


default search action
SecDev 2020: Atlanta, GA, USA
- IEEE Secure Development, SecDev 2020, Atlanta, GA, USA, September 28-30, 2020. IEEE 2020, ISBN 978-1-7281-8388-6

- John Criswell:

Tutorial: LLVM for Security Practitioners. 1 - Tuba Yavuz, Ken Yihang Bai

:
Tutorial: Detecting Memory Vulnerabilities in the Components of System Code using PROMPT. 2-3 - Stephen Magill, Thomas DuBuisson:

Tutorial: Static Analysis at Scale with Muse. 4 - Ya Xiao, Miles Frantz, Sharmin Afrose, Sazzadur Rahaman, Danfeng Daphne Yao

:
Tutorial: Principles and Practices of Secure Cryptographic Coding in Java. 5-6 - Zhuojia Shen

, Komail Dharsee, John Criswell
:
Fast Execute-Only Memory for Embedded Systems. 7-14 - Junhan Duan, Yudi Yang, Jie Zhou, John Criswell

:
Refactoring the FreeBSD Kernel with Checked C. 15-22 - Andrea Fioraldi

, Daniele Cono D'Elia
, Leonardo Querzoni
:
Fuzzing Binaries for Memory Safety Errors with QASan. 23-30 - Andrew Buttner, Richard Piazza, Rushi Purohit, Alec Summers:

A Secure Code Review Retrospective. 31-32 - Aaron Tomb, Stuart Pernsteiner, Mike Dodds:

Symbolic Testing for C and Rust. 33 - Jaime C. Acosta, Anjon Basak, Christopher Kiekintveld, Nandi Leslie, Charles A. Kamhoua:

Cybersecurity Deception Experimentation System. 34-40 - Md. Mazharul Islam, Ehab Al-Shaer:

Active Deception Framework: An Extensible Development Environment for Adaptive Cyber Deception. 41-48 - Mazharul Islam, Sazzadur Rahaman, Na Meng, Behnaz Hassanshahi, Padmanabhan Krishnan, Danfeng Daphne Yao

:
Coding Practices and Recommendations of Spring Security for Enterprise Applications. 49-57 - Md. Shazibul Islam Shamim

, Farzana Ahamed Bhuiyan, Akond Rahman
:
XI Commandments of Kubernetes Security: A Systematization of Knowledge Related to Kubernetes Security Practices. 58-64 - Shinhae Kim, Sukyoung Ryu

:
Analysis of Blockchain Smart Contracts: Techniques and Insights. 65-73 - Douglas Everson, Long Cheng:

Network Attack Surface Simplification for Red and Blue Teams. 74-80 - Thomas Rosenstatter

, Kim Strandberg, Rodi Jolak
, Riccardo Scandariato, Tomas Olovsson:
REMIND: A Framework for the Resilient Design of Automotive Systems. 81-95 - Sungkeun Kim, Farabi Mahmud

, Jiayi Huang
, Pritam Majumder, Neophytos Christou, Abdullah Muzahid, Chia-Che Tsai
, Eun Jung Kim:
ReViCe: Reusing Victim Cache to Prevent Speculative Cache Leakage. 96-107

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














