default search action
SecDev 2016: Boston, MA, USA
- IEEE Cybersecurity Development, SecDev 2016, Boston, MA, USA, November 3-4, 2016. IEEE Computer Society 2016, ISBN 978-1-5090-5589-0
- Yasemin Acar, Sascha Fahl, Michelle L. Mazurek:
You are Not Your Developer, Either: A Research Agenda for Usable Security and Privacy Research Beyond End Users. 3-8 - Soumya Indela, Mukul Kulkarni, Kartik Nayak, Tudor Dumitras:
Toward Semantic Cryptography APIs. 9-14 - Zhou Li, Alina Oprea:
Operational Security Log Analytics for Enterprise Breach Detection. 15-22 - Lee Pike:
Hints for High-Assurance Cyber-Physical System Design. 25-29 - Eunsuk Kang:
Design Space Exploration for Security. 30-36 - David Svoboda, Lori Flynn, Will Snavely:
Static Analysis Alert Audits: Lexicon & Rules. 37-44 - Falcon Momot, Sergey Bratus, Sven M. Hallberg, Meredith L. Patterson:
The Seven Turrets of Babel: A Taxonomy of LangSec Errors and How to Expunge Them. 45-52 - Chad Heitzenrater, Andrew Simpson:
Software Security Investment: The Right Amount of a Good Thing. 53-59 - Eric L. McCorkle:
A Case for Combining Industrial Pragmatics with Formal Methods. 63-64 - Aaron Ballman, David Svoboda:
Avoiding Insecure C++ - How to Avoid Common C++ Security Vulnerabilities. 65 - Brian Pfretzschner, Lotfi Ben Othmane:
Dependency-Based Attacks on Node.js. 66 - Nirupama Talele, Divya Muthukumaran, Frank Capobianco, Trent Jaeger, Gang Tan:
Maintaining Authorization Hook Placements Across Program Versions. 67-68 - Alina Oprea, Ata Turk, Cristina Nita-Rotaru, Orran Krieger:
MOSAIC: A Platform for Monitoring and Security Analytics in Public Clouds. 69-70 - Mable Benjamin:
Secure Coding for Real-Time Embedded Systems: Cert Run-Time Profile for Ada. 71-72 - Andrei Lapets, Nikolaj Volgushev, Azer Bestavros, Frederick Jansen, Mayank Varia:
Secure MPC for Analytics as a Web Application. 73-74 - Kyle Hogan, Noah Luther, Nabil Schear, Emily Shen, David Stott, Sophia Yakoubov, Arkady Yerukhimovich:
Secure Multiparty Computation for Cooperative Cyber Risk Assessment. 75-76 - Yuzhe Tang, Wenqing Zhuang:
Towards Building Practical Secure Multi-party Databases. 77-78 - Frank Piessens, Dominique Devriese, Jan Tobias Mühlberg, Raoul Strackx:
Security Guarantees for the Execution Infrastructure of Software Applications. 81-87 - Amir Rahmati, Earlence Fernandes, Atul Prakash:
Applying the Opacified Computation Model to Enforce Information Flow Policies in IoT Applications. 88-93 - Mohamed Nassim Seghir, David Aspinall, Lenka Mareková:
Certified Lightweight Contextual Policies for Android. 94-100 - Christoph Kerschbaumer:
Enforcing Content Security by Default within Web Browsers. 101-106 - Thomas Moyer, Karishma Chadha, Robert K. Cunningham, Nabil Schear, Warren Smith, Adam Bates, Kevin R. B. Butler, Frank Capobianco, Trent Jaeger, Patrick T. Cable II:
Leveraging Data Provenance to Enhance Cyber Resilience. 107-114 - Matt McCutchen, Daniel Song, Shuo Chen, Shaz Qadeer:
Self-Verifying Execution (Position Paper). 117-123 - Stephen Crane, Andrei Homescu, Per Larsen:
Code Randomization: Haven't We Solved This Problem Yet? 124-129 - William Klieber, Will Snavely:
Automated Code Repair Based on Inferred Specifications. 130-137 - Md. Endadul Hoque, Cristina Nita-Rotaru:
Building Robust Distributed Systems and Network Protocols by Using Adversarial Testing and Behavioral Analysis. 138-145 - Lukas Weichselbaum, Michele Spagnuolo, Artur Janc:
Adopting Strict Content Security Policy for XSS Protection. 149 - Mark Mazumder, Timothy M. Braje:
Safe Client/Server Web Development with Haskell. 150 - Bill Baloglu:
How to find and fix software vulnerabilities with coverity static analysis. 153 - David Vitek:
Auditing Code for Security Vulnerabilities with CodeSonar. 154 - Kosta Serebryany:
Continuous Fuzzing with libFuzzer and AddressSanitizer. 157 - Derek Bruening, Qin Zhao:
Using Dr. Fuzz, Dr. Memory, and Custom Dynamic Tools for Secure Development. 158 - David Svoboda:
Beyond errno: Error Handling in "C". 161 - Nivedita Murthy:
Codiscope SecureAssist™ - The Developer's Security Assistant. 162 - Robert L. Nord, Ipek Ozkaya:
Software Vulnerabilities, Defects, and Design Flaws: A Technical Debt Perspective. 165 - Hasan Yasar, Kiriakos Kontostathis:
Secure DevOps Process and Implementation. 166
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.