Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "stream:streams/conf/secdev:"
@inproceedings{DBLP:conf/secdev/AliHGRU23, author = {Muaz Ali and Rumaisa Habib and Ashish Gehani and Sazzadur Rahaman and Zartash Afzal Uzmi}, title = {{BLADE:} Towards Scalable Source Code Debloating}, booktitle = {{IEEE} Secure Development Conference, SecDev 2023, Atlanta, GA, USA, October 18-20, 2023}, pages = {75--87}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SecDev56634.2023.00022}, doi = {10.1109/SECDEV56634.2023.00022}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/AliHGRU23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/AlmohriW23, author = {Hussain M. J. Almohri and Layne T. Watson}, title = {Model-Agnostic Federated Learning for Privacy-Preserving Systems}, booktitle = {{IEEE} Secure Development Conference, SecDev 2023, Atlanta, GA, USA, October 18-20, 2023}, pages = {99--105}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SecDev56634.2023.00024}, doi = {10.1109/SECDEV56634.2023.00024}, timestamp = {Tue, 21 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/AlmohriW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/BajpaiK23, author = {Pranshu Bajpai and Raghudeep Kannavara}, title = {Misplaced Trust: The Security Flaw in Modern Code Signing Process}, booktitle = {{IEEE} Secure Development Conference, SecDev 2023, Atlanta, GA, USA, October 18-20, 2023}, pages = {49--50}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SecDev56634.2023.00018}, doi = {10.1109/SECDEV56634.2023.00018}, timestamp = {Tue, 21 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/BajpaiK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/BondH23, author = {Eric Bond and Matthew Heimerdinger}, title = {Curbing the Vulnerable Parser: Graded Modal Guardrails for Secure Input Handling}, booktitle = {{IEEE} Secure Development Conference, SecDev 2023, Atlanta, GA, USA, October 18-20, 2023}, pages = {126--132}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SecDev56634.2023.00027}, doi = {10.1109/SECDEV56634.2023.00027}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/BondH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/GulmezNBM23, author = {Merve G{\"{u}}lmez and Thomas Nyman and Christoph Baumann and Jan Tobias M{\"{u}}hlberg}, title = {Friend or Foe Inside? Exploring In-Process Isolation to Maintain Memory Safety for Unsafe Rust}, booktitle = {{IEEE} Secure Development Conference, SecDev 2023, Atlanta, GA, USA, October 18-20, 2023}, pages = {54--66}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SecDev56634.2023.00020}, doi = {10.1109/SECDEV56634.2023.00020}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secdev/GulmezNBM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/HassanTFNNZSGR23, author = {Muhammad Hassan and Talha Tahir and Muhammad Farrukh and Abdullah Naveed and Anas Naeem and Fareed Zaffar and Fahad Shaon and Ashish Gehani and Sazzadur Rahaman}, title = {Evaluating Container Debloaters}, booktitle = {{IEEE} Secure Development Conference, SecDev 2023, Atlanta, GA, USA, October 18-20, 2023}, pages = {88--98}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SecDev56634.2023.00023}, doi = {10.1109/SECDEV56634.2023.00023}, timestamp = {Tue, 21 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/HassanTFNNZSGR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/HuBWSSR23, author = {Hanyang Hu and Yani Bu and Kristen Wong and Gaurav Sood and Karen Smiley and Akond Rahman}, title = {Characterizing Static Analysis Alerts for Terraform Manifests: An Experience Report}, booktitle = {{IEEE} Secure Development Conference, SecDev 2023, Atlanta, GA, USA, October 18-20, 2023}, pages = {7--13}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SecDev56634.2023.00014}, doi = {10.1109/SECDEV56634.2023.00014}, timestamp = {Tue, 21 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/HuBWSSR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/HuangSJ23, author = {Kaiming Huang and Jack Sampson and Trent Jaeger}, title = {Assessing the Impact of Efficiently Protecting Ten Million Stack Objects from Memory Errors Comprehensively}, booktitle = {{IEEE} Secure Development Conference, SecDev 2023, Atlanta, GA, USA, October 18-20, 2023}, pages = {67--74}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SecDev56634.2023.00021}, doi = {10.1109/SECDEV56634.2023.00021}, timestamp = {Tue, 21 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/HuangSJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/JoshiCR23, author = {Sunil Joshi and Kenneth G. Crowther and Jarvis Robinson}, title = {Adaptive Security: Certificate and Key Rotation for Firmware Integrity}, booktitle = {{IEEE} Secure Development Conference, SecDev 2023, Atlanta, GA, USA, October 18-20, 2023}, pages = {214--215}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SecDev56634.2023.00035}, doi = {10.1109/SECDEV56634.2023.00035}, timestamp = {Tue, 21 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/JoshiCR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/KashefFSSBKS23, author = {Rasha Kashef and Monika Freunek and Jeff Schwartzentruber and Reza Samavi and Burcu Bulgurcu and A. J. Khan and Marcus Santos}, title = {Bridging the Bubbles: Connecting Academia and Industry in Cybersecurity Research}, booktitle = {{IEEE} Secure Development Conference, SecDev 2023, Atlanta, GA, USA, October 18-20, 2023}, pages = {207--213}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SecDev56634.2023.00034}, doi = {10.1109/SECDEV56634.2023.00034}, timestamp = {Tue, 21 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/KashefFSSBKS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/KepkowskiMWK23, author = {Michal Kepkowski and Maciej Machulak and Ian D. Wood and Dali Kaafar}, title = {Challenges with Passwordless {FIDO2} in an Enterprise Setting: {A} Usability Study}, booktitle = {{IEEE} Secure Development Conference, SecDev 2023, Atlanta, GA, USA, October 18-20, 2023}, pages = {37--48}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SecDev56634.2023.00017}, doi = {10.1109/SECDEV56634.2023.00017}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/KepkowskiMWK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/KrugerRWNABAMF23, author = {Stefan Kr{\"{u}}ger and Michael Reif and Anna{-}Katharina Wickert and Sarah Nadi and Karim Ali and Eric Bodden and Yasemin Acar and Mira Mezini and Sascha Fahl}, title = {Securing Your Crypto-API Usage Through Tool Support - {A} Usability Study}, booktitle = {{IEEE} Secure Development Conference, SecDev 2023, Atlanta, GA, USA, October 18-20, 2023}, pages = {14--25}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SecDev56634.2023.00015}, doi = {10.1109/SECDEV56634.2023.00015}, timestamp = {Tue, 21 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/KrugerRWNABAMF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/LamLG23, author = {Denley Lam and Letitia W. Li and Anthony Gabrielson}, title = {Parser Weakness Enumeration: Definition and Preliminary Assessment}, booktitle = {{IEEE} Secure Development Conference, SecDev 2023, Atlanta, GA, USA, October 18-20, 2023}, pages = {118--125}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SecDev56634.2023.00026}, doi = {10.1109/SECDEV56634.2023.00026}, timestamp = {Tue, 21 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/LamLG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/LeeGCCJ23, author = {Yu Tsung Lee and Rahul George and Haining Chen and Kevin Chan and Trent Jaeger}, title = {Triaging Android Systems Using Bayesian Attack Graphs}, booktitle = {{IEEE} Secure Development Conference, SecDev 2023, Atlanta, GA, USA, October 18-20, 2023}, pages = {171--183}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SecDev56634.2023.00031}, doi = {10.1109/SECDEV56634.2023.00031}, timestamp = {Tue, 21 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/LeeGCCJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/Madheswaran23, author = {Yuvaraj Madheswaran}, title = {11 things about Securing Microservice}, booktitle = {{IEEE} Secure Development Conference, SecDev 2023, Atlanta, GA, USA, October 18-20, 2023}, pages = {51--53}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SecDev56634.2023.00019}, doi = {10.1109/SECDEV56634.2023.00019}, timestamp = {Tue, 21 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/Madheswaran23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/MirzamohammadiJSLAS23, author = {Omid Mirzamohammadi and Kristof Jannes and Laurens Sion and Dimitri Van Landuyt and Aysajan Abidin and Dave Singel{\'{e}}e}, title = {Security and Privacy Threat Analysis for Solid}, booktitle = {{IEEE} Secure Development Conference, SecDev 2023, Atlanta, GA, USA, October 18-20, 2023}, pages = {196--206}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SecDev56634.2023.00033}, doi = {10.1109/SECDEV56634.2023.00033}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/MirzamohammadiJSLAS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/MurphyMSC23, author = {Sinnott Murphy and Richard Macwan and Vivek Kumar Singh and Chin{-}Yao Chang}, title = {A randomization-based, zero-trust cyberattack detection method for hierarchical systems}, booktitle = {{IEEE} Secure Development Conference, SecDev 2023, Atlanta, GA, USA, October 18-20, 2023}, pages = {145--155}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SecDev56634.2023.00029}, doi = {10.1109/SECDEV56634.2023.00029}, timestamp = {Tue, 21 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/MurphyMSC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/PeseSMJSM23, author = {Mert D. Pes{\'{e}} and Jay W. Schauer and Murali Mohan and Cassandra Joseph and Kang G. Shin and John Moore}, title = {{PRICAR:} Privacy Framework for Vehicular Data Sharing with Third Parties}, booktitle = {{IEEE} Secure Development Conference, SecDev 2023, Atlanta, GA, USA, October 18-20, 2023}, pages = {184--195}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SecDev56634.2023.00032}, doi = {10.1109/SECDEV56634.2023.00032}, timestamp = {Tue, 21 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/PeseSMJSM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/RiomB23, author = {Timoth{\'{e}}e Riom and Alexandre Bartel}, title = {An In-Depth Analysis of Android's Java Class Library: its Evolution and Security Impact}, booktitle = {{IEEE} Secure Development Conference, SecDev 2023, Atlanta, GA, USA, October 18-20, 2023}, pages = {133--144}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SecDev56634.2023.00028}, doi = {10.1109/SECDEV56634.2023.00028}, timestamp = {Tue, 21 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/RiomB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/Senier23, author = {Alexander Senier}, title = {Tutorial: The End of Binary Protocol Parser Vulnerabilities : Using RecordFlux and {SPARK} to implement formally-verified binary formats and communication protocols}, booktitle = {{IEEE} Secure Development Conference, SecDev 2023, Atlanta, GA, USA, October 18-20, 2023}, pages = {5--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SecDev56634.2023.00013}, doi = {10.1109/SECDEV56634.2023.00013}, timestamp = {Tue, 21 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/Senier23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/SongS23, author = {Wenjia Song and Arianna Schuler Scott}, title = {Tutorial: Crypto-Ransomware: Analysis, Defense, and Criminal Negotiation}, booktitle = {{IEEE} Secure Development Conference, SecDev 2023, Atlanta, GA, USA, October 18-20, 2023}, pages = {3--4}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SecDev56634.2023.00012}, doi = {10.1109/SECDEV56634.2023.00012}, timestamp = {Tue, 21 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/SongS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/TraceyG23, author = {Justin Tracey and Ian Goldberg}, title = {Grading on a Curve: How Rust can Facilitate New Contributors while Decreasing Vulnerabilities}, booktitle = {{IEEE} Secure Development Conference, SecDev 2023, Atlanta, GA, USA, October 18-20, 2023}, pages = {26--36}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SecDev56634.2023.00016}, doi = {10.1109/SECDEV56634.2023.00016}, timestamp = {Tue, 21 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/TraceyG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/VijayakanthanWAA23, author = {Ramyapandian Vijayakanthan and Karley M. Waguespack and Irfan Ahmed and Aisha I. Ali{-}Gombe}, title = {Fortifying IoT Devices: AI-Driven Intrusion Detection via Memory-Encoded Audio Signals}, booktitle = {{IEEE} Secure Development Conference, SecDev 2023, Atlanta, GA, USA, October 18-20, 2023}, pages = {106--117}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SecDev56634.2023.00025}, doi = {10.1109/SECDEV56634.2023.00025}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secdev/VijayakanthanWAA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/WeirDP23, author = {Charles Weir and Anna Dyson and Daniel Prince}, title = {A Lot Less Likely Than {I} Thought: Introducing Evidence-Based Security Risk Assessment for Healthcare Software}, booktitle = {{IEEE} Secure Development Conference, SecDev 2023, Atlanta, GA, USA, October 18-20, 2023}, pages = {156--170}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SecDev56634.2023.00030}, doi = {10.1109/SECDEV56634.2023.00030}, timestamp = {Tue, 21 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/WeirDP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/YaoFSASS23, author = {Mingxuan Yao and Jonathan Fuller and Ranjita Pai Sridhar and Saumya Agarwal and Amit Kumar Sikder and Brendan Saltaformaggio}, title = {Invited Tutorial: Counteracting Web Application Abuse in Malware}, booktitle = {{IEEE} Secure Development Conference, SecDev 2023, Atlanta, GA, USA, October 18-20, 2023}, pages = {1--2}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SecDev56634.2023.00011}, doi = {10.1109/SECDEV56634.2023.00011}, timestamp = {Tue, 21 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/YaoFSASS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/secdev/2023, title = {{IEEE} Secure Development Conference, SecDev 2023, Atlanta, GA, USA, October 18-20, 2023}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SecDev56634.2023}, doi = {10.1109/SECDEV56634.2023}, isbn = {979-8-3503-3132-5}, timestamp = {Tue, 21 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/2023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/AlshmranyBBCKMM22, author = {Kaled M. Alshmrany and Ahmed Bhayat and Franz Brau{\ss}e and Lucas C. Cordeiro and Konstantin Korovin and Tom Melham and Mustafa A. Mustafa and Pierre Olivier and Giles Reger and Fedor Shmarov}, title = {Position Paper: Towards a Hybrid Approach to Protect Against Memory Safety Vulnerabilities}, booktitle = {{IEEE} Secure Development Conference, SecDev 2022, Atlanta, GA, USA, October 18-20, 2022}, pages = {52--58}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SecDev53368.2022.00020}, doi = {10.1109/SECDEV53368.2022.00020}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/AlshmranyBBCKMM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/BajpaiL22, author = {Pranshu Bajpai and Adam Lewis}, title = {Secure Development Workflows in {CI/CD} Pipelines}, booktitle = {{IEEE} Secure Development Conference, SecDev 2022, Atlanta, GA, USA, October 18-20, 2022}, pages = {65--66}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SecDev53368.2022.00024}, doi = {10.1109/SECDEV53368.2022.00024}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/BajpaiL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/BasakNRW22, author = {Setu Kumar Basak and Lorenzo Neil and Bradley Reaves and Laurie A. Williams}, title = {What are the Practices for Secret Management in Software Artifacts?}, booktitle = {{IEEE} Secure Development Conference, SecDev 2022, Atlanta, GA, USA, October 18-20, 2022}, pages = {69--76}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SecDev53368.2022.00026}, doi = {10.1109/SECDEV53368.2022.00026}, timestamp = {Tue, 20 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/BasakNRW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/ChehTC22, author = {Carmen Cheh and Nicholas Tay and Binbin Chen}, title = {Design and User Study of a Constraint-based Framework for Business Logic Flaw Discovery}, booktitle = {{IEEE} Secure Development Conference, SecDev 2022, Atlanta, GA, USA, October 18-20, 2022}, pages = {91--99}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SecDev53368.2022.00029}, doi = {10.1109/SECDEV53368.2022.00029}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/ChehTC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/CloostersSSD22, author = {Tobias Cloosters and Sebastian Surminski and Gerrit Sangel and Lucas Davi}, title = {Salsa: {SGX} Attestation for Live Streaming Applications}, booktitle = {{IEEE} Secure Development Conference, SecDev 2022, Atlanta, GA, USA, October 18-20, 2022}, pages = {45--51}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SecDev53368.2022.00019}, doi = {10.1109/SECDEV53368.2022.00019}, timestamp = {Tue, 20 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/CloostersSSD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/CriswellJP22, author = {John Criswell and Ethan Johnson and Colin Pronovost}, title = {Tutorial: {LLVM} for Security Practitioners}, booktitle = {{IEEE} Secure Development Conference, SecDev 2022, Atlanta, GA, USA, October 18-20, 2022}, pages = {1--2}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SecDev53368.2022.00012}, doi = {10.1109/SECDEV53368.2022.00012}, timestamp = {Tue, 20 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/CriswellJP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/EversonBMM022, author = {Douglas Everson and Ashish Bastola and Rajat Mittal and Siddheshwar Munde and Long Cheng}, title = {A Comparative Study of Log4Sheil Test Tools}, booktitle = {{IEEE} Secure Development Conference, SecDev 2022, Atlanta, GA, USA, October 18-20, 2022}, pages = {16--22}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SecDev53368.2022.00016}, doi = {10.1109/SECDEV53368.2022.00016}, timestamp = {Tue, 20 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/EversonBMM022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/GhorshiGLA22, author = {Setareh Ghorshi and Lachlan J. Gunn and Hans Liljestrand and N. Asokan}, title = {Towards cryptographically-authenticated in-memory data structures}, booktitle = {{IEEE} Secure Development Conference, SecDev 2022, Atlanta, GA, USA, October 18-20, 2022}, pages = {30--44}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SecDev53368.2022.00018}, doi = {10.1109/SECDEV53368.2022.00018}, timestamp = {Tue, 20 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/GhorshiGLA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/GiesenARKD22, author = {Jens{-}Rene Giesen and S{\'{e}}bastien Andreina and Michael Rodler and Ghassan O. Karame and Lucas Davi}, title = {Tutorial: Analyzing, Exploiting, and Patching Smart Contracts in Ethereum}, booktitle = {{IEEE} Secure Development Conference, SecDev 2022, Atlanta, GA, USA, October 18-20, 2022}, pages = {3--4}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SecDev53368.2022.00013}, doi = {10.1109/SECDEV53368.2022.00013}, timestamp = {Tue, 20 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/GiesenARKD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/GionanidisKGSG22, author = {Emmanouil Gionanidis and Petros S. Karvelis and George K. Georgoulas and Konstantinos Stamos and Purvi Garg}, title = {Evaluating Text Augmentation for Boosting the Automatic Mapping of Vulnerability Information to Adversary Techniques}, booktitle = {{IEEE} Secure Development Conference, SecDev 2022, Atlanta, GA, USA, October 18-20, 2022}, pages = {23--29}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SecDev53368.2022.00017}, doi = {10.1109/SECDEV53368.2022.00017}, timestamp = {Tue, 20 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/GionanidisKGSG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/HarrisonHBM22, author = {Jack B. Harrison and Joseph R. Harrison and Madison G. Boswell and Alan J. Michaels}, title = {A Hierarchical Database of One Million Websites}, booktitle = {{IEEE} Secure Development Conference, SecDev 2022, Atlanta, GA, USA, October 18-20, 2022}, pages = {67--68}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SecDev53368.2022.00025}, doi = {10.1109/SECDEV53368.2022.00025}, timestamp = {Tue, 20 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/HarrisonHBM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/KabirWY022, author = {Md Mahir Asef Kabir and Ying Wang and Danfeng Yao and Na Meng}, title = {How Do Developers Follow Security-Relevant Best Practices When Using {NPM} Packages?}, booktitle = {{IEEE} Secure Development Conference, SecDev 2022, Atlanta, GA, USA, October 18-20, 2022}, pages = {77--83}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SecDev53368.2022.00027}, doi = {10.1109/SECDEV53368.2022.00027}, timestamp = {Sat, 15 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secdev/KabirWY022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/OthmaneGYCVPC22, author = {Lotfi Ben Othmane and Heinrich Gantenbein and Hasan Yasar and Simone Curzi and Altaz Valani and Arun Prabhakar and Robert Cuddy}, title = {Tutorial: Threat Modeling of Cloud-based Solutions}, booktitle = {{IEEE} Secure Development Conference, SecDev 2022, Atlanta, GA, USA, October 18-20, 2022}, pages = {5--6}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SecDev53368.2022.00014}, doi = {10.1109/SECDEV53368.2022.00014}, timestamp = {Tue, 20 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/OthmaneGYCVPC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/PhokelaSDKB22, author = {Kanchanjot Kaur Phokela and Kapil Singi and Kuntal Dey and Vikrant Kaulgud and Adam P. Burden}, title = {Framework to Assess Policy Driven Security Misconfiguration Risks in Cloud Native Application}, booktitle = {{IEEE} Secure Development Conference, SecDev 2022, Atlanta, GA, USA, October 18-20, 2022}, pages = {63--64}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SecDev53368.2022.00023}, doi = {10.1109/SECDEV53368.2022.00023}, timestamp = {Tue, 20 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/PhokelaSDKB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/PiskachevDKMB22, author = {Goran Piskachev and Stefan Dziwok and Thorsten Koch and Sven Merschjohann and Eric Bodden}, title = {How far are German companies in improving security through static program analysis tools?}, booktitle = {{IEEE} Secure Development Conference, SecDev 2022, Atlanta, GA, USA, October 18-20, 2022}, pages = {7--15}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SecDev53368.2022.00015}, doi = {10.1109/SECDEV53368.2022.00015}, timestamp = {Tue, 20 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/PiskachevDKMB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/ShiMGS22, author = {Zhenpeng Shi and Nikolay Matyunin and Kalman Graffi and David Starobinski}, title = {Uncovering Product Vulnerabilities with Threat Knowledge Graphs}, booktitle = {{IEEE} Secure Development Conference, SecDev 2022, Atlanta, GA, USA, October 18-20, 2022}, pages = {84--90}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SecDev53368.2022.00028}, doi = {10.1109/SECDEV53368.2022.00028}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secdev/ShiMGS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/Shortridge22, author = {Kelly Shortridge}, title = {From Lemons to Peaches: Improving Security {ROI} through Security Chaos Engineering}, booktitle = {{IEEE} Secure Development Conference, SecDev 2022, Atlanta, GA, USA, October 18-20, 2022}, pages = {59--60}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SecDev53368.2022.00021}, doi = {10.1109/SECDEV53368.2022.00021}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/Shortridge22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/XiaoZAKYC22, author = {Ya Xiao and Yang Zhao and Nicholas Allen and Nathan Keynes and Danfeng Yao and Cristina Cifuentes}, title = {Industrial Strength Static Detection for Cryptographic {API} Misuses}, booktitle = {{IEEE} Secure Development Conference, SecDev 2022, Atlanta, GA, USA, October 18-20, 2022}, pages = {61--62}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SecDev53368.2022.00022}, doi = {10.1109/SECDEV53368.2022.00022}, timestamp = {Tue, 20 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/XiaoZAKYC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/secdev/2022, title = {{IEEE} Secure Development Conference, SecDev 2022, Atlanta, GA, USA, October 18-20, 2022}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SecDev53368.2022}, doi = {10.1109/SECDEV53368.2022}, isbn = {978-1-6654-7182-4}, timestamp = {Tue, 20 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/00220YC21, author = {Jie Zhou and Michael Hicks and Yudi Yang and John Criswell}, title = {Tutorial: Making {C} Programs Safer with Checked {C}}, booktitle = {{IEEE} Secure Development Conference, SecDev 2021, Atlanta, GA, USA, October 18-20, 2021}, pages = {13--14}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SecDev51306.2021.00018}, doi = {10.1109/SECDEV51306.2021.00018}, timestamp = {Thu, 30 Dec 2021 09:40:17 +0100}, biburl = {https://dblp.org/rec/conf/secdev/00220YC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/Ahmed0LAY21, author = {Salman Ahmed and Long Cheng and Hans Liljestrand and N. Asokan and Danfeng Daphne Yao}, title = {Tutorial: Investigating Advanced Exploits for System Security Assurance}, booktitle = {{IEEE} Secure Development Conference, SecDev 2021, Atlanta, GA, USA, October 18-20, 2021}, pages = {3--4}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SecDev51306.2021.00013}, doi = {10.1109/SECDEV51306.2021.00013}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secdev/Ahmed0LAY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/ChehC21, author = {Carmen Cheh and Binbin Chen}, title = {Analyzing OpenAPI Specifications for Security Design Issues}, booktitle = {{IEEE} Secure Development Conference, SecDev 2021, Atlanta, GA, USA, October 18-20, 2021}, pages = {15--22}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SecDev51306.2021.00019}, doi = {10.1109/SECDEV51306.2021.00019}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/ChehC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/ChowdhuryHPTR21, author = {Partha Das Chowdhury and Joseph Hallett and Nikhil Patnaik and Mohammad Tahaei and Awais Rashid}, title = {Developers Are Neither Enemies Nor Users: They Are Collaborators}, booktitle = {{IEEE} Secure Development Conference, SecDev 2021, Atlanta, GA, USA, October 18-20, 2021}, pages = {47--55}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SecDev51306.2021.00023}, doi = {10.1109/SECDEV51306.2021.00023}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secdev/ChowdhuryHPTR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/CluzelGMZ21, author = {Guillaume Cluzel and Kyriakos Georgiou and Yannick Moy and Cl{\'{e}}ment Zeller}, title = {Layered Formal Verification of a {TCP} Stack}, booktitle = {{IEEE} Secure Development Conference, SecDev 2021, Atlanta, GA, USA, October 18-20, 2021}, pages = {86--93}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SecDev51306.2021.00028}, doi = {10.1109/SECDEV51306.2021.00028}, timestamp = {Thu, 30 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/CluzelGMZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/CriswellJP21, author = {John Criswell and Ethan Johnson and Colin Pronovost}, title = {Tutorial: {LLVM} for Security Practitioners}, booktitle = {{IEEE} Secure Development Conference, SecDev 2021, Atlanta, GA, USA, October 18-20, 2021}, pages = {9--10}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SecDev51306.2021.00016}, doi = {10.1109/SECDEV51306.2021.00016}, timestamp = {Thu, 30 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/CriswellJP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/Everson021, author = {Douglas Everson and Long Cheng}, title = {Compressing Network Attack Surfaces for Practical Security Analysis}, booktitle = {{IEEE} Secure Development Conference, SecDev 2021, Atlanta, GA, USA, October 18-20, 2021}, pages = {23--29}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SecDev51306.2021.00020}, doi = {10.1109/SECDEV51306.2021.00020}, timestamp = {Thu, 30 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/Everson021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/LeeJLLK21, author = {Sungmin Lee and Yoonkyo Jung and Jaehyun Lee and Byoungyoung Lee and Ted "Taekyoung" Kwon}, title = {Android Remote Unlocking Service using Synthetic Password: {A} Hardware Security-preserving Approach}, booktitle = {{IEEE} Secure Development Conference, SecDev 2021, Atlanta, GA, USA, October 18-20, 2021}, pages = {63--70}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SecDev51306.2021.00025}, doi = {10.1109/SECDEV51306.2021.00025}, timestamp = {Thu, 30 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/LeeJLLK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/LeeSLE21, author = {David Lee and Brandon Steed and Yi Liu and Onyeka Ezenwoye}, title = {Tutorial: {A} Lightweight Web Application for Software Vulnerability Demonstration}, booktitle = {{IEEE} Secure Development Conference, SecDev 2021, Atlanta, GA, USA, October 18-20, 2021}, pages = {5--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SecDev51306.2021.00014}, doi = {10.1109/SECDEV51306.2021.00014}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secdev/LeeSLE21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/LowdermilkS21, author = {Jason Lowdermilk and Simha Sethumadhavan}, title = {Towards Zero Trust: An Experience Report}, booktitle = {{IEEE} Secure Development Conference, SecDev 2021, Atlanta, GA, USA, October 18-20, 2021}, pages = {79--85}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SecDev51306.2021.00027}, doi = {10.1109/SECDEV51306.2021.00027}, timestamp = {Thu, 30 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/LowdermilkS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/NarayanDS21, author = {Shravan Narayan and Craig Disselkoen and Deian Stefan}, title = {Tutorial: Sandboxing (unsafe) {C} code with RLBox}, booktitle = {{IEEE} Secure Development Conference, SecDev 2021, Atlanta, GA, USA, October 18-20, 2021}, pages = {11--12}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SecDev51306.2021.00017}, doi = {10.1109/SECDEV51306.2021.00017}, timestamp = {Thu, 30 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/NarayanDS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/OakABS21, author = {Aditya Oak and Amir M. Ahmadian and Musard Balliu and Guido Salvaneschi}, title = {Enclave-Based Secure Programming with {JE}}, booktitle = {{IEEE} Secure Development Conference, SecDev 2021, Atlanta, GA, USA, October 18-20, 2021}, pages = {71--78}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SecDev51306.2021.00026}, doi = {10.1109/SECDEV51306.2021.00026}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secdev/OakABS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/RahmanBM21, author = {Akond Rahman and Farhat Lamia Barsha and Patrick Morrison}, title = {Shhh!: 12 Practices for Secret Management in Infrastructure as Code}, booktitle = {{IEEE} Secure Development Conference, SecDev 2021, Atlanta, GA, USA, October 18-20, 2021}, pages = {56--62}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SecDev51306.2021.00024}, doi = {10.1109/SECDEV51306.2021.00024}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secdev/RahmanBM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/ReevesTBC21, author = {Michael Reeves and Dave Jing Tian and Antonio Bianchi and Z. Berkay Celik}, title = {Towards Improving Container Security by Preventing Runtime Escapes}, booktitle = {{IEEE} Secure Development Conference, SecDev 2021, Atlanta, GA, USA, October 18-20, 2021}, pages = {38--46}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SecDev51306.2021.00022}, doi = {10.1109/SECDEV51306.2021.00022}, timestamp = {Thu, 30 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/ReevesTBC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/SchaeferRCW21, author = {Ina Schaefer and Tobias Runge and Loek Cleophas and Bruce W. Watson}, title = {Tutorial: The Correctness-by-Construction Approach to Programming Using CorC}, booktitle = {{IEEE} Secure Development Conference, SecDev 2021, Atlanta, GA, USA, October 18-20, 2021}, pages = {1--2}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SecDev51306.2021.00012}, doi = {10.1109/SECDEV51306.2021.00012}, timestamp = {Thu, 30 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/SchaeferRCW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/SionLYVJ21, author = {Laurens Sion and Dimitri Van Landuyt and Koen Yskout and Stef Verreydt and Wouter Joosen}, title = {Automated Threat Analysis and Management in a Continuous Integration Pipeline}, booktitle = {{IEEE} Secure Development Conference, SecDev 2021, Atlanta, GA, USA, October 18-20, 2021}, pages = {30--37}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SecDev51306.2021.00021}, doi = {10.1109/SECDEV51306.2021.00021}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/SionLYVJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/Svoboda21, author = {David Svoboda}, title = {Hands-on Tutorial: How Exploitable is Insecure {C} Code?}, booktitle = {{IEEE} Secure Development Conference, SecDev 2021, Atlanta, GA, USA, October 18-20, 2021}, pages = {7--8}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SecDev51306.2021.00015}, doi = {10.1109/SECDEV51306.2021.00015}, timestamp = {Thu, 30 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/Svoboda21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/TsoupidiBB21, author = {Rodothea{-}Myrsini Tsoupidi and Musard Balliu and Benoit Baudry}, title = {Vivienne: Relational Verification of Cryptographic Implementations in WebAssembly}, booktitle = {{IEEE} Secure Development Conference, SecDev 2021, Atlanta, GA, USA, October 18-20, 2021}, pages = {94--102}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SecDev51306.2021.00029}, doi = {10.1109/SECDEV51306.2021.00029}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secdev/TsoupidiBB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/secdev/2021, title = {{IEEE} Secure Development Conference, SecDev 2021, Atlanta, GA, USA, October 18-20, 2021}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SecDev51306.2021}, doi = {10.1109/SECDEV51306.2021}, isbn = {978-1-6654-3170-5}, timestamp = {Thu, 30 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/AcostaBKLK20, author = {Jaime C. Acosta and Anjon Basak and Christopher Kiekintveld and Nandi Leslie and Charles A. Kamhoua}, title = {Cybersecurity Deception Experimentation System}, booktitle = {{IEEE} Secure Development, SecDev 2020, Atlanta, GA, USA, September 28-30, 2020}, pages = {34--40}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SecDev45635.2020.00022}, doi = {10.1109/SECDEV45635.2020.00022}, timestamp = {Wed, 28 Oct 2020 10:41:43 +0100}, biburl = {https://dblp.org/rec/conf/secdev/AcostaBKLK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/ButtnerPPS20, author = {Andrew Buttner and Richard Piazza and Rushi Purohit and Alec Summers}, title = {A Secure Code Review Retrospective}, booktitle = {{IEEE} Secure Development, SecDev 2020, Atlanta, GA, USA, September 28-30, 2020}, pages = {31--32}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SecDev45635.2020.00020}, doi = {10.1109/SECDEV45635.2020.00020}, timestamp = {Wed, 28 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/ButtnerPPS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/Criswell20, author = {John Criswell}, title = {Tutorial: {LLVM} for Security Practitioners}, booktitle = {{IEEE} Secure Development, SecDev 2020, Atlanta, GA, USA, September 28-30, 2020}, pages = {1}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SecDev45635.2020.00013}, doi = {10.1109/SECDEV45635.2020.00013}, timestamp = {Wed, 28 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/Criswell20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/DuanYZC20, author = {Junhan Duan and Yudi Yang and Jie Zhou and John Criswell}, title = {Refactoring the FreeBSD Kernel with Checked {C}}, booktitle = {{IEEE} Secure Development, SecDev 2020, Atlanta, GA, USA, September 28-30, 2020}, pages = {15--22}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SecDev45635.2020.00018}, doi = {10.1109/SECDEV45635.2020.00018}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/DuanYZC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/EversonC20, author = {Douglas Everson and Long Cheng}, title = {Network Attack Surface Simplification for Red and Blue Teams}, booktitle = {{IEEE} Secure Development, SecDev 2020, Atlanta, GA, USA, September 28-30, 2020}, pages = {74--80}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SecDev45635.2020.00027}, doi = {10.1109/SECDEV45635.2020.00027}, timestamp = {Mon, 26 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secdev/EversonC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/FioraldiDQ20, author = {Andrea Fioraldi and Daniele Cono D'Elia and Leonardo Querzoni}, title = {Fuzzing Binaries for Memory Safety Errors with QASan}, booktitle = {{IEEE} Secure Development, SecDev 2020, Atlanta, GA, USA, September 28-30, 2020}, pages = {23--30}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SecDev45635.2020.00019}, doi = {10.1109/SECDEV45635.2020.00019}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secdev/FioraldiDQ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/IslamA20, author = {Md. Mazharul Islam and Ehab Al{-}Shaer}, title = {Active Deception Framework: An Extensible Development Environment for Adaptive Cyber Deception}, booktitle = {{IEEE} Secure Development, SecDev 2020, Atlanta, GA, USA, September 28-30, 2020}, pages = {41--48}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SecDev45635.2020.00023}, doi = {10.1109/SECDEV45635.2020.00023}, timestamp = {Thu, 27 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/IslamA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/IslamRMHKY20, author = {Mazharul Islam and Sazzadur Rahaman and Na Meng and Behnaz Hassanshahi and Padmanabhan Krishnan and Danfeng Daphne Yao}, title = {Coding Practices and Recommendations of Spring Security for Enterprise Applications}, booktitle = {{IEEE} Secure Development, SecDev 2020, Atlanta, GA, USA, September 28-30, 2020}, pages = {49--57}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SecDev45635.2020.00024}, doi = {10.1109/SECDEV45635.2020.00024}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secdev/IslamRMHKY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/KimM0MCMT020, author = {Sungkeun Kim and Farabi Mahmud and Jiayi Huang and Pritam Majumder and Neophytos Christou and Abdullah Muzahid and Chia{-}Che Tsai and Eun Jung Kim}, title = {ReViCe: Reusing Victim Cache to Prevent Speculative Cache Leakage}, booktitle = {{IEEE} Secure Development, SecDev 2020, Atlanta, GA, USA, September 28-30, 2020}, pages = {96--107}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SecDev45635.2020.00029}, doi = {10.1109/SECDEV45635.2020.00029}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secdev/KimM0MCMT020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/KimR20, author = {Shinhae Kim and Sukyoung Ryu}, title = {Analysis of Blockchain Smart Contracts: Techniques and Insights}, booktitle = {{IEEE} Secure Development, SecDev 2020, Atlanta, GA, USA, September 28-30, 2020}, pages = {65--73}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SecDev45635.2020.00026}, doi = {10.1109/SECDEV45635.2020.00026}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secdev/KimR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/MagillD20, author = {Stephen Magill and Thomas DuBuisson}, title = {Tutorial: Static Analysis at Scale with Muse}, booktitle = {{IEEE} Secure Development, SecDev 2020, Atlanta, GA, USA, September 28-30, 2020}, pages = {4}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SecDev45635.2020.00015}, doi = {10.1109/SECDEV45635.2020.00015}, timestamp = {Wed, 28 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/MagillD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/RosenstatterSJS20, author = {Thomas Rosenstatter and Kim Strandberg and Rodi Jolak and Riccardo Scandariato and Tomas Olovsson}, title = {{REMIND:} {A} Framework for the Resilient Design of Automotive Systems}, booktitle = {{IEEE} Secure Development, SecDev 2020, Atlanta, GA, USA, September 28-30, 2020}, pages = {81--95}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SecDev45635.2020.00028}, doi = {10.1109/SECDEV45635.2020.00028}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/RosenstatterSJS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/ShamimBR20, author = {Md. Shazibul Islam Shamim and Farzana Ahamed Bhuiyan and Akond Rahman}, title = {{XI} Commandments of Kubernetes Security: {A} Systematization of Knowledge Related to Kubernetes Security Practices}, booktitle = {{IEEE} Secure Development, SecDev 2020, Atlanta, GA, USA, September 28-30, 2020}, pages = {58--64}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SecDev45635.2020.00025}, doi = {10.1109/SECDEV45635.2020.00025}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secdev/ShamimBR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/ShenDC20, author = {Zhuojia Shen and Komail Dharsee and John Criswell}, title = {Fast Execute-Only Memory for Embedded Systems}, booktitle = {{IEEE} Secure Development, SecDev 2020, Atlanta, GA, USA, September 28-30, 2020}, pages = {7--14}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SecDev45635.2020.00017}, doi = {10.1109/SECDEV45635.2020.00017}, timestamp = {Sun, 12 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/ShenDC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/TombPD20, author = {Aaron Tomb and Stuart Pernsteiner and Mike Dodds}, title = {Symbolic Testing for {C} and Rust}, booktitle = {{IEEE} Secure Development, SecDev 2020, Atlanta, GA, USA, September 28-30, 2020}, pages = {33}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SecDev45635.2020.00021}, doi = {10.1109/SECDEV45635.2020.00021}, timestamp = {Wed, 28 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/TombPD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/XiaoFARY20, author = {Ya Xiao and Miles Frantz and Sharmin Afrose and Sazzadur Rahaman and Danfeng Daphne Yao}, title = {Tutorial: Principles and Practices of Secure Cryptographic Coding in Java}, booktitle = {{IEEE} Secure Development, SecDev 2020, Atlanta, GA, USA, September 28-30, 2020}, pages = {5--6}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SecDev45635.2020.00016}, doi = {10.1109/SECDEV45635.2020.00016}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secdev/XiaoFARY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/YavuzB20, author = {Tuba Yavuz and Ken Yihang Bai}, title = {Tutorial: Detecting Memory Vulnerabilities in the Components of System Code using {PROMPT}}, booktitle = {{IEEE} Secure Development, SecDev 2020, Atlanta, GA, USA, September 28-30, 2020}, pages = {2--3}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SecDev45635.2020.00014}, doi = {10.1109/SECDEV45635.2020.00014}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secdev/YavuzB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/secdev/2020, title = {{IEEE} Secure Development, SecDev 2020, Atlanta, GA, USA, September 28-30, 2020}, publisher = {{IEEE}}, year = {2020}, url = {https://ieeexplore.ieee.org/xpl/conhome/9229476/proceeding}, isbn = {978-1-7281-8388-6}, timestamp = {Wed, 28 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/0004AM19, author = {Wei Bai and Omer Akgul and Michelle L. Mazurek}, title = {A Qualitative Investigation of Insecure Code Propagation from Online Forums}, booktitle = {2019 {IEEE} Cybersecurity Development, SecDev 2019, Tysons Corner, VA, USA, September 23-25, 2019}, pages = {34--48}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/SecDev.2019.00016}, doi = {10.1109/SECDEV.2019.00016}, timestamp = {Wed, 27 Nov 2019 18:04:04 +0100}, biburl = {https://dblp.org/rec/conf/secdev/0004AM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/0005LANJAY19, author = {Long Cheng and Hans Liljestrand and Md. Salman Ahmed and Thomas Nyman and Trent Jaeger and N. Asokan and Danfeng Yao}, title = {Exploitation Techniques and Defenses for Data-Oriented Attacks}, booktitle = {2019 {IEEE} Cybersecurity Development, SecDev 2019, Tysons Corner, VA, USA, September 23-25, 2019}, pages = {114--128}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/SecDev.2019.00022}, doi = {10.1109/SECDEV.2019.00022}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secdev/0005LANJAY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/AfroseRY19, author = {Sharmin Afrose and Sazzadur Rahaman and Danfeng Yao}, title = {CryptoAPI-Bench: {A} Comprehensive Benchmark on Java Cryptographic {API} Misuses}, booktitle = {2019 {IEEE} Cybersecurity Development, SecDev 2019, Tysons Corner, VA, USA, September 23-25, 2019}, pages = {49--61}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/SecDev.2019.00017}, doi = {10.1109/SECDEV.2019.00017}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secdev/AfroseRY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/AlbabILFQG19, author = {Kinan Dak Albab and Rawane Issa and Andrei Lapets and Peter Flockhart and Lucy Qin and Ira Globus{-}Harris}, title = {Tutorial: Deploying Secure Multi-Party Computation on the Web Using {JIFF}}, booktitle = {2019 {IEEE} Cybersecurity Development, SecDev 2019, Tysons Corner, VA, USA, September 23-25, 2019}, pages = {3}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/SecDev.2019.00013}, doi = {10.1109/SECDEV.2019.00013}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secdev/AlbabILFQG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/Alnaim19, author = {Abdulrahman A. Alnaim}, title = {Using Rules Engine in the Automation of System Security Review}, booktitle = {2019 {IEEE} Cybersecurity Development, SecDev 2019, Tysons Corner, VA, USA, September 23-25, 2019}, pages = {142}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/SecDev.2019.00025}, doi = {10.1109/SECDEV.2019.00025}, timestamp = {Wed, 27 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/Alnaim19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/BrosgolDM19, author = {Benjamin M. Brosgol and Claire Dross and Yannick Moy}, title = {Tutorial: {A} Practical Introduction to Formal Development and Verification of High-Assurance Software with {SPARK}}, booktitle = {2019 {IEEE} Cybersecurity Development, SecDev 2019, Tysons Corner, VA, USA, September 23-25, 2019}, pages = {1--2}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/SecDev.2019.00012}, doi = {10.1109/SECDEV.2019.00012}, timestamp = {Wed, 27 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/BrosgolDM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/Chen19, author = {Chien{-}An Chen}, title = {With Great Abstraction Comes Great Responsibility: Sealing the Microservices Attack Surface}, booktitle = {2019 {IEEE} Cybersecurity Development, SecDev 2019, Tysons Corner, VA, USA, September 23-25, 2019}, pages = {144}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/SecDev.2019.00027}, doi = {10.1109/SECDEV.2019.00027}, timestamp = {Wed, 27 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/Chen19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/CruzT19, author = {Raimil Cruz and {\'{E}}ric Tanter}, title = {Polymorphic Relaxed Noninterference}, booktitle = {2019 {IEEE} Cybersecurity Development, SecDev 2019, Tysons Corner, VA, USA, September 23-25, 2019}, pages = {101--113}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/SecDev.2019.00021}, doi = {10.1109/SECDEV.2019.00021}, timestamp = {Wed, 27 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/CruzT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/DenardMEE19, author = {Samuel Denard and Susan A. Mengel and Atila Ertas and Stephen Ekwaro{-}Osire}, title = {Development Cycle Estimation Modeling}, booktitle = {2019 {IEEE} Cybersecurity Development, SecDev 2019, Tysons Corner, VA, USA, September 23-25, 2019}, pages = {146}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/SecDev.2019.00029}, doi = {10.1109/SECDEV.2019.00029}, timestamp = {Fri, 07 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secdev/DenardMEE19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/HanSNML19, author = {Yongkui Han and Pankil Shah and Van Nguyen and Ling Ma and Richard Livingston}, title = {OpenOSC: Open Source Object Size Checking Library With Built-in Metrics}, booktitle = {2019 {IEEE} Cybersecurity Development, SecDev 2019, Tysons Corner, VA, USA, September 23-25, 2019}, pages = {143}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/SecDev.2019.00026}, doi = {10.1109/SECDEV.2019.00026}, timestamp = {Wed, 27 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/HanSNML19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/HoganMRCDHVZ19, author = {Kyle Hogan and Hoda Maleki and Reza Rahaeimehr and Ran Canetti and Marten van Dijk and Jason Hennessey and Mayank Varia and Haibin Zhang}, title = {On the Universally Composable Security of OpenStack}, booktitle = {2019 {IEEE} Cybersecurity Development, SecDev 2019, Tysons Corner, VA, USA, September 23-25, 2019}, pages = {20--33}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/SecDev.2019.00015}, doi = {10.1109/SECDEV.2019.00015}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secdev/HoganMRCDHVZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/LapetsAIQVBJ19, author = {Andrei Lapets and Kinan Dak Albab and Rawane Issa and Lucy Qin and Mayank Varia and Azer Bestavros and Frederick Jansen}, title = {Role-Based Ecosystem for the Design, Development, and Deployment of Secure Multi-Party Data Analytics Applications}, booktitle = {2019 {IEEE} Cybersecurity Development, SecDev 2019, Tysons Corner, VA, USA, September 23-25, 2019}, pages = {129--140}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/SecDev.2019.00023}, doi = {10.1109/SECDEV.2019.00023}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secdev/LapetsAIQVBJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/McMillanZ19, author = {Kenneth L. McMillan and Lenore D. Zuck}, title = {Compositional Testing of Internet Protocols}, booktitle = {2019 {IEEE} Cybersecurity Development, SecDev 2019, Tysons Corner, VA, USA, September 23-25, 2019}, pages = {161--174}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/SecDev.2019.00031}, doi = {10.1109/SECDEV.2019.00031}, timestamp = {Wed, 27 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/McMillanZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/MenonKSMFHBN19, author = {Vivek V. Menon and Gaurav Kolhe and Andrew G. Schmidt and Joshua S. Monson and Matthew French and Yinghua Hu and Peter A. Beerel and Pierluigi Nuzzo}, title = {System-Level Framework for Logic Obfuscation with Quantified Metrics for Evaluation}, booktitle = {2019 {IEEE} Cybersecurity Development, SecDev 2019, Tysons Corner, VA, USA, September 23-25, 2019}, pages = {89--100}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/SecDev.2019.00020}, doi = {10.1109/SECDEV.2019.00020}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secdev/MenonKSMFHBN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/PathakSHG19, author = {Abhishek Pathak and Kaarthik Sivakumar and Mazhar Haque and Prasanna Ganesan}, title = {Multi-Cluster Visualization and Live Reporting of Static Analysis Security Testing {(SAST)} Warnings}, booktitle = {2019 {IEEE} Cybersecurity Development, SecDev 2019, Tysons Corner, VA, USA, September 23-25, 2019}, pages = {145}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/SecDev.2019.00028}, doi = {10.1109/SECDEV.2019.00028}, timestamp = {Wed, 27 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/PathakSHG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/PathakSSYH19, author = {Abhishek Pathak and Kaarthik Sivakumar and Jin Sheng and Anlu Yan and Mazhar Haque}, title = {Effective Static Analysis Enforcement in Complex Cloud Native Dockerized Systems}, booktitle = {2019 {IEEE} Cybersecurity Development, SecDev 2019, Tysons Corner, VA, USA, September 23-25, 2019}, pages = {141}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/SecDev.2019.00024}, doi = {10.1109/SECDEV.2019.00024}, timestamp = {Wed, 27 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/PathakSSYH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/SchweizerN19, author = {Remo Schweizer and Stephan Neuhaus}, title = {Downright: {A} Framework and Toolchain for Privilege Handling}, booktitle = {2019 {IEEE} Cybersecurity Development, SecDev 2019, Tysons Corner, VA, USA, September 23-25, 2019}, pages = {76--88}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/SecDev.2019.00019}, doi = {10.1109/SECDEV.2019.00019}, timestamp = {Wed, 27 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/SchweizerN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/SyversonT19, author = {Paul Syverson and Matthew Traudt}, title = {Self-Authenticating Traditional Domain Names}, booktitle = {2019 {IEEE} Cybersecurity Development, SecDev 2019, Tysons Corner, VA, USA, September 23-25, 2019}, pages = {147--160}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/SecDev.2019.00030}, doi = {10.1109/SECDEV.2019.00030}, timestamp = {Wed, 27 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/SyversonT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/TuveriB19, author = {Nicola Tuveri and Billy Bob Brumley}, title = {Start Your ENGINEs: Dynamically Loadable Contemporary Crypto}, booktitle = {2019 {IEEE} Cybersecurity Development, SecDev 2019, Tysons Corner, VA, USA, September 23-25, 2019}, pages = {4--19}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/SecDev.2019.00014}, doi = {10.1109/SECDEV.2019.00014}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/TuveriB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/Yavuz19, author = {Tuba Yavuz}, title = {Detecting Callback Related Deep Vulnerabilities in Linux Device Drivers}, booktitle = {2019 {IEEE} Cybersecurity Development, SecDev 2019, Tysons Corner, VA, USA, September 23-25, 2019}, pages = {62--75}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/SecDev.2019.00018}, doi = {10.1109/SECDEV.2019.00018}, timestamp = {Wed, 27 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/Yavuz19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/secdev/2019, title = {2019 {IEEE} Cybersecurity Development, SecDev 2019, Tysons Corner, VA, USA, September 23-25, 2019}, publisher = {{IEEE}}, year = {2019}, url = {https://ieeexplore.ieee.org/xpl/conhome/8894011/proceeding}, isbn = {978-1-5386-7289-1}, timestamp = {Wed, 27 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/0002PW18, author = {Hang Hu and Peng Peng and Gang Wang}, title = {Towards Understanding the Adoption of Anti-Spoofing Protocols in Email Systems}, booktitle = {2018 {IEEE} Cybersecurity Development, SecDev 2018, Cambridge, MA, USA, September 30 - October 2, 2018}, pages = {94--101}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/SecDev.2018.00020}, doi = {10.1109/SECDEV.2018.00020}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/0002PW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/ArbelaezELWZ18, author = {Andrea Arbelaez and Sallie Edwards and Kevin Littlefield and Sue Wang and Kangmin Zheng}, title = {Securing Wireless Infusion Pumps}, booktitle = {2018 {IEEE} Cybersecurity Development, SecDev 2018, Cambridge, MA, USA, September 30 - October 2, 2018}, pages = {141}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/SecDev.2018.00037}, doi = {10.1109/SECDEV.2018.00037}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/ArbelaezELWZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/BergheYSJ18, author = {Alexander van Den Berghe and Koen Yskout and Riccardo Scandariato and Wouter Joosen}, title = {A Lingua Franca for Security by Design}, booktitle = {2018 {IEEE} Cybersecurity Development, SecDev 2018, Cambridge, MA, USA, September 30 - October 2, 2018}, pages = {69--76}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/SecDev.2018.00017}, doi = {10.1109/SECDEV.2018.00017}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/BergheYSJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/BlanchardKL18, author = {Allan Blanchard and Nikolai Kosmatov and Fr{\'{e}}d{\'{e}}ric Loulergue}, title = {Tutorial: Secure Your Things: Secure Development of IoT Software with Frama-C}, booktitle = {2018 {IEEE} Cybersecurity Development, SecDev 2018, Cambridge, MA, USA, September 30 - October 2, 2018}, pages = {126--127}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/SecDev.2018.00026}, doi = {10.1109/SECDEV.2018.00026}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secdev/BlanchardKL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/CaiDW18, author = {Chengjun Cai and Huayi Duan and Cong Wang}, title = {Tutorial: Building Secure and Trustworthy Blockchain Applications}, booktitle = {2018 {IEEE} Cybersecurity Development, SecDev 2018, Cambridge, MA, USA, September 30 - October 2, 2018}, pages = {120--121}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/SecDev.2018.00023}, doi = {10.1109/SECDEV.2018.00023}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/CaiDW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/DhillonM18, author = {Danny Dhillon and Vishal Mishra}, title = {Applied Threat Driven Security Verification}, booktitle = {2018 {IEEE} Cybersecurity Development, SecDev 2018, Cambridge, MA, USA, September 30 - October 2, 2018}, pages = {135}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/SecDev.2018.00031}, doi = {10.1109/SECDEV.2018.00031}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/DhillonM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/DoddsMT18, author = {Mike Dodds and Stephen Magill and Aaron Tomb}, title = {Tutorial: Continuous Verification of Critical Software}, booktitle = {2018 {IEEE} Cybersecurity Development, SecDev 2018, Cambridge, MA, USA, September 30 - October 2, 2018}, pages = {128--129}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/SecDev.2018.00027}, doi = {10.1109/SECDEV.2018.00027}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/DoddsMT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/ElliottR0T18, author = {Archibald Samuel Elliott and Andrew Ruef and Michael Hicks and David Tarditi}, title = {Checked {C:} Making {C} Safe by Extension}, booktitle = {2018 {IEEE} Cybersecurity Development, SecDev 2018, Cambridge, MA, USA, September 30 - October 2, 2018}, pages = {53--60}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/SecDev.2018.00015}, doi = {10.1109/SECDEV.2018.00015}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/ElliottR0T18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/FooAYS18, author = {Darius Foo and Ming Yi Ang and Jason Yeo and Asankhaya Sharma}, title = {{SGL:} {A} Domain-Specific Language for Large-Scale Analysis of Open-Source Code}, booktitle = {2018 {IEEE} Cybersecurity Development, SecDev 2018, Cambridge, MA, USA, September 30 - October 2, 2018}, pages = {61--68}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/SecDev.2018.00016}, doi = {10.1109/SECDEV.2018.00016}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/FooAYS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/GauthierKACK18, author = {Fran{\c{c}}ois Gauthier and Nathan Keynes and Nicholas Allen and Diane Corney and Padmanabhan Krishnan}, title = {Scalable Static Analysis to Detect Security Vulnerabilities: Challenges and Solutions}, booktitle = {2018 {IEEE} Cybersecurity Development, SecDev 2018, Cambridge, MA, USA, September 30 - October 2, 2018}, pages = {134}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/SecDev.2018.00030}, doi = {10.1109/SECDEV.2018.00030}, timestamp = {Fri, 24 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/GauthierKACK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/GilOS18, author = {Ronald Gil and Hamed Okhravi and Howard E. Shrobe}, title = {There's a Hole in the Bottom of the {C:} On the Effectiveness of Allocation Protection}, booktitle = {2018 {IEEE} Cybersecurity Development, SecDev 2018, Cambridge, MA, USA, September 30 - October 2, 2018}, pages = {102--109}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/SecDev.2018.00021}, doi = {10.1109/SECDEV.2018.00021}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/GilOS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/GlumichRRO18, author = {Sonja Glumich and Juanita Riley and E. Paul Ratazzi and Amanda Ozanam}, title = {{BP:} Integrating Cyber Vulnerability Assessments Earlier into the Systems Development Lifecycle: {A} Methodology to Conduct Early-Cycle Cyber Vulnerability Assessments}, booktitle = {2018 {IEEE} Cybersecurity Development, SecDev 2018, Cambridge, MA, USA, September 30 - October 2, 2018}, pages = {77--84}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/SecDev.2018.00018}, doi = {10.1109/SECDEV.2018.00018}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secdev/GlumichRRO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/GoodmanGG18, author = {Peter Goodman and Gustavo Grieco and Alex Groce}, title = {Tutorial: DeepState: Bringing Vulnerability Detection Tools into the Development Cycle}, booktitle = {2018 {IEEE} Cybersecurity Development, SecDev 2018, Cambridge, MA, USA, September 30 - October 2, 2018}, pages = {130--131}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/SecDev.2018.00028}, doi = {10.1109/SECDEV.2018.00028}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/GoodmanGG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/HeymannM18, author = {Elisa Heymann and Barton P. Miller}, title = {Tutorial: Secure Coding Practices, Automated Assessment Tools and the {SWAMP}}, booktitle = {2018 {IEEE} Cybersecurity Development, SecDev 2018, Cambridge, MA, USA, September 30 - October 2, 2018}, pages = {124--125}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/SecDev.2018.00025}, doi = {10.1109/SECDEV.2018.00025}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/HeymannM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/HuZGC18, author = {Xiaoyu Hu and Jie Zhou and Spyridoula Gravani and John Criswell}, title = {Transforming Code to Drop Dead Privileges}, booktitle = {2018 {IEEE} Cybersecurity Development, SecDev 2018, Cambridge, MA, USA, September 30 - October 2, 2018}, pages = {45--52}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/SecDev.2018.00014}, doi = {10.1109/SECDEV.2018.00014}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/HuZGC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/KannavaraVRLS18, author = {Raghudeep Kannavara and Jacob Vangore and William Roberts and Marcus Lindholm and Priti Shrivastav}, title = {Automating Threat Intelligence for {SDL}}, booktitle = {2018 {IEEE} Cybersecurity Development, SecDev 2018, Cambridge, MA, USA, September 30 - October 2, 2018}, pages = {137}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/SecDev.2018.00033}, doi = {10.1109/SECDEV.2018.00033}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/KannavaraVRLS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/LiSWLEKVW18, author = {Jason H. Li and Douglas Schafer and David Whelihan and Stefano Lassini and Nicholas Evancich and Kyung Joon Kwak and Michael Vai and Haley Whitman}, title = {Designing Secure and Resilient Embedded Avionics Systems}, booktitle = {2018 {IEEE} Cybersecurity Development, SecDev 2018, Cambridge, MA, USA, September 30 - October 2, 2018}, pages = {139}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/SecDev.2018.00035}, doi = {10.1109/SECDEV.2018.00035}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/LiSWLEKVW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/McBrideTELS18, author = {Tim McBride and Anne Townsend and Michael Ekstrom and Lauren Lusty and Julian Sexton}, title = {Data Integrity: Recovering from Ransomware and Other Destructive Events}, booktitle = {2018 {IEEE} Cybersecurity Development, SecDev 2018, Cambridge, MA, USA, September 30 - October 2, 2018}, pages = {140}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/SecDev.2018.00036}, doi = {10.1109/SECDEV.2018.00036}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/McBrideTELS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/MertogunoCKM18, author = {J. Sukarno Mertoguno and Ryan Craven and Daniel Koller and Matthew Mickelson}, title = {Reducing Attack Surface via Executable Transformation}, booktitle = {2018 {IEEE} Cybersecurity Development, SecDev 2018, Cambridge, MA, USA, September 30 - October 2, 2018}, pages = {138}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/SecDev.2018.00034}, doi = {10.1109/SECDEV.2018.00034}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/MertogunoCKM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/MohanOK18, author = {Vaishnavi Mohan and Lotfi Ben Othmane and Andre Kres}, title = {{BP:} Security Concerns and Best Practices for Automation of Software Deployment Processes: An Industrial Case Study}, booktitle = {2018 {IEEE} Cybersecurity Development, SecDev 2018, Cambridge, MA, USA, September 30 - October 2, 2018}, pages = {21--28}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/SecDev.2018.00011}, doi = {10.1109/SECDEV.2018.00011}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/MohanOK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/MonroseW18, author = {Fabian Monrose and Jan Werner}, title = {Tutorial: Parry and {RIPOSTE:} Honing Cybersecurity Skills with Challenge-Based Exercises}, booktitle = {2018 {IEEE} Cybersecurity Development, SecDev 2018, Cambridge, MA, USA, September 30 - October 2, 2018}, pages = {132--133}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/SecDev.2018.00029}, doi = {10.1109/SECDEV.2018.00029}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/MonroseW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/MurrayO18, author = {Toby C. Murray and Paul C. van Oorschot}, title = {{BP:} Formal Proofs, the Fine Print and Side Effects}, booktitle = {2018 {IEEE} Cybersecurity Development, SecDev 2018, Cambridge, MA, USA, September 30 - October 2, 2018}, pages = {1--10}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/SecDev.2018.00009}, doi = {10.1109/SECDEV.2018.00009}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/MurrayO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/RahamanMY18, author = {Sazzadur Rahaman and Na Meng and Danfeng Yao}, title = {Tutorial: Principles and Practices of Secure Crypto Coding in Java}, booktitle = {2018 {IEEE} Cybersecurity Development, SecDev 2018, Cambridge, MA, USA, September 30 - October 2, 2018}, pages = {122--123}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/SecDev.2018.00024}, doi = {10.1109/SECDEV.2018.00024}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/RahamanMY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/RahmatiFEP18, author = {Amir Rahmati and Earlence Fernandes and Kevin Eykholt and Atul Prakash}, title = {Tyche: {A} Risk-Based Permission Model for Smart Homes}, booktitle = {2018 {IEEE} Cybersecurity Development, SecDev 2018, Cambridge, MA, USA, September 30 - October 2, 2018}, pages = {29--36}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/SecDev.2018.00012}, doi = {10.1109/SECDEV.2018.00012}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/RahmatiFEP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/SnavelyKSSK18, author = {Will Snavely and William Klieber and Ryan Steele and David Svoboda and Andrew Kotov}, title = {Detecting Leaks of Sensitive Data Due to Stale Reads}, booktitle = {2018 {IEEE} Cybersecurity Development, SecDev 2018, Cambridge, MA, USA, September 30 - October 2, 2018}, pages = {37--44}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/SecDev.2018.00013}, doi = {10.1109/SECDEV.2018.00013}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/SnavelyKSSK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/Tang18, author = {Xuan Tang}, title = {Best Practice for Developing Secure and Trusted Enterprise Storage {\&} Computing Products}, booktitle = {2018 {IEEE} Cybersecurity Development, SecDev 2018, Cambridge, MA, USA, September 30 - October 2, 2018}, pages = {142}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/SecDev.2018.00038}, doi = {10.1109/SECDEV.2018.00038}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/Tang18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/TheisenSTW18, author = {Christopher Theisen and Hyunwoo Sohn and Dawson Tripp and Laurie A. Williams}, title = {{BP:} Profiling Vulnerabilities on the Attack Surface}, booktitle = {2018 {IEEE} Cybersecurity Development, SecDev 2018, Cambridge, MA, USA, September 30 - October 2, 2018}, pages = {110--119}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/SecDev.2018.00022}, doi = {10.1109/SECDEV.2018.00022}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/TheisenSTW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/Valani18, author = {Altaz Valani}, title = {Rethinking Secure DevOps Threat Modeling: The Need for a Dual Velocity Approach}, booktitle = {2018 {IEEE} Cybersecurity Development, SecDev 2018, Cambridge, MA, USA, September 30 - October 2, 2018}, pages = {136}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/SecDev.2018.00032}, doi = {10.1109/SECDEV.2018.00032}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/Valani18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/WeirBBS018, author = {Charles Weir and Lynne Blair and Ingolf Becker and M. Angela Sasse and James Noble}, title = {Light-Touch Interventions to Improve Software Development Security}, booktitle = {2018 {IEEE} Cybersecurity Development, SecDev 2018, Cambridge, MA, USA, September 30 - October 2, 2018}, pages = {85--93}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/SecDev.2018.00019}, doi = {10.1109/SECDEV.2018.00019}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/WeirBBS018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/YanPZCEFSTVWRVW18, author = {Lok K. Yan and Benjamin Price and Michael Zhivich and Brian Caswell and Christopher Eagle and Michael Frantzen and Holt Sorenson and Michael Thompson and Timothy Vidas and Jason Wright and Vernon Rivet and Samuel Colt VanWinkle and Clark Wood}, title = {{BP:} {DECREE:} {A} Platform for Repeatable and Reproducible Security Experiments}, booktitle = {2018 {IEEE} Cybersecurity Development, SecDev 2018, Cambridge, MA, USA, September 30 - October 2, 2018}, pages = {11--20}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/SecDev.2018.00010}, doi = {10.1109/SECDEV.2018.00010}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/YanPZCEFSTVWRVW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/Yasar18, author = {Hasan Yasar}, title = {Experiment: Sizing Exposed Credentials in GitHub Public Repositories for {CI/CD}}, booktitle = {2018 {IEEE} Cybersecurity Development, SecDev 2018, Cambridge, MA, USA, September 30 - October 2, 2018}, pages = {143}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/SecDev.2018.00039}, doi = {10.1109/SECDEV.2018.00039}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/Yasar18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/secdev/2018, title = {2018 {IEEE} Cybersecurity Development, SecDev 2018, Cambridge, MA, USA, September 30 - October 2, 2018}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://ieeexplore.ieee.org/xpl/conhome/8526271/proceeding}, isbn = {978-1-5386-7662-2}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secdev/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/AcarSWWMF17, author = {Yasemin Acar and Christian Stransky and Dominik Wermke and Charles Weir and Michelle L. Mazurek and Sascha Fahl}, title = {Developers Need Support, Too: {A} Survey of Security Advice for Software Developers}, booktitle = {{IEEE} Cybersecurity Development, SecDev 2017, Cambridge, MA, USA, September 24-26, 2017}, pages = {22--26}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SecDev.2017.17}, doi = {10.1109/SECDEV.2017.17}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/AcarSWWMF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/AnantharamanMBP17, author = {Prashant Anantharaman and Michael C. Millian and Sergey Bratus and Meredith L. Patterson}, title = {Input Handling Done Right: Building Hardened Parsers Using Language-Theoretic Security}, booktitle = {{IEEE} Cybersecurity Development, SecDev 2017, Cambridge, MA, USA, September 24-26, 2017}, pages = {4--5}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SecDev.2017.12}, doi = {10.1109/SECDEV.2017.12}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/AnantharamanMBP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/CarlstenSWKC17, author = {Nadia Carlsten and Reed Sturtevant and Chris Wysopal and Andreas Kuehlmann and Robert K. Cunningham}, title = {Panel: Building a Business around Secure Development}, booktitle = {{IEEE} Cybersecurity Development, SecDev 2017, Cambridge, MA, USA, September 24-26, 2017}, pages = {xiii--xiv}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SecDev.2017.9}, doi = {10.1109/SECDEV.2017.9}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/CarlstenSWKC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/CauligiSBJHJS17, author = {Sunjay Cauligi and Gary Soeller and Fraser Brown and Brian Johannesmeyer and Yunlu Huang and Ranjit Jhala and Deian Stefan}, title = {FaCT: {A} Flexible, Constant-Time Programming Language}, booktitle = {{IEEE} Cybersecurity Development, SecDev 2017, Cambridge, MA, USA, September 24-26, 2017}, pages = {69--76}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SecDev.2017.24}, doi = {10.1109/SECDEV.2017.24}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/CauligiSBJHJS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/DharseeJC17, author = {Komail Dharsee and Ethan Johnson and John Criswell}, title = {A Software Solution for Hardware Vulnerabilities}, booktitle = {{IEEE} Cybersecurity Development, SecDev 2017, Cambridge, MA, USA, September 24-26, 2017}, pages = {27--33}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SecDev.2017.18}, doi = {10.1109/SECDEV.2017.18}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/DharseeJC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/DurandBC17, author = {Gustavo Durand and Michael Bar{-}Sinai and Merc{\`{e}} Crosas}, title = {Securing Dataverse with an Adapted Command Design Pattern}, booktitle = {{IEEE} Cybersecurity Development, SecDev 2017, Cambridge, MA, USA, September 24-26, 2017}, pages = {54--60}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SecDev.2017.22}, doi = {10.1109/SECDEV.2017.22}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/DurandBC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/EdwardsKI17, author = {Jesse Edwards and Ameer Kashani and Gopalakrishnan Iyer}, title = {Evaluation of Software Vulnerabilities in Vehicle Electronic Control Units}, booktitle = {{IEEE} Cybersecurity Development, SecDev 2017, Cambridge, MA, USA, September 24-26, 2017}, pages = {83--84}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SecDev.2017.26}, doi = {10.1109/SECDEV.2017.26}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/EdwardsKI17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/FlynnSS17, author = {Lori Flynn and David Svoboda and William Snavely}, title = {Hands-On Tutorial: Auditing Static Analysis Alerts Using a Lexicon {\&} Rules}, booktitle = {{IEEE} Cybersecurity Development, SecDev 2017, Cambridge, MA, USA, September 24-26, 2017}, pages = {1--2}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SecDev.2017.10}, doi = {10.1109/SECDEV.2017.10}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/FlynnSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/GanzP17, author = {Jonathan Ganz and Sean Peisert}, title = {{ASLR:} How Robust Is the Randomness?}, booktitle = {{IEEE} Cybersecurity Development, SecDev 2017, Cambridge, MA, USA, September 24-26, 2017}, pages = {34--41}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SecDev.2017.19}, doi = {10.1109/SECDEV.2017.19}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/GanzP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/KannavaraGFC17, author = {Raghudeep Kannavara and Gilad Gressel and Damilare Fagbemi and Richard Chow}, title = {A Machine Learning Approach to {SDL}}, booktitle = {{IEEE} Cybersecurity Development, SecDev 2017, Cambridge, MA, USA, September 24-26, 2017}, pages = {10--15}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SecDev.2017.15}, doi = {10.1109/SECDEV.2017.15}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/KannavaraGFC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/Kupsch17, author = {James A. Kupsch}, title = {Automated Assessment Tools and the Software Assurance Marketplace {(SWAMP)}}, booktitle = {{IEEE} Cybersecurity Development, SecDev 2017, Cambridge, MA, USA, September 24-26, 2017}, pages = {3}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SecDev.2017.11}, doi = {10.1109/SECDEV.2017.11}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/Kupsch17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/RahamanY17, author = {Sazzadur Rahaman and Danfeng Yao}, title = {Program Analysis of Cryptographic Implementations for Security}, booktitle = {{IEEE} Cybersecurity Development, SecDev 2017, Cambridge, MA, USA, September 24-26, 2017}, pages = {61--68}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SecDev.2017.23}, doi = {10.1109/SECDEV.2017.23}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/RahamanY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/RoseFGMP17, author = {Isis Rose and Nicholas Felts and Alexander George and Emily Miller and Max Planck}, title = {Something Is Better Than Everything: {A} Distributed Approach to Audit Log Anomaly Detection}, booktitle = {{IEEE} Cybersecurity Development, SecDev 2017, Cambridge, MA, USA, September 24-26, 2017}, pages = {77--82}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SecDev.2017.25}, doi = {10.1109/SECDEV.2017.25}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/RoseFGMP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/RuotiSZ17, author = {Scott Ruoti and Kent E. Seamons and Daniel Zappala}, title = {Layering Security at Global Control Points to Secure Unmodified Software}, booktitle = {{IEEE} Cybersecurity Development, SecDev 2017, Cambridge, MA, USA, September 24-26, 2017}, pages = {42--49}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SecDev.2017.20}, doi = {10.1109/SECDEV.2017.20}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/RuotiSZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/Seacord17, author = {Robert C. Seacord}, title = {Java Deserialization Vulnerabilities and Mitigations}, booktitle = {{IEEE} Cybersecurity Development, SecDev 2017, Cambridge, MA, USA, September 24-26, 2017}, pages = {6--7}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SecDev.2017.13}, doi = {10.1109/SECDEV.2017.13}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/Seacord17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/WangS17, author = {Fish Wang and Yan Shoshitaishvili}, title = {Angr - The Next Generation of Binary Analysis}, booktitle = {{IEEE} Cybersecurity Development, SecDev 2017, Cambridge, MA, USA, September 24-26, 2017}, pages = {8--9}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SecDev.2017.14}, doi = {10.1109/SECDEV.2017.14}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/WangS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/WeberCMAS17, author = {Sam Weber and Michael J. Coblenz and Brad A. Myers and Jonathan Aldrich and Joshua Sunshine}, title = {Empirical Studies on the Security and Usability Impact of Immutability}, booktitle = {{IEEE} Cybersecurity Development, SecDev 2017, Cambridge, MA, USA, September 24-26, 2017}, pages = {50--53}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SecDev.2017.21}, doi = {10.1109/SECDEV.2017.21}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/WeberCMAS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/WhitmoreT17, author = {Jim Whitmore and William Tobin}, title = {Improving Attention to Security in Software Design with Analytics and Cognitive Techniques}, booktitle = {{IEEE} Cybersecurity Development, SecDev 2017, Cambridge, MA, USA, September 24-26, 2017}, pages = {16--21}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SecDev.2017.16}, doi = {10.1109/SECDEV.2017.16}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secdev/WhitmoreT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/WilliamsY17, author = {Imano Williams and Xiaohong Yuan}, title = {Creating Abuse Cases Based on Attack Patterns: {A} User Study}, booktitle = {{IEEE} Cybersecurity Development, SecDev 2017, Cambridge, MA, USA, September 24-26, 2017}, pages = {85--86}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SecDev.2017.27}, doi = {10.1109/SECDEV.2017.27}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/WilliamsY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/secdev/2017, title = {{IEEE} Cybersecurity Development, SecDev 2017, Cambridge, MA, USA, September 24-26, 2017}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://ieeexplore.ieee.org/xpl/conhome/8071083/proceeding}, isbn = {978-1-5386-3467-7}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secdev/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/AcarFM16, author = {Yasemin Acar and Sascha Fahl and Michelle L. Mazurek}, title = {You are Not Your Developer, Either: {A} Research Agenda for Usable Security and Privacy Research Beyond End Users}, booktitle = {{IEEE} Cybersecurity Development, SecDev 2016, Boston, MA, USA, November 3-4, 2016}, pages = {3--8}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SecDev.2016.013}, doi = {10.1109/SECDEV.2016.013}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/AcarFM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/BallmanS16, author = {Aaron Ballman and David Svoboda}, title = {Avoiding Insecure {C++} - How to Avoid Common {C++} Security Vulnerabilities}, booktitle = {{IEEE} Cybersecurity Development, SecDev 2016, Boston, MA, USA, November 3-4, 2016}, pages = {65}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SecDev.2016.022}, doi = {10.1109/SECDEV.2016.022}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/BallmanS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/Baloglu16, author = {Bill Baloglu}, title = {How to find and fix software vulnerabilities with coverity static analysis}, booktitle = {{IEEE} Cybersecurity Development, SecDev 2016, Boston, MA, USA, November 3-4, 2016}, pages = {153}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SecDev.2016.041}, doi = {10.1109/SECDEV.2016.041}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/Baloglu16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/Benjamin16, author = {Mable Benjamin}, title = {Secure Coding for Real-Time Embedded Systems: Cert Run-Time Profile for Ada}, booktitle = {{IEEE} Cybersecurity Development, SecDev 2016, Boston, MA, USA, November 3-4, 2016}, pages = {71--72}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SecDev.2016.026}, doi = {10.1109/SECDEV.2016.026}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/Benjamin16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/BrueningZ16, author = {Derek Bruening and Qin Zhao}, title = {Using Dr. Fuzz, Dr. Memory, and Custom Dynamic Tools for Secure Development}, booktitle = {{IEEE} Cybersecurity Development, SecDev 2016, Boston, MA, USA, November 3-4, 2016}, pages = {158}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SecDev.2016.044}, doi = {10.1109/SECDEV.2016.044}, timestamp = {Thu, 16 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/BrueningZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/CraneHL16, author = {Stephen Crane and Andrei Homescu and Per Larsen}, title = {Code Randomization: Haven't We Solved This Problem Yet?}, booktitle = {{IEEE} Cybersecurity Development, SecDev 2016, Boston, MA, USA, November 3-4, 2016}, pages = {124--129}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SecDev.2016.036}, doi = {10.1109/SECDEV.2016.036}, timestamp = {Thu, 16 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/CraneHL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/HeitzenraterS16, author = {Chad Heitzenrater and Andrew Simpson}, title = {Software Security Investment: The Right Amount of a Good Thing}, booktitle = {{IEEE} Cybersecurity Development, SecDev 2016, Boston, MA, USA, November 3-4, 2016}, pages = {53--59}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SecDev.2016.020}, doi = {10.1109/SECDEV.2016.020}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secdev/HeitzenraterS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/HoganLSSSYY16, author = {Kyle Hogan and Noah Luther and Nabil Schear and Emily Shen and David Stott and Sophia Yakoubov and Arkady Yerukhimovich}, title = {Secure Multiparty Computation for Cooperative Cyber Risk Assessment}, booktitle = {{IEEE} Cybersecurity Development, SecDev 2016, Boston, MA, USA, November 3-4, 2016}, pages = {75--76}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SecDev.2016.028}, doi = {10.1109/SECDEV.2016.028}, timestamp = {Thu, 16 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/HoganLSSSYY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/HoqueN16, author = {Md. Endadul Hoque and Cristina Nita{-}Rotaru}, title = {Building Robust Distributed Systems and Network Protocols by Using Adversarial Testing and Behavioral Analysis}, booktitle = {{IEEE} Cybersecurity Development, SecDev 2016, Boston, MA, USA, November 3-4, 2016}, pages = {138--145}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SecDev.2016.038}, doi = {10.1109/SECDEV.2016.038}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secdev/HoqueN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/IndelaKND16, author = {Soumya Indela and Mukul Kulkarni and Kartik Nayak and Tudor Dumitras}, title = {Toward Semantic Cryptography APIs}, booktitle = {{IEEE} Cybersecurity Development, SecDev 2016, Boston, MA, USA, November 3-4, 2016}, pages = {9--14}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SecDev.2016.014}, doi = {10.1109/SECDEV.2016.014}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/IndelaKND16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/Kang16, author = {Eunsuk Kang}, title = {Design Space Exploration for Security}, booktitle = {{IEEE} Cybersecurity Development, SecDev 2016, Boston, MA, USA, November 3-4, 2016}, pages = {30--36}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SecDev.2016.017}, doi = {10.1109/SECDEV.2016.017}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/Kang16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/Kerschbaumer16, author = {Christoph Kerschbaumer}, title = {Enforcing Content Security by Default within Web Browsers}, booktitle = {{IEEE} Cybersecurity Development, SecDev 2016, Boston, MA, USA, November 3-4, 2016}, pages = {101--106}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SecDev.2016.033}, doi = {10.1109/SECDEV.2016.033}, timestamp = {Thu, 16 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/Kerschbaumer16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/KlieberS16, author = {William Klieber and Will Snavely}, title = {Automated Code Repair Based on Inferred Specifications}, booktitle = {{IEEE} Cybersecurity Development, SecDev 2016, Boston, MA, USA, November 3-4, 2016}, pages = {130--137}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SecDev.2016.037}, doi = {10.1109/SECDEV.2016.037}, timestamp = {Thu, 16 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/KlieberS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/LapetsVBJV16, author = {Andrei Lapets and Nikolaj Volgushev and Azer Bestavros and Frederick Jansen and Mayank Varia}, title = {Secure {MPC} for Analytics as a Web Application}, booktitle = {{IEEE} Cybersecurity Development, SecDev 2016, Boston, MA, USA, November 3-4, 2016}, pages = {73--74}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SecDev.2016.027}, doi = {10.1109/SECDEV.2016.027}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/LapetsVBJV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/LiO16, author = {Zhou Li and Alina Oprea}, title = {Operational Security Log Analytics for Enterprise Breach Detection}, booktitle = {{IEEE} Cybersecurity Development, SecDev 2016, Boston, MA, USA, November 3-4, 2016}, pages = {15--22}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SecDev.2016.015}, doi = {10.1109/SECDEV.2016.015}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/LiO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/MazumderB16, author = {Mark Mazumder and Timothy M. Braje}, title = {Safe Client/Server Web Development with Haskell}, booktitle = {{IEEE} Cybersecurity Development, SecDev 2016, Boston, MA, USA, November 3-4, 2016}, pages = {150}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SecDev.2016.040}, doi = {10.1109/SECDEV.2016.040}, timestamp = {Fri, 11 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/MazumderB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/McCorkle16, author = {Eric L. McCorkle}, title = {A Case for Combining Industrial Pragmatics with Formal Methods}, booktitle = {{IEEE} Cybersecurity Development, SecDev 2016, Boston, MA, USA, November 3-4, 2016}, pages = {63--64}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SecDev.2016.021}, doi = {10.1109/SECDEV.2016.021}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/McCorkle16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/McCutchenSCQ16, author = {Matt McCutchen and Daniel Song and Shuo Chen and Shaz Qadeer}, title = {Self-Verifying Execution (Position Paper)}, booktitle = {{IEEE} Cybersecurity Development, SecDev 2016, Boston, MA, USA, November 3-4, 2016}, pages = {117--123}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SecDev.2016.035}, doi = {10.1109/SECDEV.2016.035}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secdev/McCutchenSCQ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/MomotBHP16, author = {Falcon Momot and Sergey Bratus and Sven M. Hallberg and Meredith L. Patterson}, title = {The Seven Turrets of Babel: {A} Taxonomy of LangSec Errors and How to Expunge Them}, booktitle = {{IEEE} Cybersecurity Development, SecDev 2016, Boston, MA, USA, November 3-4, 2016}, pages = {45--52}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SecDev.2016.019}, doi = {10.1109/SECDEV.2016.019}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/MomotBHP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/MoyerCCSSBBCJC16, author = {Thomas Moyer and Karishma Chadha and Robert K. Cunningham and Nabil Schear and Warren Smith and Adam Bates and Kevin R. B. Butler and Frank Capobianco and Trent Jaeger and Patrick T. Cable II}, title = {Leveraging Data Provenance to Enhance Cyber Resilience}, booktitle = {{IEEE} Cybersecurity Development, SecDev 2016, Boston, MA, USA, November 3-4, 2016}, pages = {107--114}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SecDev.2016.034}, doi = {10.1109/SECDEV.2016.034}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secdev/MoyerCCSSBBCJC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/Murthy16, author = {Nivedita Murthy}, title = {Codiscope SecureAssist{\texttrademark} - The Developer's Security Assistant}, booktitle = {{IEEE} Cybersecurity Development, SecDev 2016, Boston, MA, USA, November 3-4, 2016}, pages = {162}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SecDev.2016.046}, doi = {10.1109/SECDEV.2016.046}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/Murthy16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/NordO16, author = {Robert L. Nord and Ipek Ozkaya}, title = {Software Vulnerabilities, Defects, and Design Flaws: {A} Technical Debt Perspective}, booktitle = {{IEEE} Cybersecurity Development, SecDev 2016, Boston, MA, USA, November 3-4, 2016}, pages = {165}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SecDev.2016.047}, doi = {10.1109/SECDEV.2016.047}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secdev/NordO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/OpreaTNK16, author = {Alina Oprea and Ata Turk and Cristina Nita{-}Rotaru and Orran Krieger}, title = {{MOSAIC:} {A} Platform for Monitoring and Security Analytics in Public Clouds}, booktitle = {{IEEE} Cybersecurity Development, SecDev 2016, Boston, MA, USA, November 3-4, 2016}, pages = {69--70}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SecDev.2016.025}, doi = {10.1109/SECDEV.2016.025}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/OpreaTNK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/PfretzschnerO16, author = {Brian Pfretzschner and Lotfi Ben Othmane}, title = {Dependency-Based Attacks on Node.js}, booktitle = {{IEEE} Cybersecurity Development, SecDev 2016, Boston, MA, USA, November 3-4, 2016}, pages = {66}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SecDev.2016.023}, doi = {10.1109/SECDEV.2016.023}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/PfretzschnerO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/PiessensDMS16, author = {Frank Piessens and Dominique Devriese and Jan Tobias M{\"{u}}hlberg and Raoul Strackx}, title = {Security Guarantees for the Execution Infrastructure of Software Applications}, booktitle = {{IEEE} Cybersecurity Development, SecDev 2016, Boston, MA, USA, November 3-4, 2016}, pages = {81--87}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SecDev.2016.030}, doi = {10.1109/SECDEV.2016.030}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secdev/PiessensDMS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/Pike16, author = {Lee Pike}, title = {Hints for High-Assurance Cyber-Physical System Design}, booktitle = {{IEEE} Cybersecurity Development, SecDev 2016, Boston, MA, USA, November 3-4, 2016}, pages = {25--29}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SecDev.2016.016}, doi = {10.1109/SECDEV.2016.016}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/Pike16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/RahmatiFP16, author = {Amir Rahmati and Earlence Fernandes and Atul Prakash}, title = {Applying the Opacified Computation Model to Enforce Information Flow Policies in IoT Applications}, booktitle = {{IEEE} Cybersecurity Development, SecDev 2016, Boston, MA, USA, November 3-4, 2016}, pages = {88--93}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SecDev.2016.031}, doi = {10.1109/SECDEV.2016.031}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secdev/RahmatiFP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/Seghir0M16, author = {Mohamed Nassim Seghir and David Aspinall and Lenka Marekov{\'{a}}}, title = {Certified Lightweight Contextual Policies for Android}, booktitle = {{IEEE} Cybersecurity Development, SecDev 2016, Boston, MA, USA, November 3-4, 2016}, pages = {94--100}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SecDev.2016.032}, doi = {10.1109/SECDEV.2016.032}, timestamp = {Thu, 08 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secdev/Seghir0M16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/Serebryany16, author = {Kosta Serebryany}, title = {Continuous Fuzzing with libFuzzer and AddressSanitizer}, booktitle = {{IEEE} Cybersecurity Development, SecDev 2016, Boston, MA, USA, November 3-4, 2016}, pages = {157}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SecDev.2016.043}, doi = {10.1109/SECDEV.2016.043}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/Serebryany16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/Svoboda16, author = {David Svoboda}, title = {Beyond errno: Error Handling in "C"}, booktitle = {{IEEE} Cybersecurity Development, SecDev 2016, Boston, MA, USA, November 3-4, 2016}, pages = {161}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SecDev.2016.045}, doi = {10.1109/SECDEV.2016.045}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/Svoboda16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/SvobodaFS16, author = {David Svoboda and Lori Flynn and Will Snavely}, title = {Static Analysis Alert Audits: Lexicon {\&} Rules}, booktitle = {{IEEE} Cybersecurity Development, SecDev 2016, Boston, MA, USA, November 3-4, 2016}, pages = {37--44}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SecDev.2016.018}, doi = {10.1109/SECDEV.2016.018}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/SvobodaFS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/TaleleMCJT16, author = {Nirupama Talele and Divya Muthukumaran and Frank Capobianco and Trent Jaeger and Gang Tan}, title = {Maintaining Authorization Hook Placements Across Program Versions}, booktitle = {{IEEE} Cybersecurity Development, SecDev 2016, Boston, MA, USA, November 3-4, 2016}, pages = {67--68}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SecDev.2016.024}, doi = {10.1109/SECDEV.2016.024}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/TaleleMCJT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/TangZ16, author = {Yuzhe Tang and Wenqing Zhuang}, title = {Towards Building Practical Secure Multi-party Databases}, booktitle = {{IEEE} Cybersecurity Development, SecDev 2016, Boston, MA, USA, November 3-4, 2016}, pages = {77--78}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SecDev.2016.029}, doi = {10.1109/SECDEV.2016.029}, timestamp = {Thu, 16 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/TangZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/Vitek16, author = {David Vitek}, title = {Auditing Code for Security Vulnerabilities with CodeSonar}, booktitle = {{IEEE} Cybersecurity Development, SecDev 2016, Boston, MA, USA, November 3-4, 2016}, pages = {154}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SecDev.2016.042}, doi = {10.1109/SECDEV.2016.042}, timestamp = {Thu, 16 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/Vitek16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/WeichselbaumSJ16, author = {Lukas Weichselbaum and Michele Spagnuolo and Artur Janc}, title = {Adopting Strict Content Security Policy for {XSS} Protection}, booktitle = {{IEEE} Cybersecurity Development, SecDev 2016, Boston, MA, USA, November 3-4, 2016}, pages = {149}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SecDev.2016.039}, doi = {10.1109/SECDEV.2016.039}, timestamp = {Thu, 16 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/WeichselbaumSJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/YasarK16, author = {Hasan Yasar and Kiriakos Kontostathis}, title = {Secure DevOps Process and Implementation}, booktitle = {{IEEE} Cybersecurity Development, SecDev 2016, Boston, MA, USA, November 3-4, 2016}, pages = {166}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SecDev.2016.048}, doi = {10.1109/SECDEV.2016.048}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/YasarK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/secdev/2016, title = {{IEEE} Cybersecurity Development, SecDev 2016, Boston, MA, USA, November 3-4, 2016}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://ieeexplore.ieee.org/xpl/conhome/7838558/proceeding}, isbn = {978-1-5090-5589-0}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secdev/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.