Login / Signup
SecDev
2016
2019
2023
2016
2023
Keyphrases
Publications
2023
Timothée Riom
,
Alexandre Bartel
An In-Depth Analysis of Android's Java Class Library: its Evolution and Security Impact.
SecDev
(2023)
Justin Tracey
,
Ian Goldberg
Grading on a Curve: How Rust can Facilitate New Contributors while Decreasing Vulnerabilities.
SecDev
(2023)
Michal Kepkowski
,
Maciej Machulak
,
Ian D. Wood
,
Dali Kaafar
Challenges with Passwordless FIDO2 in an Enterprise Setting: A Usability Study.
SecDev
(2023)
Merve Gülmez
,
Thomas Nyman
,
Christoph Baumann
,
Jan Tobias Mühlberg
Friend or Foe Inside? Exploring In-Process Isolation to Maintain Memory Safety for Unsafe Rust.
SecDev
(2023)
Rasha Kashef
,
Monika Freunek
,
Jeff Schwartzentruber
,
Reza Samavi
,
Burcu Bulgurcu
,
A. J. Khan
,
Marcus Santos
Bridging the Bubbles: Connecting Academia and Industry in Cybersecurity Research.
SecDev
(2023)
Eric Bond
,
Matthew Heimerdinger
Curbing the Vulnerable Parser: Graded Modal Guardrails for Secure Input Handling.
SecDev
(2023)
Sunil Joshi
,
Kenneth G. Crowther
,
Jarvis Robinson
Adaptive Security: Certificate and Key Rotation for Firmware Integrity.
SecDev
(2023)
Stefan Krüger
,
Michael Reif
,
Anna-Katharina Wickert
,
Sarah Nadi
,
Karim Ali
,
Eric Bodden
,
Yasemin Acar
,
Mira Mezini
,
Sascha Fahl
Securing Your Crypto-API Usage Through Tool Support - A Usability Study.
SecDev
(2023)
Yu Tsung Lee
,
Rahul George
,
Haining Chen
,
Kevin Chan
,
Trent Jaeger
Triaging Android Systems Using Bayesian Attack Graphs.
SecDev
(2023)
Alexander Senier
Tutorial: The End of Binary Protocol Parser Vulnerabilities : Using RecordFlux and SPARK to implement formally-verified binary formats and communication protocols.
SecDev
(2023)
Wenjia Song
,
Arianna Schuler Scott
Tutorial: Crypto-Ransomware: Analysis, Defense, and Criminal Negotiation.
SecDev
(2023)
Yuvaraj Madheswaran
11 things about Securing Microservice.
SecDev
(2023)
Muhammad Hassan
,
Talha Tahir
,
Muhammad Farrukh
,
Abdullah Naveed
,
Anas Naeem
,
Fareed Zaffar
,
Fahad Shaon
,
Ashish Gehani
,
Sazzadur Rahaman
Evaluating Container Debloaters.
SecDev
(2023)
IEEE Secure Development Conference, SecDev 2023, Atlanta, GA, USA, October 18-20, 2023
SecDev
(2023)
Ramyapandian Vijayakanthan
,
Karley M. Waguespack
,
Irfan Ahmed
,
Aisha I. Ali-Gombe
Fortifying IoT Devices: AI-Driven Intrusion Detection via Memory-Encoded Audio Signals.
SecDev
(2023)
Hanyang Hu
,
Yani Bu
,
Kristen Wong
,
Gaurav Sood
,
Karen Smiley
,
Akond Rahman
Characterizing Static Analysis Alerts for Terraform Manifests: An Experience Report.
SecDev
(2023)
Sinnott Murphy
,
Richard Macwan
,
Vivek Kumar Singh
,
Chin-Yao Chang
A randomization-based, zero-trust cyberattack detection method for hierarchical systems.
SecDev
(2023)
Pranshu Bajpai
,
Raghudeep Kannavara
Misplaced Trust: The Security Flaw in Modern Code Signing Process.
SecDev
(2023)
Charles Weir
,
Anna Dyson
,
Daniel Prince
A Lot Less Likely Than I Thought: Introducing Evidence-Based Security Risk Assessment for Healthcare Software.
SecDev
(2023)
Omid Mirzamohammadi
,
Kristof Jannes
,
Laurens Sion
,
Dimitri Van Landuyt
,
Aysajan Abidin
,
Dave Singelée
Security and Privacy Threat Analysis for Solid.
SecDev
(2023)
Mingxuan Yao
,
Jonathan Fuller
,
Ranjita Pai Sridhar
,
Saumya Agarwal
,
Amit Kumar Sikder
,
Brendan Saltaformaggio
Invited Tutorial: Counteracting Web Application Abuse in Malware.
SecDev
(2023)
Kaiming Huang
,
Jack Sampson
,
Trent Jaeger
Assessing the Impact of Efficiently Protecting Ten Million Stack Objects from Memory Errors Comprehensively.
SecDev
(2023)
Mert D. Pesé
,
Jay W. Schauer
,
Murali Mohan
,
Cassandra Joseph
,
Kang G. Shin
,
John Moore
PRICAR: Privacy Framework for Vehicular Data Sharing with Third Parties.
SecDev
(2023)
Hussain M. J. Almohri
,
Layne T. Watson
Model-Agnostic Federated Learning for Privacy-Preserving Systems.
SecDev
(2023)
Denley Lam
,
Letitia W. Li
,
Anthony Gabrielson
Parser Weakness Enumeration: Definition and Preliminary Assessment.
SecDev
(2023)
Muaz Ali
,
Rumaisa Habib
,
Ashish Gehani
,
Sazzadur Rahaman
,
Zartash Afzal Uzmi
BLADE: Towards Scalable Source Code Debloating.
SecDev
(2023)
2022
Kaled M. Alshmrany
,
Ahmed Bhayat
,
Franz Brauße
,
Lucas C. Cordeiro
,
Konstantin Korovin
,
Tom Melham
,
Mustafa A. Mustafa
,
Pierre Olivier
,
Giles Reger
,
Fedor Shmarov
Position Paper: Towards a Hybrid Approach to Protect Against Memory Safety Vulnerabilities.
SecDev
(2022)
Kanchanjot Kaur Phokela
,
Kapil Singi
,
Kuntal Dey
,
Vikrant Kaulgud
,
Adam P. Burden
Framework to Assess Policy Driven Security Misconfiguration Risks in Cloud Native Application.
SecDev
(2022)
Pranshu Bajpai
,
Adam Lewis
Secure Development Workflows in CI/CD Pipelines.
SecDev
(2022)
Tobias Cloosters
,
Sebastian Surminski
,
Gerrit Sangel
,
Lucas Davi
Salsa: SGX Attestation for Live Streaming Applications.
SecDev
(2022)
Zhenpeng Shi
,
Nikolay Matyunin
,
Kalman Graffi
,
David Starobinski
Uncovering Product Vulnerabilities with Threat Knowledge Graphs.
SecDev
(2022)
Setu Kumar Basak
,
Lorenzo Neil
,
Bradley Reaves
,
Laurie A. Williams
What are the Practices for Secret Management in Software Artifacts?
SecDev
(2022)
Kelly Shortridge
From Lemons to Peaches: Improving Security ROI through Security Chaos Engineering.
SecDev
(2022)
Douglas Everson
,
Ashish Bastola
,
Rajat Mittal
,
Siddheshwar Munde
,
Long Cheng
A Comparative Study of Log4Sheil Test Tools.
SecDev
(2022)
Goran Piskachev
,
Stefan Dziwok
,
Thorsten Koch
,
Sven Merschjohann
,
Eric Bodden
How far are German companies in improving security through static program analysis tools?
SecDev
(2022)
Emmanouil Gionanidis
,
Petros S. Karvelis
,
George K. Georgoulas
,
Konstantinos Stamos
,
Purvi Garg
Evaluating Text Augmentation for Boosting the Automatic Mapping of Vulnerability Information to Adversary Techniques.
SecDev
(2022)
Md Mahir Asef Kabir
,
Ying Wang
,
Danfeng Yao
,
Na Meng
How Do Developers Follow Security-Relevant Best Practices When Using NPM Packages?
SecDev
(2022)
Setareh Ghorshi
,
Lachlan J. Gunn
,
Hans Liljestrand
,
N. Asokan
Towards cryptographically-authenticated in-memory data structures.
SecDev
(2022)
Jens-Rene Giesen
,
Sébastien Andreina
,
Michael Rodler
,
Ghassan O. Karame
,
Lucas Davi
Tutorial: Analyzing, Exploiting, and Patching Smart Contracts in Ethereum.
SecDev
(2022)
Carmen Cheh
,
Nicholas Tay
,
Binbin Chen
Design and User Study of a Constraint-based Framework for Business Logic Flaw Discovery.
SecDev
(2022)
John Criswell
,
Ethan Johnson
,
Colin Pronovost
Tutorial: LLVM for Security Practitioners.
SecDev
(2022)
Lotfi Ben Othmane
,
Heinrich Gantenbein
,
Hasan Yasar
,
Simone Curzi
,
Altaz Valani
,
Arun Prabhakar
,
Robert Cuddy
Tutorial: Threat Modeling of Cloud-based Solutions.
SecDev
(2022)
IEEE Secure Development Conference, SecDev 2022, Atlanta, GA, USA, October 18-20, 2022
SecDev
(2022)
Jack B. Harrison
,
Joseph R. Harrison
,
Madison G. Boswell
,
Alan J. Michaels
A Hierarchical Database of One Million Websites.
SecDev
(2022)
Ya Xiao
,
Yang Zhao
,
Nicholas Allen
,
Nathan Keynes
,
Danfeng Yao
,
Cristina Cifuentes
Industrial Strength Static Detection for Cryptographic API Misuses.
SecDev
(2022)
2021
Jason Lowdermilk
,
Simha Sethumadhavan
Towards Zero Trust: An Experience Report.
SecDev
(2021)
Shravan Narayan
,
Craig Disselkoen
,
Deian Stefan
Tutorial: Sandboxing (unsafe) C code with RLBox.
SecDev
(2021)
David Lee
,
Brandon Steed
,
Yi Liu
,
Onyeka Ezenwoye
Tutorial: A Lightweight Web Application for Software Vulnerability Demonstration.
SecDev
(2021)
Douglas Everson
,
Long Cheng
Compressing Network Attack Surfaces for Practical Security Analysis.
SecDev
(2021)
Laurens Sion
,
Dimitri Van Landuyt
,
Koen Yskout
,
Stef Verreydt
,
Wouter Joosen
Automated Threat Analysis and Management in a Continuous Integration Pipeline.
SecDev
(2021)