


default search action
SecDev 2022: Atlanta, GA, USA
- IEEE Secure Development Conference, SecDev 2022, Atlanta, GA, USA, October 18-20, 2022. IEEE 2022, ISBN 978-1-6654-7182-4

- John Criswell, Ethan Johnson, Colin Pronovost:

Tutorial: LLVM for Security Practitioners. 1-2 - Jens-Rene Giesen, Sébastien Andreina, Michael Rodler, Ghassan O. Karame, Lucas Davi:

Tutorial: Analyzing, Exploiting, and Patching Smart Contracts in Ethereum. 3-4 - Lotfi Ben Othmane, Heinrich Gantenbein, Hasan Yasar, Simone Curzi, Altaz Valani, Arun Prabhakar, Robert Cuddy:

Tutorial: Threat Modeling of Cloud-based Solutions. 5-6 - Goran Piskachev, Stefan Dziwok, Thorsten Koch, Sven Merschjohann, Eric Bodden:

How far are German companies in improving security through static program analysis tools? 7-15 - Douglas Everson, Ashish Bastola, Rajat Mittal, Siddheshwar Munde, Long Cheng:

A Comparative Study of Log4Sheil Test Tools. 16-22 - Emmanouil Gionanidis, Petros S. Karvelis, George K. Georgoulas, Konstantinos Stamos, Purvi Garg:

Evaluating Text Augmentation for Boosting the Automatic Mapping of Vulnerability Information to Adversary Techniques. 23-29 - Setareh Ghorshi, Lachlan J. Gunn, Hans Liljestrand, N. Asokan

:
Towards cryptographically-authenticated in-memory data structures. 30-44 - Tobias Cloosters, Sebastian Surminski, Gerrit Sangel, Lucas Davi:

Salsa: SGX Attestation for Live Streaming Applications. 45-51 - Kaled M. Alshmrany

, Ahmed Bhayat
, Franz Brauße
, Lucas C. Cordeiro
, Konstantin Korovin
, Tom Melham
, Mustafa A. Mustafa
, Pierre Olivier
, Giles Reger
, Fedor Shmarov
:
Position Paper: Towards a Hybrid Approach to Protect Against Memory Safety Vulnerabilities. 52-58 - Kelly Shortridge

:
From Lemons to Peaches: Improving Security ROI through Security Chaos Engineering. 59-60 - Ya Xiao, Yang Zhao, Nicholas Allen, Nathan Keynes, Danfeng Yao, Cristina Cifuentes:

Industrial Strength Static Detection for Cryptographic API Misuses. 61-62 - Kanchanjot Kaur Phokela, Kapil Singi, Kuntal Dey, Vikrant Kaulgud, Adam P. Burden:

Framework to Assess Policy Driven Security Misconfiguration Risks in Cloud Native Application. 63-64 - Pranshu Bajpai

, Adam Lewis:
Secure Development Workflows in CI/CD Pipelines. 65-66 - Jack B. Harrison, Joseph R. Harrison

, Madison G. Boswell, Alan J. Michaels:
A Hierarchical Database of One Million Websites. 67-68 - Setu Kumar Basak

, Lorenzo Neil, Bradley Reaves, Laurie A. Williams:
What are the Practices for Secret Management in Software Artifacts? 69-76 - Md Mahir Asef Kabir, Ying Wang, Danfeng Yao, Na Meng:

How Do Developers Follow Security-Relevant Best Practices When Using NPM Packages? 77-83 - Zhenpeng Shi

, Nikolay Matyunin, Kalman Graffi
, David Starobinski:
Uncovering Product Vulnerabilities with Threat Knowledge Graphs. 84-90 - Carmen Cheh

, Nicholas Tay, Binbin Chen
:
Design and User Study of a Constraint-based Framework for Business Logic Flaw Discovery. 91-99

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














