloaters},
  booktitle    = {{IEEE} Secure Development Conference, SecDev 2023, Atlanta, GA, USA,
                  October 18-20, 2023},
  pages        = {88--98},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SecDev56634.2023.00023},
  doi          = {10.1109/SECDEV56634.2023.00023},
  timestamp    = {Tue, 21 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/HassanTFNNZSGR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/HuBWSSR23,
  author       = {Hanyang Hu and
                  Yani Bu and
                  Kristen Wong and
                  Gaurav Sood and
                  Karen Smiley and
                  Akond Rahman},
  title        = {Characterizing Static Analysis Alerts for Terraform Manifests: An
                  Experience Report},
  booktitle    = {{IEEE} Secure Development Conference, SecDev 2023, Atlanta, GA, USA,
                  October 18-20, 2023},
  pages        = {7--13},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SecDev56634.2023.00014},
  doi          = {10.1109/SECDEV56634.2023.00014},
  timestamp    = {Tue, 21 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/HuBWSSR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/HuangSJ23,
  author       = {Kaiming Huang and
                  Jack Sampson and
                  Trent Jaeger},
  title        = {Assessing the Impact of Efficiently Protecting Ten Million Stack Objects
                  from Memory Errors Comprehensively},
  booktitle    = {{IEEE} Secure Development Conference, SecDev 2023, Atlanta, GA, USA,
                  October 18-20, 2023},
  pages        = {67--74},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SecDev56634.2023.00021},
  doi          = {10.1109/SECDEV56634.2023.00021},
  timestamp    = {Tue, 21 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/HuangSJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/JoshiCR23,
  author       = {Sunil Joshi and
                  Kenneth G. Crowther and
                  Jarvis Robinson},
  title        = {Adaptive Security: Certificate and Key Rotation for Firmware Integrity},
  booktitle    = {{IEEE} Secure Development Conference, SecDev 2023, Atlanta, GA, USA,
                  October 18-20, 2023},
  pages        = {214--215},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SecDev56634.2023.00035},
  doi          = {10.1109/SECDEV56634.2023.00035},
  timestamp    = {Tue, 21 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/JoshiCR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/KashefFSSBKS23,
  author       = {Rasha Kashef and
                  Monika Freunek and
                  Jeff Schwartzentruber and
                  Reza Samavi and
                  Burcu Bulgurcu and
                  A. J. Khan and
                  Marcus Santos},
  title        = {Bridging the Bubbles: Connecting Academia and Industry in Cybersecurity
                  Research},
  booktitle    = {{IEEE} Secure Development Conference, SecDev 2023, Atlanta, GA, USA,
                  October 18-20, 2023},
  pages        = {207--213},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SecDev56634.2023.00034},
  doi          = {10.1109/SECDEV56634.2023.00034},
  timestamp    = {Tue, 21 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/KashefFSSBKS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/KepkowskiMWK23,
  author       = {Michal Kepkowski and
                  Maciej Machulak and
                  Ian D. Wood and
                  Dali Kaafar},
  title        = {Challenges with Passwordless {FIDO2} in an Enterprise Setting: {A}
                  Usability Study},
  booktitle    = {{IEEE} Secure Development Conference, SecDev 2023, Atlanta, GA, USA,
                  October 18-20, 2023},
  pages        = {37--48},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SecDev56634.2023.00017},
  doi          = {10.1109/SECDEV56634.2023.00017},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/KepkowskiMWK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/KrugerRWNABAMF23,
  author       = {Stefan Kr{\"{u}}ger and
                  Michael Reif and
                  Anna{-}Katharina Wickert and
                  Sarah Nadi and
                  Karim Ali and
                  Eric Bodden and
                  Yasemin Acar and
                  Mira Mezini and
                  Sascha Fahl},
  title        = {Securing Your Crypto-API Usage Through Tool Support - {A} Usability
                  Study},
  booktitle    = {{IEEE} Secure Development Conference, SecDev 2023, Atlanta, GA, USA,
                  October 18-20, 2023},
  pages        = {14--25},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SecDev56634.2023.00015},
  doi          = {10.1109/SECDEV56634.2023.00015},
  timestamp    = {Tue, 21 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/KrugerRWNABAMF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/LamLG23,
  author       = {Denley Lam and
                  Letitia W. Li and
                  Anthony Gabrielson},
  title        = {Parser Weakness Enumeration: Definition and Preliminary Assessment},
  booktitle    = {{IEEE} Secure Development Conference, SecDev 2023, Atlanta, GA, USA,
                  October 18-20, 2023},
  pages        = {118--125},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SecDev56634.2023.00026},
  doi          = {10.1109/SECDEV56634.2023.00026},
  timestamp    = {Tue, 21 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/LamLG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/LeeGCCJ23,
  author       = {Yu Tsung Lee and
                  Rahul George and
                  Haining Chen and
                  Kevin Chan and
                  Trent Jaeger},
  title        = {Triaging Android Systems Using Bayesian Attack Graphs},
  booktitle    = {{IEEE} Secure Development Conference, SecDev 2023, Atlanta, GA, USA,
                  October 18-20, 2023},
  pages        = {171--183},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SecDev56634.2023.00031},
  doi          = {10.1109/SECDEV56634.2023.00031},
  timestamp    = {Tue, 21 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/LeeGCCJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/Madheswaran23,
  author       = {Yuvaraj Madheswaran},
  title        = {11 things about Securing Microservice},
  booktitle    = {{IEEE} Secure Development Conference, SecDev 2023, Atlanta, GA, USA,
                  October 18-20, 2023},
  pages        = {51--53},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SecDev56634.2023.00019},
  doi          = {10.1109/SECDEV56634.2023.00019},
  timestamp    = {Tue, 21 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/Madheswaran23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/MirzamohammadiJSLAS23,
  author       = {Omid Mirzamohammadi and
                  Kristof Jannes and
                  Laurens Sion and
                  Dimitri Van Landuyt and
                  Aysajan Abidin and
                  Dave Singel{\'{e}}e},
  title        = {Security and Privacy Threat Analysis for Solid},
  booktitle    = {{IEEE} Secure Development Conference, SecDev 2023, Atlanta, GA, USA,
                  October 18-20, 2023},
  pages        = {196--206},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SecDev56634.2023.00033},
  doi          = {10.1109/SECDEV56634.2023.00033},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/MirzamohammadiJSLAS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/MurphyMSC23,
  author       = {Sinnott Murphy and
                  Richard Macwan and
                  Vivek Kumar Singh and
                  Chin{-}Yao Chang},
  title        = {A randomization-based, zero-trust cyberattack detection method for
                  hierarchical systems},
  booktitle    = {{IEEE} Secure Development Conference, SecDev 2023, Atlanta, GA, USA,
                  October 18-20, 2023},
  pages        = {145--155},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SecDev56634.2023.00029},
  doi          = {10.1109/SECDEV56634.2023.00029},
  timestamp    = {Tue, 21 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/MurphyMSC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/PeseSMJSM23,
  author       = {Mert D. Pes{\'{e}} and
                  Jay W. Schauer and
                  Murali Mohan and
                  Cassandra Joseph and
                  Kang G. Shin and
                  John Moore},
  title        = {{PRICAR:} Privacy Framework for Vehicular Data Sharing with Third
                  Parties},
  booktitle    = {{IEEE} Secure Development Conference, SecDev 2023, Atlanta, GA, USA,
                  October 18-20, 2023},
  pages        = {184--195},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SecDev56634.2023.00032},
  doi          = {10.1109/SECDEV56634.2023.00032},
  timestamp    = {Tue, 21 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/PeseSMJSM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/RiomB23,
  author       = {Timoth{\'{e}}e Riom and
                  Alexandre Bartel},
  title        = {An In-Depth Analysis of Android's Java Class Library: its Evolution
                  and Security Impact},
  booktitle    = {{IEEE} Secure Development Conference, SecDev 2023, Atlanta, GA, USA,
                  October 18-20, 2023},
  pages        = {133--144},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SecDev56634.2023.00028},
  doi          = {10.1109/SECDEV56634.2023.00028},
  timestamp    = {Tue, 21 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/RiomB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/Senier23,
  author       = {Alexander Senier},
  title        = {Tutorial: The End of Binary Protocol Parser Vulnerabilities : Using
                  RecordFlux and {SPARK} to implement formally-verified binary formats
                  and communication protocols},
  booktitle    = {{IEEE} Secure Development Conference, SecDev 2023, Atlanta, GA, USA,
                  October 18-20, 2023},
  pages        = {5--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SecDev56634.2023.00013},
  doi          = {10.1109/SECDEV56634.2023.00013},
  timestamp    = {Tue, 21 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/Senier23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/SongS23,
  author       = {Wenjia Song and
                  Arianna Schuler Scott},
  title        = {Tutorial: Crypto-Ransomware: Analysis, Defense, and Criminal Negotiation},
  booktitle    = {{IEEE} Secure Development Conference, SecDev 2023, Atlanta, GA, USA,
                  October 18-20, 2023},
  pages        = {3--4},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SecDev56634.2023.00012},
  doi          = {10.1109/SECDEV56634.2023.00012},
  timestamp    = {Tue, 21 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/SongS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/TraceyG23,
  author       = {Justin Tracey and
                  Ian Goldberg},
  title        = {Grading on a Curve: How Rust can Facilitate New Contributors while
                  Decreasing Vulnerabilities},
  booktitle    = {{IEEE} Secure Development Conference, SecDev 2023, Atlanta, GA, USA,
                  October 18-20, 2023},
  pages        = {26--36},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SecDev56634.2023.00016},
  doi          = {10.1109/SECDEV56634.2023.00016},
  timestamp    = {Tue, 21 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/TraceyG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/VijayakanthanWAA23,
  author       = {Ramyapandian Vijayakanthan and
                  Karley M. Waguespack and
                  Irfan Ahmed and
                  Aisha I. Ali{-}Gombe},
  title        = {Fortifying IoT Devices: AI-Driven Intrusion Detection via Memory-Encoded
                  Audio Signals},
  booktitle    = {{IEEE} Secure Development Conference, SecDev 2023, Atlanta, GA, USA,
                  October 18-20, 2023},
  pages        = {106--117},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SecDev56634.2023.00025},
  doi          = {10.1109/SECDEV56634.2023.00025},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secdev/VijayakanthanWAA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/WeirDP23,
  author       = {Charles Weir and
                  Anna Dyson and
                  Daniel Prince},
  title        = {A Lot Less Likely Than {I} Thought: Introducing Evidence-Based Security
                  Risk Assessment for Healthcare Software},
  booktitle    = {{IEEE} Secure Development Conference, SecDev 2023, Atlanta, GA, USA,
                  October 18-20, 2023},
  pages        = {156--170},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SecDev56634.2023.00030},
  doi          = {10.1109/SECDEV56634.2023.00030},
  timestamp    = {Tue, 21 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/WeirDP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/YaoFSASS23,
  author       = {Mingxuan Yao and
                  Jonathan Fuller and
                  Ranjita Pai Sridhar and
                  Saumya Agarwal and
                  Amit Kumar Sikder and
                  Brendan Saltaformaggio},
  title        = {Invited Tutorial: Counteracting Web Application Abuse in Malware},
  booktitle    = {{IEEE} Secure Development Conference, SecDev 2023, Atlanta, GA, USA,
                  October 18-20, 2023},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SecDev56634.2023.00011},
  doi          = {10.1109/SECDEV56634.2023.00011},
  timestamp    = {Tue, 21 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/YaoFSASS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/secdev/2023,
  title        = {{IEEE} Secure Development Conference, SecDev 2023, Atlanta, GA, USA,
                  October 18-20, 2023},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SecDev56634.2023},
  doi          = {10.1109/SECDEV56634.2023},
  isbn         = {979-8-3503-3132-5},
  timestamp    = {Tue, 21 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/2023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/AlshmranyBBCKMM22,
  author       = {Kaled M. Alshmrany and
                  Ahmed Bhayat and
                  Franz Brau{\ss}e and
                  Lucas C. Cordeiro and
                  Konstantin Korovin and
                  Tom Melham and
                  Mustafa A. Mustafa and
                  Pierre Olivier and
                  Giles Reger and
                  Fedor Shmarov},
  title        = {Position Paper: Towards a Hybrid Approach to Protect Against Memory
                  Safety Vulnerabilities},
  booktitle    = {{IEEE} Secure Development Conference, SecDev 2022, Atlanta, GA, USA,
                  October 18-20, 2022},
  pages        = {52--58},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SecDev53368.2022.00020},
  doi          = {10.1109/SECDEV53368.2022.00020},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/AlshmranyBBCKMM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/BajpaiL22,
  author       = {Pranshu Bajpai and
                  Adam Lewis},
  title        = {Secure Development Workflows in {CI/CD} Pipelines},
  booktitle    = {{IEEE} Secure Development Conference, SecDev 2022, Atlanta, GA, USA,
                  October 18-20, 2022},
  pages        = {65--66},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SecDev53368.2022.00024},
  doi          = {10.1109/SECDEV53368.2022.00024},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/BajpaiL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/BasakNRW22,
  author       = {Setu Kumar Basak and
                  Lorenzo Neil and
                  Bradley Reaves and
                  Laurie A. Williams},
  title        = {What are the Practices for Secret Management in Software Artifacts?},
  booktitle    = {{IEEE} Secure Development Conference, SecDev 2022, Atlanta, GA, USA,
                  October 18-20, 2022},
  pages        = {69--76},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SecDev53368.2022.00026},
  doi          = {10.1109/SECDEV53368.2022.00026},
  timestamp    = {Tue, 20 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/BasakNRW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/ChehTC22,
  author       = {Carmen Cheh and
                  Nicholas Tay and
                  Binbin Chen},
  title        = {Design and User Study of a Constraint-based Framework for Business
                  Logic Flaw Discovery},
  booktitle    = {{IEEE} Secure Development Conference, SecDev 2022, Atlanta, GA, USA,
                  October 18-20, 2022},
  pages        = {91--99},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SecDev53368.2022.00029},
  doi          = {10.1109/SECDEV53368.2022.00029},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/ChehTC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/CloostersSSD22,
  author       = {Tobias Cloosters and
                  Sebastian Surminski and
                  Gerrit Sangel and
                  Lucas Davi},
  title        = {Salsa: {SGX} Attestation for Live Streaming Applications},
  booktitle    = {{IEEE} Secure Development Conference, SecDev 2022, Atlanta, GA, USA,
                  October 18-20, 2022},
  pages        = {45--51},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SecDev53368.2022.00019},
  doi          = {10.1109/SECDEV53368.2022.00019},
  timestamp    = {Tue, 20 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/CloostersSSD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/CriswellJP22,
  author       = {John Criswell and
                  Ethan Johnson and
                  Colin Pronovost},
  title        = {Tutorial: {LLVM} for Security Practitioners},
  booktitle    = {{IEEE} Secure Development Conference, SecDev 2022, Atlanta, GA, USA,
                  October 18-20, 2022},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SecDev53368.2022.00012},
  doi          = {10.1109/SECDEV53368.2022.00012},
  timestamp    = {Tue, 20 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/CriswellJP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/EversonBMM022,
  author       = {Douglas Everson and
                  Ashish Bastola and
                  Rajat Mittal and
                  Siddheshwar Munde and
                  Long Cheng},
  title        = {A Comparative Study of Log4Sheil Test Tools},
  booktitle    = {{IEEE} Secure Development Conference, SecDev 2022, Atlanta, GA, USA,
                  October 18-20, 2022},
  pages        = {16--22},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SecDev53368.2022.00016},
  doi          = {10.1109/SECDEV53368.2022.00016},
  timestamp    = {Tue, 20 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/EversonBMM022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/GhorshiGLA22,
  author       = {Setareh Ghorshi and
                  Lachlan J. Gunn and
                  Hans Liljestrand and
                  N. Asokan},
  title        = {Towards cryptographically-authenticated in-memory data structures},
  booktitle    = {{IEEE} Secure Development Conference, SecDev 2022, Atlanta, GA, USA,
                  October 18-20, 2022},
  pages        = {30--44},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SecDev53368.2022.00018},
  doi          = {10.1109/SECDEV53368.2022.00018},
  timestamp    = {Tue, 20 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/GhorshiGLA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/GiesenARKD22,
  author       = {Jens{-}Rene Giesen and
                  S{\'{e}}bastien Andreina and
                  Michael Rodler and
                  Ghassan O. Karame and
                  Lucas Davi},
  title        = {Tutorial: Analyzing, Exploiting, and Patching Smart Contracts in Ethereum},
  booktitle    = {{IEEE} Secure Development Conference, SecDev 2022, Atlanta, GA, USA,
                  October 18-20, 2022},
  pages        = {3--4},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SecDev53368.2022.00013},
  doi          = {10.1109/SECDEV53368.2022.00013},
  timestamp    = {Tue, 20 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/GiesenARKD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/GionanidisKGSG22,
  author       = {Emmanouil Gionanidis and
                  Petros S. Karvelis and
                  George K. Georgoulas and
                  Konstantinos Stamos and
                  Purvi Garg},
  title        = {Evaluating Text Augmentation for Boosting the Automatic Mapping of
                  Vulnerability Information to Adversary Techniques},
  booktitle    = {{IEEE} Secure Development Conference, SecDev 2022, Atlanta, GA, USA,
                  October 18-20, 2022},
  pages        = {23--29},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SecDev53368.2022.00017},
  doi          = {10.1109/SECDEV53368.2022.00017},
  timestamp    = {Tue, 20 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/GionanidisKGSG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/HarrisonHBM22,
  author       = {Jack B. Harrison and
                  Joseph R. Harrison and
                  Madison G. Boswell and
                  Alan J. Michaels},
  title        = {A Hierarchical Database of One Million Websites},
  booktitle    = {{IEEE} Secure Development Conference, SecDev 2022, Atlanta, GA, USA,
                  October 18-20, 2022},
  pages        = {67--68},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SecDev53368.2022.00025},
  doi          = {10.1109/SECDEV53368.2022.00025},
  timestamp    = {Tue, 20 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/HarrisonHBM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/KabirWY022,
  author       = {Md Mahir Asef Kabir and
                  Ying Wang and
                  Danfeng Yao and
                  Na Meng},
  title        = {How Do Developers Follow Security-Relevant Best Practices When Using
                  {NPM} Packages?},
  booktitle    = {{IEEE} Secure Development Conference, SecDev 2022, Atlanta, GA, USA,
                  October 18-20, 2022},
  pages        = {77--83},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SecDev53368.2022.00027},
  doi          = {10.1109/SECDEV53368.2022.00027},
  timestamp    = {Sat, 15 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secdev/KabirWY022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/OthmaneGYCVPC22,
  author       = {Lotfi Ben Othmane and
                  Heinrich Gantenbein and
                  Hasan Yasar and
                  Simone Curzi and
                  Altaz Valani and
                  Arun Prabhakar and
                  Robert Cuddy},
  title        = {Tutorial: Threat Modeling of Cloud-based Solutions},
  booktitle    = {{IEEE} Secure Development Conference, SecDev 2022, Atlanta, GA, USA,
                  October 18-20, 2022},
  pages        = {5--6},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SecDev53368.2022.00014},
  doi          = {10.1109/SECDEV53368.2022.00014},
  timestamp    = {Tue, 20 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/OthmaneGYCVPC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/PhokelaSDKB22,
  author       = {Kanchanjot Kaur Phokela and
                  Kapil Singi and
                  Kuntal Dey and
                  Vikrant Kaulgud and
                  Adam P. Burden},
  title        = {Framework to Assess Policy Driven Security Misconfiguration Risks
                  in Cloud Native Application},
  booktitle    = {{IEEE} Secure Development Conference, SecDev 2022, Atlanta, GA, USA,
                  October 18-20, 2022},
  pages        = {63--64},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SecDev53368.2022.00023},
  doi          = {10.1109/SECDEV53368.2022.00023},
  timestamp    = {Tue, 20 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/PhokelaSDKB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/PiskachevDKMB22,
  author       = {Goran Piskachev and
                  Stefan Dziwok and
                  Thorsten Koch and
                  Sven Merschjohann and
                  Eric Bodden},
  title        = {How far are German companies in improving security through static
                  program analysis tools?},
  booktitle    = {{IEEE} Secure Development Conference, SecDev 2022, Atlanta, GA, USA,
                  October 18-20, 2022},
  pages        = {7--15},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SecDev53368.2022.00015},
  doi          = {10.1109/SECDEV53368.2022.00015},
  timestamp    = {Tue, 20 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/PiskachevDKMB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/ShiMGS22,
  author       = {Zhenpeng Shi and
                  Nikolay Matyunin and
                  Kalman Graffi and
                  David Starobinski},
  title        = {Uncovering Product Vulnerabilities with Threat Knowledge Graphs},
  booktitle    = {{IEEE} Secure Development Conference, SecDev 2022, Atlanta, GA, USA,
                  October 18-20, 2022},
  pages        = {84--90},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SecDev53368.2022.00028},
  doi          = {10.1109/SECDEV53368.2022.00028},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secdev/ShiMGS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/Shortridge22,
  author       = {Kelly Shortridge},
  title        = {From Lemons to Peaches: Improving Security {ROI} through Security
                  Chaos Engineering},
  booktitle    = {{IEEE} Secure Development Conference, SecDev 2022, Atlanta, GA, USA,
                  October 18-20, 2022},
  pages        = {59--60},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SecDev53368.2022.00021},
  doi          = {10.1109/SECDEV53368.2022.00021},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/Shortridge22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/XiaoZAKYC22,
  author       = {Ya Xiao and
                  Yang Zhao and
                  Nicholas Allen and
                  Nathan Keynes and
                  Danfeng Yao and
                  Cristina Cifuentes},
  title        = {Industrial Strength Static Detection for Cryptographic {API} Misuses},
  booktitle    = {{IEEE} Secure Development Conference, SecDev 2022, Atlanta, GA, USA,
                  October 18-20, 2022},
  pages        = {61--62},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SecDev53368.2022.00022},
  doi          = {10.1109/SECDEV53368.2022.00022},
  timestamp    = {Tue, 20 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/XiaoZAKYC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/secdev/2022,
  title        = {{IEEE} Secure Development Conference, SecDev 2022, Atlanta, GA, USA,
                  October 18-20, 2022},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SecDev53368.2022},
  doi          = {10.1109/SECDEV53368.2022},
  isbn         = {978-1-6654-7182-4},
  timestamp    = {Tue, 20 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/2022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/00220YC21,
  author       = {Jie Zhou and
                  Michael Hicks and
                  Yudi Yang and
                  John Criswell},
  title        = {Tutorial: Making {C} Programs Safer with Checked {C}},
  booktitle    = {{IEEE} Secure Development Conference, SecDev 2021, Atlanta, GA, USA,
                  October 18-20, 2021},
  pages        = {13--14},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/SecDev51306.2021.00018},
  doi          = {10.1109/SECDEV51306.2021.00018},
  timestamp    = {Thu, 30 Dec 2021 09:40:17 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/00220YC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/Ahmed0LAY21,
  author       = {Salman Ahmed and
                  Long Cheng and
                  Hans Liljestrand and
                  N. Asokan and
                  Danfeng Daphne Yao},
  title        = {Tutorial: Investigating Advanced Exploits for System Security Assurance},
  booktitle    = {{IEEE} Secure Development Conference, SecDev 2021, Atlanta, GA, USA,
                  October 18-20, 2021},
  pages        = {3--4},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/SecDev51306.2021.00013},
  doi          = {10.1109/SECDEV51306.2021.00013},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secdev/Ahmed0LAY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/ChehC21,
  author       = {Carmen Cheh and
                  Binbin Chen},
  title        = {Analyzing OpenAPI Specifications for Security Design Issues},
  booktitle    = {{IEEE} Secure Development Conference, SecDev 2021, Atlanta, GA, USA,
                  October 18-20, 2021},
  pages        = {15--22},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/SecDev51306.2021.00019},
  doi          = {10.1109/SECDEV51306.2021.00019},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/ChehC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/ChowdhuryHPTR21,
  author       = {Partha Das Chowdhury and
                  Joseph Hallett and
                  Nikhil Patnaik and
                  Mohammad Tahaei and
                  Awais Rashid},
  title        = {Developers Are Neither Enemies Nor Users: They Are Collaborators},
  booktitle    = {{IEEE} Secure Development Conference, SecDev 2021, Atlanta, GA, USA,
                  October 18-20, 2021},
  pages        = {47--55},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/SecDev51306.2021.00023},
  doi          = {10.1109/SECDEV51306.2021.00023},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secdev/ChowdhuryHPTR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/CluzelGMZ21,
  author       = {Guillaume Cluzel and
                  Kyriakos Georgiou and
                  Yannick Moy and
                  Cl{\'{e}}ment Zeller},
  title        = {Layered Formal Verification of a {TCP} Stack},
  booktitle    = {{IEEE} Secure Development Conference, SecDev 2021, Atlanta, GA, USA,
                  October 18-20, 2021},
  pages        = {86--93},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/SecDev51306.2021.00028},
  doi          = {10.1109/SECDEV51306.2021.00028},
  timestamp    = {Thu, 30 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/CluzelGMZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/CriswellJP21,
  author       = {John Criswell and
                  Ethan Johnson and
                  Colin Pronovost},
  title        = {Tutorial: {LLVM} for Security Practitioners},
  booktitle    = {{IEEE} Secure Development Conference, SecDev 2021, Atlanta, GA, USA,
                  October 18-20, 2021},
  pages        = {9--10},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/SecDev51306.2021.00016},
  doi          = {10.1109/SECDEV51306.2021.00016},
  timestamp    = {Thu, 30 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/CriswellJP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/Everson021,
  author       = {Douglas Everson and
                  Long Cheng},
  title        = {Compressing Network Attack Surfaces for Practical Security Analysis},
  booktitle    = {{IEEE} Secure Development Conference, SecDev 2021, Atlanta, GA, USA,
                  October 18-20, 2021},
  pages        = {23--29},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/SecDev51306.2021.00020},
  doi          = {10.1109/SECDEV51306.2021.00020},
  timestamp    = {Thu, 30 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/Everson021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/LeeJLLK21,
  author       = {Sungmin Lee and
                  Yoonkyo Jung and
                  Jaehyun Lee and
                  Byoungyoung Lee and
                  Ted "Taekyoung" Kwon},
  title        = {Android Remote Unlocking Service using Synthetic Password: {A} Hardware
                  Security-preserving Approach},
  booktitle    = {{IEEE} Secure Development Conference, SecDev 2021, Atlanta, GA, USA,
                  October 18-20, 2021},
  pages        = {63--70},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/SecDev51306.2021.00025},
  doi          = {10.1109/SECDEV51306.2021.00025},
  timestamp    = {Thu, 30 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/LeeJLLK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/LeeSLE21,
  author       = {David Lee and
                  Brandon Steed and
                  Yi Liu and
                  Onyeka Ezenwoye},
  title        = {Tutorial: {A} Lightweight Web Application for Software Vulnerability
                  Demonstration},
  booktitle    = {{IEEE} Secure Development Conference, SecDev 2021, Atlanta, GA, USA,
                  October 18-20, 2021},
  pages        = {5--6},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/SecDev51306.2021.00014},
  doi          = {10.1109/SECDEV51306.2021.00014},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secdev/LeeSLE21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/LowdermilkS21,
  author       = {Jason Lowdermilk and
                  Simha Sethumadhavan},
  title        = {Towards Zero Trust: An Experience Report},
  booktitle    = {{IEEE} Secure Development Conference, SecDev 2021, Atlanta, GA, USA,
                  October 18-20, 2021},
  pages        = {79--85},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/SecDev51306.2021.00027},
  doi          = {10.1109/SECDEV51306.2021.00027},
  timestamp    = {Thu, 30 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/LowdermilkS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/NarayanDS21,
  author       = {Shravan Narayan and
                  Craig Disselkoen and
                  Deian Stefan},
  title        = {Tutorial: Sandboxing (unsafe) {C} code with RLBox},
  booktitle    = {{IEEE} Secure Development Conference, SecDev 2021, Atlanta, GA, USA,
                  October 18-20, 2021},
  pages        = {11--12},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/SecDev51306.2021.00017},
  doi          = {10.1109/SECDEV51306.2021.00017},
  timestamp    = {Thu, 30 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/NarayanDS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/OakABS21,
  author       = {Aditya Oak and
                  Amir M. Ahmadian and
                  Musard Balliu and
                  Guido Salvaneschi},
  title        = {Enclave-Based Secure Programming with {JE}},
  booktitle    = {{IEEE} Secure Development Conference, SecDev 2021, Atlanta, GA, USA,
                  October 18-20, 2021},
  pages        = {71--78},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/SecDev51306.2021.00026},
  doi          = {10.1109/SECDEV51306.2021.00026},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secdev/OakABS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/RahmanBM21,
  author       = {Akond Rahman and
                  Farhat Lamia Barsha and
                  Patrick Morrison},
  title        = {Shhh!: 12 Practices for Secret Management in Infrastructure as Code},
  booktitle    = {{IEEE} Secure Development Conference, SecDev 2021, Atlanta, GA, USA,
                  October 18-20, 2021},
  pages        = {56--62},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/SecDev51306.2021.00024},
  doi          = {10.1109/SECDEV51306.2021.00024},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secdev/RahmanBM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/ReevesTBC21,
  author       = {Michael Reeves and
                  Dave Jing Tian and
                  Antonio Bianchi and
                  Z. Berkay Celik},
  title        = {Towards Improving Container Security by Preventing Runtime Escapes},
  booktitle    = {{IEEE} Secure Development Conference, SecDev 2021, Atlanta, GA, USA,
                  October 18-20, 2021},
  pages        = {38--46},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/SecDev51306.2021.00022},
  doi          = {10.1109/SECDEV51306.2021.00022},
  timestamp    = {Thu, 30 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/ReevesTBC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/SchaeferRCW21,
  author       = {Ina Schaefer and
                  Tobias Runge and
                  Loek Cleophas and
                  Bruce W. Watson},
  title        = {Tutorial: The Correctness-by-Construction Approach to Programming
                  Using CorC},
  booktitle    = {{IEEE} Secure Development Conference, SecDev 2021, Atlanta, GA, USA,
                  October 18-20, 2021},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/SecDev51306.2021.00012},
  doi          = {10.1109/SECDEV51306.2021.00012},
  timestamp    = {Thu, 30 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/SchaeferRCW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/SionLYVJ21,
  author       = {Laurens Sion and
                  Dimitri Van Landuyt and
                  Koen Yskout and
                  Stef Verreydt and
                  Wouter Joosen},
  title        = {Automated Threat Analysis and Management in a Continuous Integration
                  Pipeline},
  booktitle    = {{IEEE} Secure Development Conference, SecDev 2021, Atlanta, GA, USA,
                  October 18-20, 2021},
  pages        = {30--37},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/SecDev51306.2021.00021},
  doi          = {10.1109/SECDEV51306.2021.00021},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/SionLYVJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/Svoboda21,
  author       = {David Svoboda},
  title        = {Hands-on Tutorial: How Exploitable is Insecure {C} Code?},
  booktitle    = {{IEEE} Secure Development Conference, SecDev 2021, Atlanta, GA, USA,
                  October 18-20, 2021},
  pages        = {7--8},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/SecDev51306.2021.00015},
  doi          = {10.1109/SECDEV51306.2021.00015},
  timestamp    = {Thu, 30 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/Svoboda21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/TsoupidiBB21,
  author       = {Rodothea{-}Myrsini Tsoupidi and
                  Musard Balliu and
                  Benoit Baudry},
  title        = {Vivienne: Relational Verification of Cryptographic Implementations
                  in WebAssembly},
  booktitle    = {{IEEE} Secure Development Conference, SecDev 2021, Atlanta, GA, USA,
                  October 18-20, 2021},
  pages        = {94--102},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/SecDev51306.2021.00029},
  doi          = {10.1109/SECDEV51306.2021.00029},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secdev/TsoupidiBB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/secdev/2021,
  title        = {{IEEE} Secure Development Conference, SecDev 2021, Atlanta, GA, USA,
                  October 18-20, 2021},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/SecDev51306.2021},
  doi          = {10.1109/SECDEV51306.2021},
  isbn         = {978-1-6654-3170-5},
  timestamp    = {Thu, 30 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/2021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/AcostaBKLK20,
  author       = {Jaime C. Acosta and
                  Anjon Basak and
                  Christopher Kiekintveld and
                  Nandi Leslie and
                  Charles A. Kamhoua},
  title        = {Cybersecurity Deception Experimentation System},
  booktitle    = {{IEEE} Secure Development, SecDev 2020, Atlanta, GA, USA, September
                  28-30, 2020},
  pages        = {34--40},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/SecDev45635.2020.00022},
  doi          = {10.1109/SECDEV45635.2020.00022},
  timestamp    = {Wed, 28 Oct 2020 10:41:43 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/AcostaBKLK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/ButtnerPPS20,
  author       = {Andrew Buttner and
                  Richard Piazza and
                  Rushi Purohit and
                  Alec Summers},
  title        = {A Secure Code Review Retrospective},
  booktitle    = {{IEEE} Secure Development, SecDev 2020, Atlanta, GA, USA, September
                  28-30, 2020},
  pages        = {31--32},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/SecDev45635.2020.00020},
  doi          = {10.1109/SECDEV45635.2020.00020},
  timestamp    = {Wed, 28 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/ButtnerPPS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/Criswell20,
  author       = {John Criswell},
  title        = {Tutorial: {LLVM} for Security Practitioners},
  booktitle    = {{IEEE} Secure Development, SecDev 2020, Atlanta, GA, USA, September
                  28-30, 2020},
  pages        = {1},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/SecDev45635.2020.00013},
  doi          = {10.1109/SECDEV45635.2020.00013},
  timestamp    = {Wed, 28 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/Criswell20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/DuanYZC20,
  author       = {Junhan Duan and
                  Yudi Yang and
                  Jie Zhou and
                  John Criswell},
  title        = {Refactoring the FreeBSD Kernel with Checked {C}},
  booktitle    = {{IEEE} Secure Development, SecDev 2020, Atlanta, GA, USA, September
                  28-30, 2020},
  pages        = {15--22},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/SecDev45635.2020.00018},
  doi          = {10.1109/SECDEV45635.2020.00018},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/DuanYZC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/EversonC20,
  author       = {Douglas Everson and
                  Long Cheng},
  title        = {Network Attack Surface Simplification for Red and Blue Teams},
  booktitle    = {{IEEE} Secure Development, SecDev 2020, Atlanta, GA, USA, September
                  28-30, 2020},
  pages        = {74--80},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/SecDev45635.2020.00027},
  doi          = {10.1109/SECDEV45635.2020.00027},
  timestamp    = {Mon, 26 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secdev/EversonC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/FioraldiDQ20,
  author       = {Andrea Fioraldi and
                  Daniele Cono D'Elia and
                  Leonardo Querzoni},
  title        = {Fuzzing Binaries for Memory Safety Errors with QASan},
  booktitle    = {{IEEE} Secure Development, SecDev 2020, Atlanta, GA, USA, September
                  28-30, 2020},
  pages        = {23--30},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/SecDev45635.2020.00019},
  doi          = {10.1109/SECDEV45635.2020.00019},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secdev/FioraldiDQ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/IslamA20,
  author       = {Md. Mazharul Islam and
                  Ehab Al{-}Shaer},
  title        = {Active Deception Framework: An Extensible Development Environment
                  for Adaptive Cyber Deception},
  booktitle    = {{IEEE} Secure Development, SecDev 2020, Atlanta, GA, USA, September
                  28-30, 2020},
  pages        = {41--48},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/SecDev45635.2020.00023},
  doi          = {10.1109/SECDEV45635.2020.00023},
  timestamp    = {Thu, 27 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/IslamA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/IslamRMHKY20,
  author       = {Mazharul Islam and
                  Sazzadur Rahaman and
                  Na Meng and
                  Behnaz Hassanshahi and
                  Padmanabhan Krishnan and
                  Danfeng Daphne Yao},
  title        = {Coding Practices and Recommendations of Spring Security for Enterprise
                  Applications},
  booktitle    = {{IEEE} Secure Development, SecDev 2020, Atlanta, GA, USA, September
                  28-30, 2020},
  pages        = {49--57},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/SecDev45635.2020.00024},
  doi          = {10.1109/SECDEV45635.2020.00024},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secdev/IslamRMHKY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/KimM0MCMT020,
  author       = {Sungkeun Kim and
                  Farabi Mahmud and
                  Jiayi Huang and
                  Pritam Majumder and
                  Neophytos Christou and
                  Abdullah Muzahid and
                  Chia{-}Che Tsai and
                  Eun Jung Kim},
  title        = {ReViCe: Reusing Victim Cache to Prevent Speculative Cache Leakage},
  booktitle    = {{IEEE} Secure Development, SecDev 2020, Atlanta, GA, USA, September
                  28-30, 2020},
  pages        = {96--107},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/SecDev45635.2020.00029},
  doi          = {10.1109/SECDEV45635.2020.00029},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secdev/KimM0MCMT020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/KimR20,
  author       = {Shinhae Kim and
                  Sukyoung Ryu},
  title        = {Analysis of Blockchain Smart Contracts: Techniques and Insights},
  booktitle    = {{IEEE} Secure Development, SecDev 2020, Atlanta, GA, USA, September
                  28-30, 2020},
  pages        = {65--73},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/SecDev45635.2020.00026},
  doi          = {10.1109/SECDEV45635.2020.00026},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secdev/KimR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/MagillD20,
  author       = {Stephen Magill and
                  Thomas DuBuisson},
  title        = {Tutorial: Static Analysis at Scale with Muse},
  booktitle    = {{IEEE} Secure Development, SecDev 2020, Atlanta, GA, USA, September
                  28-30, 2020},
  pages        = {4},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/SecDev45635.2020.00015},
  doi          = {10.1109/SECDEV45635.2020.00015},
  timestamp    = {Wed, 28 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/MagillD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/RosenstatterSJS20,
  author       = {Thomas Rosenstatter and
                  Kim Strandberg and
                  Rodi Jolak and
                  Riccardo Scandariato and
                  Tomas Olovsson},
  title        = {{REMIND:} {A} Framework for the Resilient Design of Automotive Systems},
  booktitle    = {{IEEE} Secure Development, SecDev 2020, Atlanta, GA, USA, September
                  28-30, 2020},
  pages        = {81--95},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/SecDev45635.2020.00028},
  doi          = {10.1109/SECDEV45635.2020.00028},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/RosenstatterSJS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/ShamimBR20,
  author       = {Md. Shazibul Islam Shamim and
                  Farzana Ahamed Bhuiyan and
                  Akond Rahman},
  title        = {{XI} Commandments of Kubernetes Security: {A} Systematization of Knowledge
                  Related to Kubernetes Security Practices},
  booktitle    = {{IEEE} Secure Development, SecDev 2020, Atlanta, GA, USA, September
                  28-30, 2020},
  pages        = {58--64},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/SecDev45635.2020.00025},
  doi          = {10.1109/SECDEV45635.2020.00025},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secdev/ShamimBR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/ShenDC20,
  author       = {Zhuojia Shen and
                  Komail Dharsee and
                  John Criswell},
  title        = {Fast Execute-Only Memory for Embedded Systems},
  booktitle    = {{IEEE} Secure Development, SecDev 2020, Atlanta, GA, USA, September
                  28-30, 2020},
  pages        = {7--14},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/SecDev45635.2020.00017},
  doi          = {10.1109/SECDEV45635.2020.00017},
  timestamp    = {Sun, 12 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/ShenDC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/TombPD20,
  author       = {Aaron Tomb and
                  Stuart Pernsteiner and
                  Mike Dodds},
  title        = {Symbolic Testing for {C} and Rust},
  booktitle    = {{IEEE} Secure Development, SecDev 2020, Atlanta, GA, USA, September
                  28-30, 2020},
  pages        = {33},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/SecDev45635.2020.00021},
  doi          = {10.1109/SECDEV45635.2020.00021},
  timestamp    = {Wed, 28 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/TombPD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/XiaoFARY20,
  author       = {Ya Xiao and
                  Miles Frantz and
                  Sharmin Afrose and
                  Sazzadur Rahaman and
                  Danfeng Daphne Yao},
  title        = {Tutorial: Principles and Practices of Secure Cryptographic Coding
                  in Java},
  booktitle    = {{IEEE} Secure Development, SecDev 2020, Atlanta, GA, USA, September
                  28-30, 2020},
  pages        = {5--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/SecDev45635.2020.00016},
  doi          = {10.1109/SECDEV45635.2020.00016},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secdev/XiaoFARY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/YavuzB20,
  author       = {Tuba Yavuz and
                  Ken Yihang Bai},
  title        = {Tutorial: Detecting Memory Vulnerabilities in the Components of System
                  Code using {PROMPT}},
  booktitle    = {{IEEE} Secure Development, SecDev 2020, Atlanta, GA, USA, September
                  28-30, 2020},
  pages        = {2--3},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/SecDev45635.2020.00014},
  doi          = {10.1109/SECDEV45635.2020.00014},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secdev/YavuzB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/secdev/2020,
  title        = {{IEEE} Secure Development, SecDev 2020, Atlanta, GA, USA, September
                  28-30, 2020},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/9229476/proceeding},
  isbn         = {978-1-7281-8388-6},
  timestamp    = {Wed, 28 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/2020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/0004AM19,
  author       = {Wei Bai and
                  Omer Akgul and
                  Michelle L. Mazurek},
  title        = {A Qualitative Investigation of Insecure Code Propagation from Online
                  Forums},
  booktitle    = {2019 {IEEE} Cybersecurity Development, SecDev 2019, Tysons Corner,
                  VA, USA, September 23-25, 2019},
  pages        = {34--48},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/SecDev.2019.00016},
  doi          = {10.1109/SECDEV.2019.00016},
  timestamp    = {Wed, 27 Nov 2019 18:04:04 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/0004AM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/0005LANJAY19,
  author       = {Long Cheng and
                  Hans Liljestrand and
                  Md. Salman Ahmed and
                  Thomas Nyman and
                  Trent Jaeger and
                  N. Asokan and
                  Danfeng Yao},
  title        = {Exploitation Techniques and Defenses for Data-Oriented Attacks},
  booktitle    = {2019 {IEEE} Cybersecurity Development, SecDev 2019, Tysons Corner,
                  VA, USA, September 23-25, 2019},
  pages        = {114--128},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/SecDev.2019.00022},
  doi          = {10.1109/SECDEV.2019.00022},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secdev/0005LANJAY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/AfroseRY19,
  author       = {Sharmin Afrose and
                  Sazzadur Rahaman and
                  Danfeng Yao},
  title        = {CryptoAPI-Bench: {A} Comprehensive Benchmark on Java Cryptographic
                  {API} Misuses},
  booktitle    = {2019 {IEEE} Cybersecurity Development, SecDev 2019, Tysons Corner,
                  VA, USA, September 23-25, 2019},
  pages        = {49--61},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/SecDev.2019.00017},
  doi          = {10.1109/SECDEV.2019.00017},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secdev/AfroseRY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/AlbabILFQG19,
  author       = {Kinan Dak Albab and
                  Rawane Issa and
                  Andrei Lapets and
                  Peter Flockhart and
                  Lucy Qin and
                  Ira Globus{-}Harris},
  title        = {Tutorial: Deploying Secure Multi-Party Computation on the Web Using
                  {JIFF}},
  booktitle    = {2019 {IEEE} Cybersecurity Development, SecDev 2019, Tysons Corner,
                  VA, USA, September 23-25, 2019},
  pages        = {3},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/SecDev.2019.00013},
  doi          = {10.1109/SECDEV.2019.00013},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secdev/AlbabILFQG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/Alnaim19,
  author       = {Abdulrahman A. Alnaim},
  title        = {Using Rules Engine in the Automation of System Security Review},
  booktitle    = {2019 {IEEE} Cybersecurity Development, SecDev 2019, Tysons Corner,
                  VA, USA, September 23-25, 2019},
  pages        = {142},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/SecDev.2019.00025},
  doi          = {10.1109/SECDEV.2019.00025},
  timestamp    = {Wed, 27 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/Alnaim19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/BrosgolDM19,
  author       = {Benjamin M. Brosgol and
                  Claire Dross and
                  Yannick Moy},
  title        = {Tutorial: {A} Practical Introduction to Formal Development and Verification
                  of High-Assurance Software with {SPARK}},
  booktitle    = {2019 {IEEE} Cybersecurity Development, SecDev 2019, Tysons Corner,
                  VA, USA, September 23-25, 2019},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/SecDev.2019.00012},
  doi          = {10.1109/SECDEV.2019.00012},
  timestamp    = {Wed, 27 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/BrosgolDM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/Chen19,
  author       = {Chien{-}An Chen},
  title        = {With Great Abstraction Comes Great Responsibility: Sealing the Microservices
                  Attack Surface},
  booktitle    = {2019 {IEEE} Cybersecurity Development, SecDev 2019, Tysons Corner,
                  VA, USA, September 23-25, 2019},
  pages        = {144},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/SecDev.2019.00027},
  doi          = {10.1109/SECDEV.2019.00027},
  timestamp    = {Wed, 27 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/Chen19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/CruzT19,
  author       = {Raimil Cruz and
                  {\'{E}}ric Tanter},
  title        = {Polymorphic Relaxed Noninterference},
  booktitle    = {2019 {IEEE} Cybersecurity Development, SecDev 2019, Tysons Corner,
                  VA, USA, September 23-25, 2019},
  pages        = {101--113},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/SecDev.2019.00021},
  doi          = {10.1109/SECDEV.2019.00021},
  timestamp    = {Wed, 27 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/CruzT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/DenardMEE19,
  author       = {Samuel Denard and
                  Susan A. Mengel and
                  Atila Ertas and
                  Stephen Ekwaro{-}Osire},
  title        = {Development Cycle Estimation Modeling},
  booktitle    = {2019 {IEEE} Cybersecurity Development, SecDev 2019, Tysons Corner,
                  VA, USA, September 23-25, 2019},
  pages        = {146},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/SecDev.2019.00029},
  doi          = {10.1109/SECDEV.2019.00029},
  timestamp    = {Fri, 07 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secdev/DenardMEE19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/HanSNML19,
  author       = {Yongkui Han and
                  Pankil Shah and
                  Van Nguyen and
                  Ling Ma and
                  Richard Livingston},
  title        = {OpenOSC: Open Source Object Size Checking Library With Built-in Metrics},
  booktitle    = {2019 {IEEE} Cybersecurity Development, SecDev 2019, Tysons Corner,
                  VA, USA, September 23-25, 2019},
  pages        = {143},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/SecDev.2019.00026},
  doi          = {10.1109/SECDEV.2019.00026},
  timestamp    = {Wed, 27 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/HanSNML19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/HoganMRCDHVZ19,
  author       = {Kyle Hogan and
                  Hoda Maleki and
                  Reza Rahaeimehr and
                  Ran Canetti and
                  Marten van Dijk and
                  Jason Hennessey and
                  Mayank Varia and
                  Haibin Zhang},
  title        = {On the Universally Composable Security of OpenStack},
  booktitle    = {2019 {IEEE} Cybersecurity Development, SecDev 2019, Tysons Corner,
                  VA, USA, September 23-25, 2019},
  pages        = {20--33},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/SecDev.2019.00015},
  doi          = {10.1109/SECDEV.2019.00015},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secdev/HoganMRCDHVZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/LapetsAIQVBJ19,
  author       = {Andrei Lapets and
                  Kinan Dak Albab and
                  Rawane Issa and
                  Lucy Qin and
                  Mayank Varia and
                  Azer Bestavros and
                  Frederick Jansen},
  title        = {Role-Based Ecosystem for the Design, Development, and Deployment of
                  Secure Multi-Party Data Analytics Applications},
  booktitle    = {2019 {IEEE} Cybersecurity Development, SecDev 2019, Tysons Corner,
                  VA, USA, September 23-25, 2019},
  pages        = {129--140},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/SecDev.2019.00023},
  doi          = {10.1109/SECDEV.2019.00023},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secdev/LapetsAIQVBJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/McMillanZ19,
  author       = {Kenneth L. McMillan and
                  Lenore D. Zuck},
  title        = {Compositional Testing of Internet Protocols},
  booktitle    = {2019 {IEEE} Cybersecurity Development, SecDev 2019, Tysons Corner,
                  VA, USA, September 23-25, 2019},
  pages        = {161--174},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/SecDev.2019.00031},
  doi          = {10.1109/SECDEV.2019.00031},
  timestamp    = {Wed, 27 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/McMillanZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/MenonKSMFHBN19,
  author       = {Vivek V. Menon and
                  Gaurav Kolhe and
                  Andrew G. Schmidt and
                  Joshua S. Monson and
                  Matthew French and
                  Yinghua Hu and
                  Peter A. Beerel and
                  Pierluigi Nuzzo},
  title        = {System-Level Framework for Logic Obfuscation with Quantified Metrics
                  for Evaluation},
  booktitle    = {2019 {IEEE} Cybersecurity Development, SecDev 2019, Tysons Corner,
                  VA, USA, September 23-25, 2019},
  pages        = {89--100},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/SecDev.2019.00020},
  doi          = {10.1109/SECDEV.2019.00020},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secdev/MenonKSMFHBN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/PathakSHG19,
  author       = {Abhishek Pathak and
                  Kaarthik Sivakumar and
                  Mazhar Haque and
                  Prasanna Ganesan},
  title        = {Multi-Cluster Visualization and Live Reporting of Static Analysis
                  Security Testing {(SAST)} Warnings},
  booktitle    = {2019 {IEEE} Cybersecurity Development, SecDev 2019, Tysons Corner,
                  VA, USA, September 23-25, 2019},
  pages        = {145},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/SecDev.2019.00028},
  doi          = {10.1109/SECDEV.2019.00028},
  timestamp    = {Wed, 27 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/PathakSHG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/PathakSSYH19,
  author       = {Abhishek Pathak and
                  Kaarthik Sivakumar and
                  Jin Sheng and
                  Anlu Yan and
                  Mazhar Haque},
  title        = {Effective Static Analysis Enforcement in Complex Cloud Native Dockerized
                  Systems},
  booktitle    = {2019 {IEEE} Cybersecurity Development, SecDev 2019, Tysons Corner,
                  VA, USA, September 23-25, 2019},
  pages        = {141},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/SecDev.2019.00024},
  doi          = {10.1109/SECDEV.2019.00024},
  timestamp    = {Wed, 27 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/PathakSSYH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/SchweizerN19,
  author       = {Remo Schweizer and
                  Stephan Neuhaus},
  title        = {Downright: {A} Framework and Toolchain for Privilege Handling},
  booktitle    = {2019 {IEEE} Cybersecurity Development, SecDev 2019, Tysons Corner,
                  VA, USA, September 23-25, 2019},
  pages        = {76--88},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/SecDev.2019.00019},
  doi          = {10.1109/SECDEV.2019.00019},
  timestamp    = {Wed, 27 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/SchweizerN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/SyversonT19,
  author       = {Paul Syverson and
                  Matthew Traudt},
  title        = {Self-Authenticating Traditional Domain Names},
  booktitle    = {2019 {IEEE} Cybersecurity Development, SecDev 2019, Tysons Corner,
                  VA, USA, September 23-25, 2019},
  pages        = {147--160},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/SecDev.2019.00030},
  doi          = {10.1109/SECDEV.2019.00030},
  timestamp    = {Wed, 27 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/SyversonT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/TuveriB19,
  author       = {Nicola Tuveri and
                  Billy Bob Brumley},
  title        = {Start Your ENGINEs: Dynamically Loadable Contemporary Crypto},
  booktitle    = {2019 {IEEE} Cybersecurity Development, SecDev 2019, Tysons Corner,
                  VA, USA, September 23-25, 2019},
  pages        = {4--19},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/SecDev.2019.00014},
  doi          = {10.1109/SECDEV.2019.00014},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/TuveriB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/Yavuz19,
  author       = {Tuba Yavuz},
  title        = {Detecting Callback Related Deep Vulnerabilities in Linux Device Drivers},
  booktitle    = {2019 {IEEE} Cybersecurity Development, SecDev 2019, Tysons Corner,
                  VA, USA, September 23-25, 2019},
  pages        = {62--75},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/SecDev.2019.00018},
  doi          = {10.1109/SECDEV.2019.00018},
  timestamp    = {Wed, 27 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/Yavuz19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/secdev/2019,
  title        = {2019 {IEEE} Cybersecurity Development, SecDev 2019, Tysons Corner,
                  VA, USA, September 23-25, 2019},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/8894011/proceeding},
  isbn         = {978-1-5386-7289-1},
  timestamp    = {Wed, 27 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/2019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/0002PW18,
  author       = {Hang Hu and
                  Peng Peng and
                  Gang Wang},
  title        = {Towards Understanding the Adoption of Anti-Spoofing Protocols in Email
                  Systems},
  booktitle    = {2018 {IEEE} Cybersecurity Development, SecDev 2018, Cambridge, MA,
                  USA, September 30 - October 2, 2018},
  pages        = {94--101},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/SecDev.2018.00020},
  doi          = {10.1109/SECDEV.2018.00020},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/0002PW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/ArbelaezELWZ18,
  author       = {Andrea Arbelaez and
                  Sallie Edwards and
                  Kevin Littlefield and
                  Sue Wang and
                  Kangmin Zheng},
  title        = {Securing Wireless Infusion Pumps},
  booktitle    = {2018 {IEEE} Cybersecurity Development, SecDev 2018, Cambridge, MA,
                  USA, September 30 - October 2, 2018},
  pages        = {141},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/SecDev.2018.00037},
  doi          = {10.1109/SECDEV.2018.00037},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/ArbelaezELWZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/BergheYSJ18,
  author       = {Alexander van Den Berghe and
                  Koen Yskout and
                  Riccardo Scandariato and
                  Wouter Joosen},
  title        = {A Lingua Franca for Security by Design},
  booktitle    = {2018 {IEEE} Cybersecurity Development, SecDev 2018, Cambridge, MA,
                  USA, September 30 - October 2, 2018},
  pages        = {69--76},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/SecDev.2018.00017},
  doi          = {10.1109/SECDEV.2018.00017},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/BergheYSJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/BlanchardKL18,
  author       = {Allan Blanchard and
                  Nikolai Kosmatov and
                  Fr{\'{e}}d{\'{e}}ric Loulergue},
  title        = {Tutorial: Secure Your Things: Secure Development of IoT Software with
                  Frama-C},
  booktitle    = {2018 {IEEE} Cybersecurity Development, SecDev 2018, Cambridge, MA,
                  USA, September 30 - October 2, 2018},
  pages        = {126--127},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/SecDev.2018.00026},
  doi          = {10.1109/SECDEV.2018.00026},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secdev/BlanchardKL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/CaiDW18,
  author       = {Chengjun Cai and
                  Huayi Duan and
                  Cong Wang},
  title        = {Tutorial: Building Secure and Trustworthy Blockchain Applications},
  booktitle    = {2018 {IEEE} Cybersecurity Development, SecDev 2018, Cambridge, MA,
                  USA, September 30 - October 2, 2018},
  pages        = {120--121},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/SecDev.2018.00023},
  doi          = {10.1109/SECDEV.2018.00023},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/CaiDW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/DhillonM18,
  author       = {Danny Dhillon and
                  Vishal Mishra},
  title        = {Applied Threat Driven Security Verification},
  booktitle    = {2018 {IEEE} Cybersecurity Development, SecDev 2018, Cambridge, MA,
                  USA, September 30 - October 2, 2018},
  pages        = {135},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/SecDev.2018.00031},
  doi          = {10.1109/SECDEV.2018.00031},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/DhillonM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/DoddsMT18,
  author       = {Mike Dodds and
                  Stephen Magill and
                  Aaron Tomb},
  title        = {Tutorial: Continuous Verification of Critical Software},
  booktitle    = {2018 {IEEE} Cybersecurity Development, SecDev 2018, Cambridge, MA,
                  USA, September 30 - October 2, 2018},
  pages        = {128--129},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/SecDev.2018.00027},
  doi          = {10.1109/SECDEV.2018.00027},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/DoddsMT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/ElliottR0T18,
  author       = {Archibald Samuel Elliott and
                  Andrew Ruef and
                  Michael Hicks and
                  David Tarditi},
  title        = {Checked {C:} Making {C} Safe by Extension},
  booktitle    = {2018 {IEEE} Cybersecurity Development, SecDev 2018, Cambridge, MA,
                  USA, September 30 - October 2, 2018},
  pages        = {53--60},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/SecDev.2018.00015},
  doi          = {10.1109/SECDEV.2018.00015},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/ElliottR0T18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/FooAYS18,
  author       = {Darius Foo and
                  Ming Yi Ang and
                  Jason Yeo and
                  Asankhaya Sharma},
  title        = {{SGL:} {A} Domain-Specific Language for Large-Scale Analysis of Open-Source
                  Code},
  booktitle    = {2018 {IEEE} Cybersecurity Development, SecDev 2018, Cambridge, MA,
                  USA, September 30 - October 2, 2018},
  pages        = {61--68},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/SecDev.2018.00016},
  doi          = {10.1109/SECDEV.2018.00016},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/FooAYS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/GauthierKACK18,
  author       = {Fran{\c{c}}ois Gauthier and
                  Nathan Keynes and
                  Nicholas Allen and
                  Diane Corney and
                  Padmanabhan Krishnan},
  title        = {Scalable Static Analysis to Detect Security Vulnerabilities: Challenges
                  and Solutions},
  booktitle    = {2018 {IEEE} Cybersecurity Development, SecDev 2018, Cambridge, MA,
                  USA, September 30 - October 2, 2018},
  pages        = {134},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/SecDev.2018.00030},
  doi          = {10.1109/SECDEV.2018.00030},
  timestamp    = {Fri, 24 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/GauthierKACK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/GilOS18,
  author       = {Ronald Gil and
                  Hamed Okhravi and
                  Howard E. Shrobe},
  title        = {There's a Hole in the Bottom of the {C:} On the Effectiveness of Allocation
                  Protection},
  booktitle    = {2018 {IEEE} Cybersecurity Development, SecDev 2018, Cambridge, MA,
                  USA, September 30 - October 2, 2018},
  pages        = {102--109},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/SecDev.2018.00021},
  doi          = {10.1109/SECDEV.2018.00021},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/GilOS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/GlumichRRO18,
  author       = {Sonja Glumich and
                  Juanita Riley and
                  E. Paul Ratazzi and
                  Amanda Ozanam},
  title        = {{BP:} Integrating Cyber Vulnerability Assessments Earlier into the
                  Systems Development Lifecycle: {A} Methodology to Conduct Early-Cycle
                  Cyber Vulnerability Assessments},
  booktitle    = {2018 {IEEE} Cybersecurity Development, SecDev 2018, Cambridge, MA,
                  USA, September 30 - October 2, 2018},
  pages        = {77--84},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/SecDev.2018.00018},
  doi          = {10.1109/SECDEV.2018.00018},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secdev/GlumichRRO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/GoodmanGG18,
  author       = {Peter Goodman and
                  Gustavo Grieco and
                  Alex Groce},
  title        = {Tutorial: DeepState: Bringing Vulnerability Detection Tools into the
                  Development Cycle},
  booktitle    = {2018 {IEEE} Cybersecurity Development, SecDev 2018, Cambridge, MA,
                  USA, September 30 - October 2, 2018},
  pages        = {130--131},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/SecDev.2018.00028},
  doi          = {10.1109/SECDEV.2018.00028},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/GoodmanGG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/HeymannM18,
  author       = {Elisa Heymann and
                  Barton P. Miller},
  title        = {Tutorial: Secure Coding Practices, Automated Assessment Tools and
                  the {SWAMP}},
  booktitle    = {2018 {IEEE} Cybersecurity Development, SecDev 2018, Cambridge, MA,
                  USA, September 30 - October 2, 2018},
  pages        = {124--125},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/SecDev.2018.00025},
  doi          = {10.1109/SECDEV.2018.00025},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/HeymannM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/HuZGC18,
  author       = {Xiaoyu Hu and
                  Jie Zhou and
                  Spyridoula Gravani and
                  John Criswell},
  title        = {Transforming Code to Drop Dead Privileges},
  booktitle    = {2018 {IEEE} Cybersecurity Development, SecDev 2018, Cambridge, MA,
                  USA, September 30 - October 2, 2018},
  pages        = {45--52},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/SecDev.2018.00014},
  doi          = {10.1109/SECDEV.2018.00014},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/HuZGC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/KannavaraVRLS18,
  author       = {Raghudeep Kannavara and
                  Jacob Vangore and
                  William Roberts and
                  Marcus Lindholm and
                  Priti Shrivastav},
  title        = {Automating Threat Intelligence for {SDL}},
  booktitle    = {2018 {IEEE} Cybersecurity Development, SecDev 2018, Cambridge, MA,
                  USA, September 30 - October 2, 2018},
  pages        = {137},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/SecDev.2018.00033},
  doi          = {10.1109/SECDEV.2018.00033},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/KannavaraVRLS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/LiSWLEKVW18,
  author       = {Jason H. Li and
                  Douglas Schafer and
                  David Whelihan and
                  Stefano Lassini and
                  Nicholas Evancich and
                  Kyung Joon Kwak and
                  Michael Vai and
                  Haley Whitman},
  title        = {Designing Secure and Resilient Embedded Avionics Systems},
  booktitle    = {2018 {IEEE} Cybersecurity Development, SecDev 2018, Cambridge, MA,
                  USA, September 30 - October 2, 2018},
  pages        = {139},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/SecDev.2018.00035},
  doi          = {10.1109/SECDEV.2018.00035},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/LiSWLEKVW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/McBrideTELS18,
  author       = {Tim McBride and
                  Anne Townsend and
                  Michael Ekstrom and
                  Lauren Lusty and
                  Julian Sexton},
  title        = {Data Integrity: Recovering from Ransomware and Other Destructive Events},
  booktitle    = {2018 {IEEE} Cybersecurity Development, SecDev 2018, Cambridge, MA,
                  USA, September 30 - October 2, 2018},
  pages        = {140},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/SecDev.2018.00036},
  doi          = {10.1109/SECDEV.2018.00036},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/McBrideTELS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/MertogunoCKM18,
  author       = {J. Sukarno Mertoguno and
                  Ryan Craven and
                  Daniel Koller and
                  Matthew Mickelson},
  title        = {Reducing Attack Surface via Executable Transformation},
  booktitle    = {2018 {IEEE} Cybersecurity Development, SecDev 2018, Cambridge, MA,
                  USA, September 30 - October 2, 2018},
  pages        = {138},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/SecDev.2018.00034},
  doi          = {10.1109/SECDEV.2018.00034},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/MertogunoCKM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/MohanOK18,
  author       = {Vaishnavi Mohan and
                  Lotfi Ben Othmane and
                  Andre Kres},
  title        = {{BP:} Security Concerns and Best Practices for Automation of Software
                  Deployment Processes: An Industrial Case Study},
  booktitle    = {2018 {IEEE} Cybersecurity Development, SecDev 2018, Cambridge, MA,
                  USA, September 30 - October 2, 2018},
  pages        = {21--28},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/SecDev.2018.00011},
  doi          = {10.1109/SECDEV.2018.00011},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/MohanOK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/MonroseW18,
  author       = {Fabian Monrose and
                  Jan Werner},
  title        = {Tutorial: Parry and {RIPOSTE:} Honing Cybersecurity Skills with Challenge-Based
                  Exercises},
  booktitle    = {2018 {IEEE} Cybersecurity Development, SecDev 2018, Cambridge, MA,
                  USA, September 30 - October 2, 2018},
  pages        = {132--133},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/SecDev.2018.00029},
  doi          = {10.1109/SECDEV.2018.00029},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/MonroseW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/MurrayO18,
  author       = {Toby C. Murray and
                  Paul C. van Oorschot},
  title        = {{BP:} Formal Proofs, the Fine Print and Side Effects},
  booktitle    = {2018 {IEEE} Cybersecurity Development, SecDev 2018, Cambridge, MA,
                  USA, September 30 - October 2, 2018},
  pages        = {1--10},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/SecDev.2018.00009},
  doi          = {10.1109/SECDEV.2018.00009},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/MurrayO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/RahamanMY18,
  author       = {Sazzadur Rahaman and
                  Na Meng and
                  Danfeng Yao},
  title        = {Tutorial: Principles and Practices of Secure Crypto Coding in Java},
  booktitle    = {2018 {IEEE} Cybersecurity Development, SecDev 2018, Cambridge, MA,
                  USA, September 30 - October 2, 2018},
  pages        = {122--123},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/SecDev.2018.00024},
  doi          = {10.1109/SECDEV.2018.00024},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/RahamanMY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/RahmatiFEP18,
  author       = {Amir Rahmati and
                  Earlence Fernandes and
                  Kevin Eykholt and
                  Atul Prakash},
  title        = {Tyche: {A} Risk-Based Permission Model for Smart Homes},
  booktitle    = {2018 {IEEE} Cybersecurity Development, SecDev 2018, Cambridge, MA,
                  USA, September 30 - October 2, 2018},
  pages        = {29--36},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/SecDev.2018.00012},
  doi          = {10.1109/SECDEV.2018.00012},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/RahmatiFEP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/SnavelyKSSK18,
  author       = {Will Snavely and
                  William Klieber and
                  Ryan Steele and
                  David Svoboda and
                  Andrew Kotov},
  title        = {Detecting Leaks of Sensitive Data Due to Stale Reads},
  booktitle    = {2018 {IEEE} Cybersecurity Development, SecDev 2018, Cambridge, MA,
                  USA, September 30 - October 2, 2018},
  pages        = {37--44},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/SecDev.2018.00013},
  doi          = {10.1109/SECDEV.2018.00013},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/SnavelyKSSK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/Tang18,
  author       = {Xuan Tang},
  title        = {Best Practice for Developing Secure and Trusted Enterprise Storage
                  {\&} Computing Products},
  booktitle    = {2018 {IEEE} Cybersecurity Development, SecDev 2018, Cambridge, MA,
                  USA, September 30 - October 2, 2018},
  pages        = {142},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/SecDev.2018.00038},
  doi          = {10.1109/SECDEV.2018.00038},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/Tang18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/TheisenSTW18,
  author       = {Christopher Theisen and
                  Hyunwoo Sohn and
                  Dawson Tripp and
                  Laurie A. Williams},
  title        = {{BP:} Profiling Vulnerabilities on the Attack Surface},
  booktitle    = {2018 {IEEE} Cybersecurity Development, SecDev 2018, Cambridge, MA,
                  USA, September 30 - October 2, 2018},
  pages        = {110--119},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/SecDev.2018.00022},
  doi          = {10.1109/SECDEV.2018.00022},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/TheisenSTW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/Valani18,
  author       = {Altaz Valani},
  title        = {Rethinking Secure DevOps Threat Modeling: The Need for a Dual Velocity
                  Approach},
  booktitle    = {2018 {IEEE} Cybersecurity Development, SecDev 2018, Cambridge, MA,
                  USA, September 30 - October 2, 2018},
  pages        = {136},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/SecDev.2018.00032},
  doi          = {10.1109/SECDEV.2018.00032},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/Valani18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/WeirBBS018,
  author       = {Charles Weir and
                  Lynne Blair and
                  Ingolf Becker and
                  M. Angela Sasse and
                  James Noble},
  title        = {Light-Touch Interventions to Improve Software Development Security},
  booktitle    = {2018 {IEEE} Cybersecurity Development, SecDev 2018, Cambridge, MA,
                  USA, September 30 - October 2, 2018},
  pages        = {85--93},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/SecDev.2018.00019},
  doi          = {10.1109/SECDEV.2018.00019},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/WeirBBS018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/YanPZCEFSTVWRVW18,
  author       = {Lok K. Yan and
                  Benjamin Price and
                  Michael Zhivich and
                  Brian Caswell and
                  Christopher Eagle and
                  Michael Frantzen and
                  Holt Sorenson and
                  Michael Thompson and
                  Timothy Vidas and
                  Jason Wright and
                  Vernon Rivet and
                  Samuel Colt VanWinkle and
                  Clark Wood},
  title        = {{BP:} {DECREE:} {A} Platform for Repeatable and Reproducible Security
                  Experiments},
  booktitle    = {2018 {IEEE} Cybersecurity Development, SecDev 2018, Cambridge, MA,
                  USA, September 30 - October 2, 2018},
  pages        = {11--20},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/SecDev.2018.00010},
  doi          = {10.1109/SECDEV.2018.00010},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/YanPZCEFSTVWRVW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/Yasar18,
  author       = {Hasan Yasar},
  title        = {Experiment: Sizing Exposed Credentials in GitHub Public Repositories
                  for {CI/CD}},
  booktitle    = {2018 {IEEE} Cybersecurity Development, SecDev 2018, Cambridge, MA,
                  USA, September 30 - October 2, 2018},
  pages        = {143},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/SecDev.2018.00039},
  doi          = {10.1109/SECDEV.2018.00039},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/Yasar18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/secdev/2018,
  title        = {2018 {IEEE} Cybersecurity Development, SecDev 2018, Cambridge, MA,
                  USA, September 30 - October 2, 2018},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/8526271/proceeding},
  isbn         = {978-1-5386-7662-2},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secdev/2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/AcarSWWMF17,
  author       = {Yasemin Acar and
                  Christian Stransky and
                  Dominik Wermke and
                  Charles Weir and
                  Michelle L. Mazurek and
                  Sascha Fahl},
  title        = {Developers Need Support, Too: {A} Survey of Security Advice for Software
                  Developers},
  booktitle    = {{IEEE} Cybersecurity Development, SecDev 2017, Cambridge, MA, USA,
                  September 24-26, 2017},
  pages        = {22--26},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/SecDev.2017.17},
  doi          = {10.1109/SECDEV.2017.17},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/AcarSWWMF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/AnantharamanMBP17,
  author       = {Prashant Anantharaman and
                  Michael C. Millian and
                  Sergey Bratus and
                  Meredith L. Patterson},
  title        = {Input Handling Done Right: Building Hardened Parsers Using Language-Theoretic
                  Security},
  booktitle    = {{IEEE} Cybersecurity Development, SecDev 2017, Cambridge, MA, USA,
                  September 24-26, 2017},
  pages        = {4--5},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/SecDev.2017.12},
  doi          = {10.1109/SECDEV.2017.12},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/AnantharamanMBP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/CarlstenSWKC17,
  author       = {Nadia Carlsten and
                  Reed Sturtevant and
                  Chris Wysopal and
                  Andreas Kuehlmann and
                  Robert K. Cunningham},
  title        = {Panel: Building a Business around Secure Development},
  booktitle    = {{IEEE} Cybersecurity Development, SecDev 2017, Cambridge, MA, USA,
                  September 24-26, 2017},
  pages        = {xiii--xiv},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/SecDev.2017.9},
  doi          = {10.1109/SECDEV.2017.9},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/CarlstenSWKC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/CauligiSBJHJS17,
  author       = {Sunjay Cauligi and
                  Gary Soeller and
                  Fraser Brown and
                  Brian Johannesmeyer and
                  Yunlu Huang and
                  Ranjit Jhala and
                  Deian Stefan},
  title        = {FaCT: {A} Flexible, Constant-Time Programming Language},
  booktitle    = {{IEEE} Cybersecurity Development, SecDev 2017, Cambridge, MA, USA,
                  September 24-26, 2017},
  pages        = {69--76},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/SecDev.2017.24},
  doi          = {10.1109/SECDEV.2017.24},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/CauligiSBJHJS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/DharseeJC17,
  author       = {Komail Dharsee and
                  Ethan Johnson and
                  John Criswell},
  title        = {A Software Solution for Hardware Vulnerabilities},
  booktitle    = {{IEEE} Cybersecurity Development, SecDev 2017, Cambridge, MA, USA,
                  September 24-26, 2017},
  pages        = {27--33},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/SecDev.2017.18},
  doi          = {10.1109/SECDEV.2017.18},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/DharseeJC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/DurandBC17,
  author       = {Gustavo Durand and
                  Michael Bar{-}Sinai and
                  Merc{\`{e}} Crosas},
  title        = {Securing Dataverse with an Adapted Command Design Pattern},
  booktitle    = {{IEEE} Cybersecurity Development, SecDev 2017, Cambridge, MA, USA,
                  September 24-26, 2017},
  pages        = {54--60},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/SecDev.2017.22},
  doi          = {10.1109/SECDEV.2017.22},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/DurandBC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/EdwardsKI17,
  author       = {Jesse Edwards and
                  Ameer Kashani and
                  Gopalakrishnan Iyer},
  title        = {Evaluation of Software Vulnerabilities in Vehicle Electronic Control
                  Units},
  booktitle    = {{IEEE} Cybersecurity Development, SecDev 2017, Cambridge, MA, USA,
                  September 24-26, 2017},
  pages        = {83--84},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/SecDev.2017.26},
  doi          = {10.1109/SECDEV.2017.26},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/EdwardsKI17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/FlynnSS17,
  author       = {Lori Flynn and
                  David Svoboda and
                  William Snavely},
  title        = {Hands-On Tutorial: Auditing Static Analysis Alerts Using a Lexicon
                  {\&} Rules},
  booktitle    = {{IEEE} Cybersecurity Development, SecDev 2017, Cambridge, MA, USA,
                  September 24-26, 2017},
  pages        = {1--2},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/SecDev.2017.10},
  doi          = {10.1109/SECDEV.2017.10},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/FlynnSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/GanzP17,
  author       = {Jonathan Ganz and
                  Sean Peisert},
  title        = {{ASLR:} How Robust Is the Randomness?},
  booktitle    = {{IEEE} Cybersecurity Development, SecDev 2017, Cambridge, MA, USA,
                  September 24-26, 2017},
  pages        = {34--41},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/SecDev.2017.19},
  doi          = {10.1109/SECDEV.2017.19},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/GanzP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/KannavaraGFC17,
  author       = {Raghudeep Kannavara and
                  Gilad Gressel and
                  Damilare Fagbemi and
                  Richard Chow},
  title        = {A Machine Learning Approach to {SDL}},
  booktitle    = {{IEEE} Cybersecurity Development, SecDev 2017, Cambridge, MA, USA,
                  September 24-26, 2017},
  pages        = {10--15},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/SecDev.2017.15},
  doi          = {10.1109/SECDEV.2017.15},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/KannavaraGFC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/Kupsch17,
  author       = {James A. Kupsch},
  title        = {Automated Assessment Tools and the Software Assurance Marketplace
                  {(SWAMP)}},
  booktitle    = {{IEEE} Cybersecurity Development, SecDev 2017, Cambridge, MA, USA,
                  September 24-26, 2017},
  pages        = {3},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/SecDev.2017.11},
  doi          = {10.1109/SECDEV.2017.11},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/Kupsch17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/RahamanY17,
  author       = {Sazzadur Rahaman and
                  Danfeng Yao},
  title        = {Program Analysis of Cryptographic Implementations for Security},
  booktitle    = {{IEEE} Cybersecurity Development, SecDev 2017, Cambridge, MA, USA,
                  September 24-26, 2017},
  pages        = {61--68},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/SecDev.2017.23},
  doi          = {10.1109/SECDEV.2017.23},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/RahamanY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/RoseFGMP17,
  author       = {Isis Rose and
                  Nicholas Felts and
                  Alexander George and
                  Emily Miller and
                  Max Planck},
  title        = {Something Is Better Than Everything: {A} Distributed Approach to Audit
                  Log Anomaly Detection},
  booktitle    = {{IEEE} Cybersecurity Development, SecDev 2017, Cambridge, MA, USA,
                  September 24-26, 2017},
  pages        = {77--82},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/SecDev.2017.25},
  doi          = {10.1109/SECDEV.2017.25},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/RoseFGMP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/RuotiSZ17,
  author       = {Scott Ruoti and
                  Kent E. Seamons and
                  Daniel Zappala},
  title        = {Layering Security at Global Control Points to Secure Unmodified Software},
  booktitle    = {{IEEE} Cybersecurity Development, SecDev 2017, Cambridge, MA, USA,
                  September 24-26, 2017},
  pages        = {42--49},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/SecDev.2017.20},
  doi          = {10.1109/SECDEV.2017.20},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/RuotiSZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/Seacord17,
  author       = {Robert C. Seacord},
  title        = {Java Deserialization Vulnerabilities and Mitigations},
  booktitle    = {{IEEE} Cybersecurity Development, SecDev 2017, Cambridge, MA, USA,
                  September 24-26, 2017},
  pages        = {6--7},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/SecDev.2017.13},
  doi          = {10.1109/SECDEV.2017.13},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/Seacord17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/WangS17,
  author       = {Fish Wang and
                  Yan Shoshitaishvili},
  title        = {Angr - The Next Generation of Binary Analysis},
  booktitle    = {{IEEE} Cybersecurity Development, SecDev 2017, Cambridge, MA, USA,
                  September 24-26, 2017},
  pages        = {8--9},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/SecDev.2017.14},
  doi          = {10.1109/SECDEV.2017.14},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/WangS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/WeberCMAS17,
  author       = {Sam Weber and
                  Michael J. Coblenz and
                  Brad A. Myers and
                  Jonathan Aldrich and
                  Joshua Sunshine},
  title        = {Empirical Studies on the Security and Usability Impact of Immutability},
  booktitle    = {{IEEE} Cybersecurity Development, SecDev 2017, Cambridge, MA, USA,
                  September 24-26, 2017},
  pages        = {50--53},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/SecDev.2017.21},
  doi          = {10.1109/SECDEV.2017.21},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/WeberCMAS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/WhitmoreT17,
  author       = {Jim Whitmore and
                  William Tobin},
  title        = {Improving Attention to Security in Software Design with Analytics
                  and Cognitive Techniques},
  booktitle    = {{IEEE} Cybersecurity Development, SecDev 2017, Cambridge, MA, USA,
                  September 24-26, 2017},
  pages        = {16--21},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/SecDev.2017.16},
  doi          = {10.1109/SECDEV.2017.16},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secdev/WhitmoreT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/WilliamsY17,
  author       = {Imano Williams and
                  Xiaohong Yuan},
  title        = {Creating Abuse Cases Based on Attack Patterns: {A} User Study},
  booktitle    = {{IEEE} Cybersecurity Development, SecDev 2017, Cambridge, MA, USA,
                  September 24-26, 2017},
  pages        = {85--86},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/SecDev.2017.27},
  doi          = {10.1109/SECDEV.2017.27},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/WilliamsY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/secdev/2017,
  title        = {{IEEE} Cybersecurity Development, SecDev 2017, Cambridge, MA, USA,
                  September 24-26, 2017},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/8071083/proceeding},
  isbn         = {978-1-5386-3467-7},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secdev/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/AcarFM16,
  author       = {Yasemin Acar and
                  Sascha Fahl and
                  Michelle L. Mazurek},
  title        = {You are Not Your Developer, Either: {A} Research Agenda for Usable
                  Security and Privacy Research Beyond End Users},
  booktitle    = {{IEEE} Cybersecurity Development, SecDev 2016, Boston, MA, USA, November
                  3-4, 2016},
  pages        = {3--8},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SecDev.2016.013},
  doi          = {10.1109/SECDEV.2016.013},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/AcarFM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/BallmanS16,
  author       = {Aaron Ballman and
                  David Svoboda},
  title        = {Avoiding Insecure {C++} - How to Avoid Common {C++} Security Vulnerabilities},
  booktitle    = {{IEEE} Cybersecurity Development, SecDev 2016, Boston, MA, USA, November
                  3-4, 2016},
  pages        = {65},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SecDev.2016.022},
  doi          = {10.1109/SECDEV.2016.022},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/BallmanS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/Baloglu16,
  author       = {Bill Baloglu},
  title        = {How to find and fix software vulnerabilities with coverity static
                  analysis},
  booktitle    = {{IEEE} Cybersecurity Development, SecDev 2016, Boston, MA, USA, November
                  3-4, 2016},
  pages        = {153},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SecDev.2016.041},
  doi          = {10.1109/SECDEV.2016.041},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/Baloglu16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/Benjamin16,
  author       = {Mable Benjamin},
  title        = {Secure Coding for Real-Time Embedded Systems: Cert Run-Time Profile
                  for Ada},
  booktitle    = {{IEEE} Cybersecurity Development, SecDev 2016, Boston, MA, USA, November
                  3-4, 2016},
  pages        = {71--72},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SecDev.2016.026},
  doi          = {10.1109/SECDEV.2016.026},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/Benjamin16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/BrueningZ16,
  author       = {Derek Bruening and
                  Qin Zhao},
  title        = {Using Dr. Fuzz, Dr. Memory, and Custom Dynamic Tools for Secure Development},
  booktitle    = {{IEEE} Cybersecurity Development, SecDev 2016, Boston, MA, USA, November
                  3-4, 2016},
  pages        = {158},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SecDev.2016.044},
  doi          = {10.1109/SECDEV.2016.044},
  timestamp    = {Thu, 16 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/BrueningZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/CraneHL16,
  author       = {Stephen Crane and
                  Andrei Homescu and
                  Per Larsen},
  title        = {Code Randomization: Haven't We Solved This Problem Yet?},
  booktitle    = {{IEEE} Cybersecurity Development, SecDev 2016, Boston, MA, USA, November
                  3-4, 2016},
  pages        = {124--129},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SecDev.2016.036},
  doi          = {10.1109/SECDEV.2016.036},
  timestamp    = {Thu, 16 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/CraneHL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/HeitzenraterS16,
  author       = {Chad Heitzenrater and
                  Andrew Simpson},
  title        = {Software Security Investment: The Right Amount of a Good Thing},
  booktitle    = {{IEEE} Cybersecurity Development, SecDev 2016, Boston, MA, USA, November
                  3-4, 2016},
  pages        = {53--59},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SecDev.2016.020},
  doi          = {10.1109/SECDEV.2016.020},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secdev/HeitzenraterS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/HoganLSSSYY16,
  author       = {Kyle Hogan and
                  Noah Luther and
                  Nabil Schear and
                  Emily Shen and
                  David Stott and
                  Sophia Yakoubov and
                  Arkady Yerukhimovich},
  title        = {Secure Multiparty Computation for Cooperative Cyber Risk Assessment},
  booktitle    = {{IEEE} Cybersecurity Development, SecDev 2016, Boston, MA, USA, November
                  3-4, 2016},
  pages        = {75--76},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SecDev.2016.028},
  doi          = {10.1109/SECDEV.2016.028},
  timestamp    = {Thu, 16 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/HoganLSSSYY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/HoqueN16,
  author       = {Md. Endadul Hoque and
                  Cristina Nita{-}Rotaru},
  title        = {Building Robust Distributed Systems and Network Protocols by Using
                  Adversarial Testing and Behavioral Analysis},
  booktitle    = {{IEEE} Cybersecurity Development, SecDev 2016, Boston, MA, USA, November
                  3-4, 2016},
  pages        = {138--145},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SecDev.2016.038},
  doi          = {10.1109/SECDEV.2016.038},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secdev/HoqueN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/IndelaKND16,
  author       = {Soumya Indela and
                  Mukul Kulkarni and
                  Kartik Nayak and
                  Tudor Dumitras},
  title        = {Toward Semantic Cryptography APIs},
  booktitle    = {{IEEE} Cybersecurity Development, SecDev 2016, Boston, MA, USA, November
                  3-4, 2016},
  pages        = {9--14},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SecDev.2016.014},
  doi          = {10.1109/SECDEV.2016.014},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/IndelaKND16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/Kang16,
  author       = {Eunsuk Kang},
  title        = {Design Space Exploration for Security},
  booktitle    = {{IEEE} Cybersecurity Development, SecDev 2016, Boston, MA, USA, November
                  3-4, 2016},
  pages        = {30--36},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SecDev.2016.017},
  doi          = {10.1109/SECDEV.2016.017},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/Kang16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/Kerschbaumer16,
  author       = {Christoph Kerschbaumer},
  title        = {Enforcing Content Security by Default within Web Browsers},
  booktitle    = {{IEEE} Cybersecurity Development, SecDev 2016, Boston, MA, USA, November
                  3-4, 2016},
  pages        = {101--106},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SecDev.2016.033},
  doi          = {10.1109/SECDEV.2016.033},
  timestamp    = {Thu, 16 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/Kerschbaumer16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/KlieberS16,
  author       = {William Klieber and
                  Will Snavely},
  title        = {Automated Code Repair Based on Inferred Specifications},
  booktitle    = {{IEEE} Cybersecurity Development, SecDev 2016, Boston, MA, USA, November
                  3-4, 2016},
  pages        = {130--137},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SecDev.2016.037},
  doi          = {10.1109/SECDEV.2016.037},
  timestamp    = {Thu, 16 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/KlieberS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/LapetsVBJV16,
  author       = {Andrei Lapets and
                  Nikolaj Volgushev and
                  Azer Bestavros and
                  Frederick Jansen and
                  Mayank Varia},
  title        = {Secure {MPC} for Analytics as a Web Application},
  booktitle    = {{IEEE} Cybersecurity Development, SecDev 2016, Boston, MA, USA, November
                  3-4, 2016},
  pages        = {73--74},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SecDev.2016.027},
  doi          = {10.1109/SECDEV.2016.027},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/LapetsVBJV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/LiO16,
  author       = {Zhou Li and
                  Alina Oprea},
  title        = {Operational Security Log Analytics for Enterprise Breach Detection},
  booktitle    = {{IEEE} Cybersecurity Development, SecDev 2016, Boston, MA, USA, November
                  3-4, 2016},
  pages        = {15--22},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SecDev.2016.015},
  doi          = {10.1109/SECDEV.2016.015},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/LiO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/MazumderB16,
  author       = {Mark Mazumder and
                  Timothy M. Braje},
  title        = {Safe Client/Server Web Development with Haskell},
  booktitle    = {{IEEE} Cybersecurity Development, SecDev 2016, Boston, MA, USA, November
                  3-4, 2016},
  pages        = {150},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SecDev.2016.040},
  doi          = {10.1109/SECDEV.2016.040},
  timestamp    = {Fri, 11 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/MazumderB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/McCorkle16,
  author       = {Eric L. McCorkle},
  title        = {A Case for Combining Industrial Pragmatics with Formal Methods},
  booktitle    = {{IEEE} Cybersecurity Development, SecDev 2016, Boston, MA, USA, November
                  3-4, 2016},
  pages        = {63--64},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SecDev.2016.021},
  doi          = {10.1109/SECDEV.2016.021},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/McCorkle16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/McCutchenSCQ16,
  author       = {Matt McCutchen and
                  Daniel Song and
                  Shuo Chen and
                  Shaz Qadeer},
  title        = {Self-Verifying Execution (Position Paper)},
  booktitle    = {{IEEE} Cybersecurity Development, SecDev 2016, Boston, MA, USA, November
                  3-4, 2016},
  pages        = {117--123},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SecDev.2016.035},
  doi          = {10.1109/SECDEV.2016.035},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secdev/McCutchenSCQ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/MomotBHP16,
  author       = {Falcon Momot and
                  Sergey Bratus and
                  Sven M. Hallberg and
                  Meredith L. Patterson},
  title        = {The Seven Turrets of Babel: {A} Taxonomy of LangSec Errors and How
                  to Expunge Them},
  booktitle    = {{IEEE} Cybersecurity Development, SecDev 2016, Boston, MA, USA, November
                  3-4, 2016},
  pages        = {45--52},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SecDev.2016.019},
  doi          = {10.1109/SECDEV.2016.019},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/MomotBHP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/MoyerCCSSBBCJC16,
  author       = {Thomas Moyer and
                  Karishma Chadha and
                  Robert K. Cunningham and
                  Nabil Schear and
                  Warren Smith and
                  Adam Bates and
                  Kevin R. B. Butler and
                  Frank Capobianco and
                  Trent Jaeger and
                  Patrick T. Cable II},
  title        = {Leveraging Data Provenance to Enhance Cyber Resilience},
  booktitle    = {{IEEE} Cybersecurity Development, SecDev 2016, Boston, MA, USA, November
                  3-4, 2016},
  pages        = {107--114},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SecDev.2016.034},
  doi          = {10.1109/SECDEV.2016.034},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secdev/MoyerCCSSBBCJC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/Murthy16,
  author       = {Nivedita Murthy},
  title        = {Codiscope SecureAssist{\texttrademark} - The Developer's Security
                  Assistant},
  booktitle    = {{IEEE} Cybersecurity Development, SecDev 2016, Boston, MA, USA, November
                  3-4, 2016},
  pages        = {162},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SecDev.2016.046},
  doi          = {10.1109/SECDEV.2016.046},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/Murthy16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/NordO16,
  author       = {Robert L. Nord and
                  Ipek Ozkaya},
  title        = {Software Vulnerabilities, Defects, and Design Flaws: {A} Technical
                  Debt Perspective},
  booktitle    = {{IEEE} Cybersecurity Development, SecDev 2016, Boston, MA, USA, November
                  3-4, 2016},
  pages        = {165},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SecDev.2016.047},
  doi          = {10.1109/SECDEV.2016.047},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secdev/NordO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/OpreaTNK16,
  author       = {Alina Oprea and
                  Ata Turk and
                  Cristina Nita{-}Rotaru and
                  Orran Krieger},
  title        = {{MOSAIC:} {A} Platform for Monitoring and Security Analytics in Public
                  Clouds},
  booktitle    = {{IEEE} Cybersecurity Development, SecDev 2016, Boston, MA, USA, November
                  3-4, 2016},
  pages        = {69--70},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SecDev.2016.025},
  doi          = {10.1109/SECDEV.2016.025},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/OpreaTNK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/PfretzschnerO16,
  author       = {Brian Pfretzschner and
                  Lotfi Ben Othmane},
  title        = {Dependency-Based Attacks on Node.js},
  booktitle    = {{IEEE} Cybersecurity Development, SecDev 2016, Boston, MA, USA, November
                  3-4, 2016},
  pages        = {66},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SecDev.2016.023},
  doi          = {10.1109/SECDEV.2016.023},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/PfretzschnerO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/PiessensDMS16,
  author       = {Frank Piessens and
                  Dominique Devriese and
                  Jan Tobias M{\"{u}}hlberg and
                  Raoul Strackx},
  title        = {Security Guarantees for the Execution Infrastructure of Software Applications},
  booktitle    = {{IEEE} Cybersecurity Development, SecDev 2016, Boston, MA, USA, November
                  3-4, 2016},
  pages        = {81--87},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SecDev.2016.030},
  doi          = {10.1109/SECDEV.2016.030},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secdev/PiessensDMS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/Pike16,
  author       = {Lee Pike},
  title        = {Hints for High-Assurance Cyber-Physical System Design},
  booktitle    = {{IEEE} Cybersecurity Development, SecDev 2016, Boston, MA, USA, November
                  3-4, 2016},
  pages        = {25--29},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SecDev.2016.016},
  doi          = {10.1109/SECDEV.2016.016},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/Pike16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/RahmatiFP16,
  author       = {Amir Rahmati and
                  Earlence Fernandes and
                  Atul Prakash},
  title        = {Applying the Opacified Computation Model to Enforce Information Flow
                  Policies in IoT Applications},
  booktitle    = {{IEEE} Cybersecurity Development, SecDev 2016, Boston, MA, USA, November
                  3-4, 2016},
  pages        = {88--93},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SecDev.2016.031},
  doi          = {10.1109/SECDEV.2016.031},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secdev/RahmatiFP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/Seghir0M16,
  author       = {Mohamed Nassim Seghir and
                  David Aspinall and
                  Lenka Marekov{\'{a}}},
  title        = {Certified Lightweight Contextual Policies for Android},
  booktitle    = {{IEEE} Cybersecurity Development, SecDev 2016, Boston, MA, USA, November
                  3-4, 2016},
  pages        = {94--100},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SecDev.2016.032},
  doi          = {10.1109/SECDEV.2016.032},
  timestamp    = {Thu, 08 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secdev/Seghir0M16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/Serebryany16,
  author       = {Kosta Serebryany},
  title        = {Continuous Fuzzing with libFuzzer and AddressSanitizer},
  booktitle    = {{IEEE} Cybersecurity Development, SecDev 2016, Boston, MA, USA, November
                  3-4, 2016},
  pages        = {157},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SecDev.2016.043},
  doi          = {10.1109/SECDEV.2016.043},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/Serebryany16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/Svoboda16,
  author       = {David Svoboda},
  title        = {Beyond errno: Error Handling in "C"},
  booktitle    = {{IEEE} Cybersecurity Development, SecDev 2016, Boston, MA, USA, November
                  3-4, 2016},
  pages        = {161},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SecDev.2016.045},
  doi          = {10.1109/SECDEV.2016.045},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/Svoboda16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/SvobodaFS16,
  author       = {David Svoboda and
                  Lori Flynn and
                  Will Snavely},
  title        = {Static Analysis Alert Audits: Lexicon {\&} Rules},
  booktitle    = {{IEEE} Cybersecurity Development, SecDev 2016, Boston, MA, USA, November
                  3-4, 2016},
  pages        = {37--44},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SecDev.2016.018},
  doi          = {10.1109/SECDEV.2016.018},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/SvobodaFS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/TaleleMCJT16,
  author       = {Nirupama Talele and
                  Divya Muthukumaran and
                  Frank Capobianco and
                  Trent Jaeger and
                  Gang Tan},
  title        = {Maintaining Authorization Hook Placements Across Program Versions},
  booktitle    = {{IEEE} Cybersecurity Development, SecDev 2016, Boston, MA, USA, November
                  3-4, 2016},
  pages        = {67--68},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SecDev.2016.024},
  doi          = {10.1109/SECDEV.2016.024},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/TaleleMCJT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/TangZ16,
  author       = {Yuzhe Tang and
                  Wenqing Zhuang},
  title        = {Towards Building Practical Secure Multi-party Databases},
  booktitle    = {{IEEE} Cybersecurity Development, SecDev 2016, Boston, MA, USA, November
                  3-4, 2016},
  pages        = {77--78},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SecDev.2016.029},
  doi          = {10.1109/SECDEV.2016.029},
  timestamp    = {Thu, 16 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/TangZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/Vitek16,
  author       = {David Vitek},
  title        = {Auditing Code for Security Vulnerabilities with CodeSonar},
  booktitle    = {{IEEE} Cybersecurity Development, SecDev 2016, Boston, MA, USA, November
                  3-4, 2016},
  pages        = {154},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SecDev.2016.042},
  doi          = {10.1109/SECDEV.2016.042},
  timestamp    = {Thu, 16 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/Vitek16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/WeichselbaumSJ16,
  author       = {Lukas Weichselbaum and
                  Michele Spagnuolo and
                  Artur Janc},
  title        = {Adopting Strict Content Security Policy for {XSS} Protection},
  booktitle    = {{IEEE} Cybersecurity Development, SecDev 2016, Boston, MA, USA, November
                  3-4, 2016},
  pages        = {149},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SecDev.2016.039},
  doi          = {10.1109/SECDEV.2016.039},
  timestamp    = {Thu, 16 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/WeichselbaumSJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/YasarK16,
  author       = {Hasan Yasar and
                  Kiriakos Kontostathis},
  title        = {Secure DevOps Process and Implementation},
  booktitle    = {{IEEE} Cybersecurity Development, SecDev 2016, Boston, MA, USA, November
                  3-4, 2016},
  pages        = {166},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SecDev.2016.048},
  doi          = {10.1109/SECDEV.2016.048},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/YasarK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/secdev/2016,
  title        = {{IEEE} Cybersecurity Development, SecDev 2016, Boston, MA, USA, November
                  3-4, 2016},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/7838558/proceeding},
  isbn         = {978-1-5090-5589-0},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secdev/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics