


default search action
SecDev 2017: Cambridge, MA, USA
- IEEE Cybersecurity Development, SecDev 2017, Cambridge, MA, USA, September 24-26, 2017. IEEE Computer Society 2017, ISBN 978-1-5386-3467-7

- Nadia Carlsten, Reed Sturtevant, Chris Wysopal, Andreas Kuehlmann, Robert K. Cunningham:

Panel: Building a Business around Secure Development. xiii-xiv - Lori Flynn, David Svoboda, William Snavely:

Hands-On Tutorial: Auditing Static Analysis Alerts Using a Lexicon & Rules. 1-2 - James A. Kupsch:

Automated Assessment Tools and the Software Assurance Marketplace (SWAMP). 3 - Prashant Anantharaman, Michael C. Millian, Sergey Bratus, Meredith L. Patterson:

Input Handling Done Right: Building Hardened Parsers Using Language-Theoretic Security. 4-5 - Robert C. Seacord

:
Java Deserialization Vulnerabilities and Mitigations. 6-7 - Fish Wang, Yan Shoshitaishvili:

Angr - The Next Generation of Binary Analysis. 8-9 - Jim Whitmore

, William Tobin:
Improving Attention to Security in Software Design with Analytics and Cognitive Techniques. 16-21 - Yasemin Acar, Christian Stransky, Dominik Wermke, Charles Weir

, Michelle L. Mazurek, Sascha Fahl:
Developers Need Support, Too: A Survey of Security Advice for Software Developers. 22-26 - Komail Dharsee, Ethan Johnson, John Criswell

:
A Software Solution for Hardware Vulnerabilities. 27-33 - Jonathan Ganz, Sean Peisert

:
ASLR: How Robust Is the Randomness? 34-41 - Scott Ruoti

, Kent E. Seamons
, Daniel Zappala:
Layering Security at Global Control Points to Secure Unmodified Software. 42-49 - Sam Weber, Michael J. Coblenz

, Brad A. Myers, Jonathan Aldrich
, Joshua Sunshine:
Empirical Studies on the Security and Usability Impact of Immutability. 50-53 - Gustavo Durand, Michael Bar-Sinai

, Mercè Crosas:
Securing Dataverse with an Adapted Command Design Pattern. 54-60 - Sazzadur Rahaman, Danfeng Yao

:
Program Analysis of Cryptographic Implementations for Security. 61-68 - Sunjay Cauligi, Gary Soeller, Fraser Brown, Brian Johannesmeyer, Yunlu Huang, Ranjit Jhala, Deian Stefan:

FaCT: A Flexible, Constant-Time Programming Language. 69-76 - Isis Rose, Nicholas Felts, Alexander George, Emily Miller, Max Planck:

Something Is Better Than Everything: A Distributed Approach to Audit Log Anomaly Detection. 77-82 - Jesse Edwards, Ameer Kashani, Gopalakrishnan Iyer:

Evaluation of Software Vulnerabilities in Vehicle Electronic Control Units. 83-84 - Imano Williams, Xiaohong Yuan:

Creating Abuse Cases Based on Attack Patterns: A User Study. 85-86

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














