


default search action
SecDev 2019: Tysons Corner, VA, USA
- 2019 IEEE Cybersecurity Development, SecDev 2019, Tysons Corner, VA, USA, September 23-25, 2019. IEEE 2019, ISBN 978-1-5386-7289-1

Tutorials
- Benjamin M. Brosgol, Claire Dross, Yannick Moy:

Tutorial: A Practical Introduction to Formal Development and Verification of High-Assurance Software with SPARK. 1-2 - Kinan Dak Albab

, Rawane Issa, Andrei Lapets
, Peter Flockhart, Lucy Qin, Ira Globus-Harris:
Tutorial: Deploying Secure Multi-Party Computation on the Web Using JIFF. 3
Cryptography and Understanding Insecure Code
- Nicola Tuveri

, Billy Bob Brumley
:
Start Your ENGINEs: Dynamically Loadable Contemporary Crypto. 4-19 - Kyle Hogan, Hoda Maleki, Reza Rahaeimehr

, Ran Canetti, Marten van Dijk
, Jason Hennessey, Mayank Varia, Haibin Zhang:
On the Universally Composable Security of OpenStack. 20-33 - Wei Bai, Omer Akgul, Michelle L. Mazurek:

A Qualitative Investigation of Insecure Code Propagation from Online Forums. 34-48 - Sharmin Afrose, Sazzadur Rahaman, Danfeng Yao

:
CryptoAPI-Bench: A Comprehensive Benchmark on Java Cryptographic API Misuses. 49-61
Security in Lower-Levels of Abstraction
- Tuba Yavuz:

Detecting Callback Related Deep Vulnerabilities in Linux Device Drivers. 62-75 - Remo Schweizer, Stephan Neuhaus:

Downright: A Framework and Toolchain for Privilege Handling. 76-88 - Vivek V. Menon, Gaurav Kolhe, Andrew G. Schmidt, Joshua S. Monson, Matthew French, Yinghua Hu

, Peter A. Beerel, Pierluigi Nuzzo:
System-Level Framework for Logic Obfuscation with Quantified Metrics for Evaluation. 89-100
Data and Information
- Raimil Cruz, Éric Tanter:

Polymorphic Relaxed Noninterference. 101-113 - Long Cheng, Hans Liljestrand, Md. Salman Ahmed

, Thomas Nyman
, Trent Jaeger, N. Asokan
, Danfeng Yao
:
Exploitation Techniques and Defenses for Data-Oriented Attacks. 114-128 - Andrei Lapets

, Kinan Dak Albab
, Rawane Issa, Lucy Qin, Mayank Varia, Azer Bestavros, Frederick Jansen:
Role-Based Ecosystem for the Design, Development, and Deployment of Secure Multi-Party Data Analytics Applications. 129-140
Practitioner Papers
- Abhishek Pathak, Kaarthik Sivakumar, Jin Sheng, Anlu Yan, Mazhar Haque:

Effective Static Analysis Enforcement in Complex Cloud Native Dockerized Systems. 141 - Abdulrahman A. Alnaim:

Using Rules Engine in the Automation of System Security Review. 142 - Yongkui Han, Pankil Shah, Van Nguyen, Ling Ma, Richard Livingston:

OpenOSC: Open Source Object Size Checking Library With Built-in Metrics. 143 - Chien-An Chen:

With Great Abstraction Comes Great Responsibility: Sealing the Microservices Attack Surface. 144 - Abhishek Pathak, Kaarthik Sivakumar, Mazhar Haque, Prasanna Ganesan:

Multi-Cluster Visualization and Live Reporting of Static Analysis Security Testing (SAST) Warnings. 145 - Samuel Denard, Susan A. Mengel, Atila Ertas, Stephen Ekwaro-Osire

:
Development Cycle Estimation Modeling. 146
Networking
- Paul Syverson, Matthew Traudt:

Self-Authenticating Traditional Domain Names. 147-160 - Kenneth L. McMillan, Lenore D. Zuck:

Compositional Testing of Internet Protocols. 161-174

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














