Search dblp for Publications

export results for "toc:db/conf/secdev/secdev2017.bht:"

 download as .bib file

@inproceedings{DBLP:conf/secdev/AcarSWWMF17,
  author       = {Yasemin Acar and
                  Christian Stransky and
                  Dominik Wermke and
                  Charles Weir and
                  Michelle L. Mazurek and
                  Sascha Fahl},
  title        = {Developers Need Support, Too: {A} Survey of Security Advice for Software
                  Developers},
  booktitle    = {{IEEE} Cybersecurity Development, SecDev 2017, Cambridge, MA, USA,
                  September 24-26, 2017},
  pages        = {22--26},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/SecDev.2017.17},
  doi          = {10.1109/SECDEV.2017.17},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/AcarSWWMF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/AnantharamanMBP17,
  author       = {Prashant Anantharaman and
                  Michael C. Millian and
                  Sergey Bratus and
                  Meredith L. Patterson},
  title        = {Input Handling Done Right: Building Hardened Parsers Using Language-Theoretic
                  Security},
  booktitle    = {{IEEE} Cybersecurity Development, SecDev 2017, Cambridge, MA, USA,
                  September 24-26, 2017},
  pages        = {4--5},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/SecDev.2017.12},
  doi          = {10.1109/SECDEV.2017.12},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/AnantharamanMBP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/CarlstenSWKC17,
  author       = {Nadia Carlsten and
                  Reed Sturtevant and
                  Chris Wysopal and
                  Andreas Kuehlmann and
                  Robert K. Cunningham},
  title        = {Panel: Building a Business around Secure Development},
  booktitle    = {{IEEE} Cybersecurity Development, SecDev 2017, Cambridge, MA, USA,
                  September 24-26, 2017},
  pages        = {xiii--xiv},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/SecDev.2017.9},
  doi          = {10.1109/SECDEV.2017.9},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/CarlstenSWKC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/CauligiSBJHJS17,
  author       = {Sunjay Cauligi and
                  Gary Soeller and
                  Fraser Brown and
                  Brian Johannesmeyer and
                  Yunlu Huang and
                  Ranjit Jhala and
                  Deian Stefan},
  title        = {FaCT: {A} Flexible, Constant-Time Programming Language},
  booktitle    = {{IEEE} Cybersecurity Development, SecDev 2017, Cambridge, MA, USA,
                  September 24-26, 2017},
  pages        = {69--76},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/SecDev.2017.24},
  doi          = {10.1109/SECDEV.2017.24},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/CauligiSBJHJS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/DharseeJC17,
  author       = {Komail Dharsee and
                  Ethan Johnson and
                  John Criswell},
  title        = {A Software Solution for Hardware Vulnerabilities},
  booktitle    = {{IEEE} Cybersecurity Development, SecDev 2017, Cambridge, MA, USA,
                  September 24-26, 2017},
  pages        = {27--33},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/SecDev.2017.18},
  doi          = {10.1109/SECDEV.2017.18},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/DharseeJC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/DurandBC17,
  author       = {Gustavo Durand and
                  Michael Bar{-}Sinai and
                  Merc{\`{e}} Crosas},
  title        = {Securing Dataverse with an Adapted Command Design Pattern},
  booktitle    = {{IEEE} Cybersecurity Development, SecDev 2017, Cambridge, MA, USA,
                  September 24-26, 2017},
  pages        = {54--60},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/SecDev.2017.22},
  doi          = {10.1109/SECDEV.2017.22},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/DurandBC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/EdwardsKI17,
  author       = {Jesse Edwards and
                  Ameer Kashani and
                  Gopalakrishnan Iyer},
  title        = {Evaluation of Software Vulnerabilities in Vehicle Electronic Control
                  Units},
  booktitle    = {{IEEE} Cybersecurity Development, SecDev 2017, Cambridge, MA, USA,
                  September 24-26, 2017},
  pages        = {83--84},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/SecDev.2017.26},
  doi          = {10.1109/SECDEV.2017.26},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/EdwardsKI17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/FlynnSS17,
  author       = {Lori Flynn and
                  David Svoboda and
                  William Snavely},
  title        = {Hands-On Tutorial: Auditing Static Analysis Alerts Using a Lexicon
                  {\&} Rules},
  booktitle    = {{IEEE} Cybersecurity Development, SecDev 2017, Cambridge, MA, USA,
                  September 24-26, 2017},
  pages        = {1--2},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/SecDev.2017.10},
  doi          = {10.1109/SECDEV.2017.10},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/FlynnSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/GanzP17,
  author       = {Jonathan Ganz and
                  Sean Peisert},
  title        = {{ASLR:} How Robust Is the Randomness?},
  booktitle    = {{IEEE} Cybersecurity Development, SecDev 2017, Cambridge, MA, USA,
                  September 24-26, 2017},
  pages        = {34--41},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/SecDev.2017.19},
  doi          = {10.1109/SECDEV.2017.19},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/GanzP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/KannavaraGFC17,
  author       = {Raghudeep Kannavara and
                  Gilad Gressel and
                  Damilare Fagbemi and
                  Richard Chow},
  title        = {A Machine Learning Approach to {SDL}},
  booktitle    = {{IEEE} Cybersecurity Development, SecDev 2017, Cambridge, MA, USA,
                  September 24-26, 2017},
  pages        = {10--15},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/SecDev.2017.15},
  doi          = {10.1109/SECDEV.2017.15},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/KannavaraGFC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/Kupsch17,
  author       = {James A. Kupsch},
  title        = {Automated Assessment Tools and the Software Assurance Marketplace
                  {(SWAMP)}},
  booktitle    = {{IEEE} Cybersecurity Development, SecDev 2017, Cambridge, MA, USA,
                  September 24-26, 2017},
  pages        = {3},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/SecDev.2017.11},
  doi          = {10.1109/SECDEV.2017.11},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/Kupsch17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/RahamanY17,
  author       = {Sazzadur Rahaman and
                  Danfeng Yao},
  title        = {Program Analysis of Cryptographic Implementations for Security},
  booktitle    = {{IEEE} Cybersecurity Development, SecDev 2017, Cambridge, MA, USA,
                  September 24-26, 2017},
  pages        = {61--68},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/SecDev.2017.23},
  doi          = {10.1109/SECDEV.2017.23},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/RahamanY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/RoseFGMP17,
  author       = {Isis Rose and
                  Nicholas Felts and
                  Alexander George and
                  Emily Miller and
                  Max Planck},
  title        = {Something Is Better Than Everything: {A} Distributed Approach to Audit
                  Log Anomaly Detection},
  booktitle    = {{IEEE} Cybersecurity Development, SecDev 2017, Cambridge, MA, USA,
                  September 24-26, 2017},
  pages        = {77--82},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/SecDev.2017.25},
  doi          = {10.1109/SECDEV.2017.25},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/RoseFGMP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/RuotiSZ17,
  author       = {Scott Ruoti and
                  Kent E. Seamons and
                  Daniel Zappala},
  title        = {Layering Security at Global Control Points to Secure Unmodified Software},
  booktitle    = {{IEEE} Cybersecurity Development, SecDev 2017, Cambridge, MA, USA,
                  September 24-26, 2017},
  pages        = {42--49},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/SecDev.2017.20},
  doi          = {10.1109/SECDEV.2017.20},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/RuotiSZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/Seacord17,
  author       = {Robert C. Seacord},
  title        = {Java Deserialization Vulnerabilities and Mitigations},
  booktitle    = {{IEEE} Cybersecurity Development, SecDev 2017, Cambridge, MA, USA,
                  September 24-26, 2017},
  pages        = {6--7},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/SecDev.2017.13},
  doi          = {10.1109/SECDEV.2017.13},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/Seacord17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/WangS17,
  author       = {Fish Wang and
                  Yan Shoshitaishvili},
  title        = {Angr - The Next Generation of Binary Analysis},
  booktitle    = {{IEEE} Cybersecurity Development, SecDev 2017, Cambridge, MA, USA,
                  September 24-26, 2017},
  pages        = {8--9},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/SecDev.2017.14},
  doi          = {10.1109/SECDEV.2017.14},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/WangS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/WeberCMAS17,
  author       = {Sam Weber and
                  Michael J. Coblenz and
                  Brad A. Myers and
                  Jonathan Aldrich and
                  Joshua Sunshine},
  title        = {Empirical Studies on the Security and Usability Impact of Immutability},
  booktitle    = {{IEEE} Cybersecurity Development, SecDev 2017, Cambridge, MA, USA,
                  September 24-26, 2017},
  pages        = {50--53},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/SecDev.2017.21},
  doi          = {10.1109/SECDEV.2017.21},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/WeberCMAS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/WhitmoreT17,
  author       = {Jim Whitmore and
                  William Tobin},
  title        = {Improving Attention to Security in Software Design with Analytics
                  and Cognitive Techniques},
  booktitle    = {{IEEE} Cybersecurity Development, SecDev 2017, Cambridge, MA, USA,
                  September 24-26, 2017},
  pages        = {16--21},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/SecDev.2017.16},
  doi          = {10.1109/SECDEV.2017.16},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secdev/WhitmoreT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/WilliamsY17,
  author       = {Imano Williams and
                  Xiaohong Yuan},
  title        = {Creating Abuse Cases Based on Attack Patterns: {A} User Study},
  booktitle    = {{IEEE} Cybersecurity Development, SecDev 2017, Cambridge, MA, USA,
                  September 24-26, 2017},
  pages        = {85--86},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/SecDev.2017.27},
  doi          = {10.1109/SECDEV.2017.27},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/WilliamsY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/secdev/2017,
  title        = {{IEEE} Cybersecurity Development, SecDev 2017, Cambridge, MA, USA,
                  September 24-26, 2017},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/8071083/proceeding},
  isbn         = {978-1-5386-3467-7},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secdev/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics