default search action
SecDev 2017: Cambridge, MA, USA
- IEEE Cybersecurity Development, SecDev 2017, Cambridge, MA, USA, September 24-26, 2017. IEEE Computer Society 2017, ISBN 978-1-5386-3467-7
- Nadia Carlsten, Reed Sturtevant, Chris Wysopal, Andreas Kuehlmann, Robert K. Cunningham:
Panel: Building a Business around Secure Development. xiii-xiv - Lori Flynn, David Svoboda, William Snavely:
Hands-On Tutorial: Auditing Static Analysis Alerts Using a Lexicon & Rules. 1-2 - James A. Kupsch:
Automated Assessment Tools and the Software Assurance Marketplace (SWAMP). 3 - Prashant Anantharaman, Michael C. Millian, Sergey Bratus, Meredith L. Patterson:
Input Handling Done Right: Building Hardened Parsers Using Language-Theoretic Security. 4-5 - Robert C. Seacord:
Java Deserialization Vulnerabilities and Mitigations. 6-7 - Fish Wang, Yan Shoshitaishvili:
Angr - The Next Generation of Binary Analysis. 8-9 - Jim Whitmore, William Tobin:
Improving Attention to Security in Software Design with Analytics and Cognitive Techniques. 16-21 - Yasemin Acar, Christian Stransky, Dominik Wermke, Charles Weir, Michelle L. Mazurek, Sascha Fahl:
Developers Need Support, Too: A Survey of Security Advice for Software Developers. 22-26 - Komail Dharsee, Ethan Johnson, John Criswell:
A Software Solution for Hardware Vulnerabilities. 27-33 - Jonathan Ganz, Sean Peisert:
ASLR: How Robust Is the Randomness? 34-41 - Scott Ruoti, Kent E. Seamons, Daniel Zappala:
Layering Security at Global Control Points to Secure Unmodified Software. 42-49 - Sam Weber, Michael J. Coblenz, Brad A. Myers, Jonathan Aldrich, Joshua Sunshine:
Empirical Studies on the Security and Usability Impact of Immutability. 50-53 - Gustavo Durand, Michael Bar-Sinai, Mercè Crosas:
Securing Dataverse with an Adapted Command Design Pattern. 54-60 - Sazzadur Rahaman, Danfeng Yao:
Program Analysis of Cryptographic Implementations for Security. 61-68 - Sunjay Cauligi, Gary Soeller, Fraser Brown, Brian Johannesmeyer, Yunlu Huang, Ranjit Jhala, Deian Stefan:
FaCT: A Flexible, Constant-Time Programming Language. 69-76 - Isis Rose, Nicholas Felts, Alexander George, Emily Miller, Max Planck:
Something Is Better Than Everything: A Distributed Approach to Audit Log Anomaly Detection. 77-82 - Jesse Edwards, Ameer Kashani, Gopalakrishnan Iyer:
Evaluation of Software Vulnerabilities in Vehicle Electronic Control Units. 83-84 - Imano Williams, Xiaohong Yuan:
Creating Abuse Cases Based on Attack Patterns: A User Study. 85-86
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.