


default search action
SecDev 2024: Pittsburgh, PA, USA
- IEEE Secure Development Conference, SecDev 2024, Pittsburgh, PA, USA, October 7-9, 2024. IEEE 2024, ISBN 979-8-3503-9193-0

- Thomas Lavaur, Déborah Conforto Nedelmann, Corentin Chauffaut, Jérôme Lacan, Caroline P. C. Chanel:

Verifiable Multi-Agent Multi-Task Assignment. 1-12 - Simon Schneider, Ananya Saha, Emanuele Mezzi

, Katja Tuma
, Riccardo Scandariato:
Designing Secure AI-based Systems: a Multi-Vocal Literature Review. 13-19 - En Low, Carmen Cheh, Binbin Chen:

Repairing Infrastructure-as-Code using Large Language Models. 20-27 - Arjun E. R. R, Pavan Kulkarni, Yuvaraj Govindarajulu, Harshit Shah, Manojkumar Parmar:

Evasion Attacks on Object Detection Models using Attack Transferability. 28-34 - Dimitri Van Landuyt

, Laurens Sion
, Walewein Philips, Wouter Joosen:
From automation to CI/CD: a comparative evaluation of threat modeling tools. 35-45 - Hossam ElAtali, Xiaohe Duan, Hans Liljestrand, Meng Xu, N. Asokan:

BliMe Linter. 46-53 - Diane B. Stephens, Kawkab Aldoshan, Mustakimur Rahman Khandaker:

Understanding the Challenges in Detecting Vulnerabilities of Rust Applications. 54-63 - Sideeq Bello, Babangida Bappah, Nicholas R. Tanet, Arabelle S. Betzwieser, Aisha I. Ali-Gombe

:
User Privacy in the Digital Playground: An In-Depth Investigation of Facebook Instant Games. 64-75 - Mahbub Alam, Siwei Zhang, Eric Rodriguez, Akib Nafis, Endadul Hoque

:
iConPAL: LLM-guided Policy Authoring Assistant for Configuring IoT Defenses. 76-92 - Partha Das Chowdhury, Mohammad Tahaei, Matthew Edwards

, Claudia Peersman, Lata Nautiyal, Kopo Marvin Ramokapane
, Awais Rashid
:
Community Security Champions: Studying the Most Influential Users on Security Stack Exchange. 93-104 - Marcus Birgersson, Cyrille Artho, Musard Balliu:

Sharing without Showing: Secure Cloud Analytics with Trusted Execution Environments. 105-116 - Matías F. Gobbi

, Johannes Kinder:
GENIE: Guarding the npm Ecosystem with Semantic Malware Detection. 117-128 - Biniyam Mengist Tiruye, Lauren Biernacki

, Tersiteab Adem, Petros Mola, Todd M. Austin:
Octal: Efficient Automatic Data-Oblivious Program Transformations to Eliminate Side-Channel Leakage. 129-139 - Md Rabbi Alam, Jinpeng Wei, Md Sajidul Islam Sajid

, Qingyang Wang, Chenglong Fu:
Moving from the Developer Machine to IoT Devices: An Empirical Study. 140-152 - Sabine Houy, Alexandre Bartel:

Lessons Learned and Challenges of Deploying Control Flow Integrity in Complex Software: the Case of OpenJDK's Java Virtual Machine. 153-165 - Isaac Richter, Jie Zhou, John Criswell

:
DeTRAP: RISC-V Return Address Protection With Debug Triggers. 166-177 - Timothy Fraser, Xuwei Liu, Qingkai Shi, Xiangyu Zhang, Mark Wutka, Daniel Balasubramanian

, Hao Chen, Zhong Shao:
A NAND Use Case for Cybersecurity Experiments. 178-179 - Jonathan Brossard

:
Toward Partial Proofs of Vulnerabilities. 180-182 - Rodrigo Branco, Ben Lee:

Reverse Engineering Branch Prediction Capabilities in Modern Micro-Architectures. 183-185 - Carol Woody, Scott A. Hissam:

Open Source Software (OSS) Transparency Tutorial. 186-187

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














