![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
SecDev 2021: Atlanta, GA, USA
- IEEE Secure Development Conference, SecDev 2021, Atlanta, GA, USA, October 18-20, 2021. IEEE 2021, ISBN 978-1-6654-3170-5
- Ina Schaefer, Tobias Runge, Loek Cleophas, Bruce W. Watson:
Tutorial: The Correctness-by-Construction Approach to Programming Using CorC. 1-2 - Salman Ahmed, Long Cheng, Hans Liljestrand, N. Asokan, Danfeng Daphne Yao:
Tutorial: Investigating Advanced Exploits for System Security Assurance. 3-4 - David Lee, Brandon Steed, Yi Liu
, Onyeka Ezenwoye:
Tutorial: A Lightweight Web Application for Software Vulnerability Demonstration. 5-6 - David Svoboda:
Hands-on Tutorial: How Exploitable is Insecure C Code? 7-8 - John Criswell, Ethan Johnson, Colin Pronovost:
Tutorial: LLVM for Security Practitioners. 9-10 - Shravan Narayan, Craig Disselkoen, Deian Stefan:
Tutorial: Sandboxing (unsafe) C code with RLBox. 11-12 - Jie Zhou, Michael Hicks, Yudi Yang, John Criswell:
Tutorial: Making C Programs Safer with Checked C. 13-14 - Carmen Cheh, Binbin Chen
:
Analyzing OpenAPI Specifications for Security Design Issues. 15-22 - Douglas Everson, Long Cheng:
Compressing Network Attack Surfaces for Practical Security Analysis. 23-29 - Laurens Sion, Dimitri Van Landuyt
, Koen Yskout
, Stef Verreydt, Wouter Joosen:
Automated Threat Analysis and Management in a Continuous Integration Pipeline. 30-37 - Michael Reeves, Dave Jing Tian, Antonio Bianchi, Z. Berkay Celik:
Towards Improving Container Security by Preventing Runtime Escapes. 38-46 - Partha Das Chowdhury, Joseph Hallett, Nikhil Patnaik, Mohammad Tahaei
, Awais Rashid
:
Developers Are Neither Enemies Nor Users: They Are Collaborators. 47-55 - Akond Rahman
, Farhat Lamia Barsha
, Patrick Morrison:
Shhh!: 12 Practices for Secret Management in Infrastructure as Code. 56-62 - Sungmin Lee, Yoonkyo Jung, Jaehyun Lee, Byoungyoung Lee, Ted "Taekyoung" Kwon:
Android Remote Unlocking Service using Synthetic Password: A Hardware Security-preserving Approach. 63-70 - Aditya Oak, Amir M. Ahmadian, Musard Balliu, Guido Salvaneschi
:
Enclave-Based Secure Programming with JE. 71-78 - Jason Lowdermilk, Simha Sethumadhavan:
Towards Zero Trust: An Experience Report. 79-85 - Guillaume Cluzel, Kyriakos Georgiou, Yannick Moy, Clément Zeller:
Layered Formal Verification of a TCP Stack. 86-93 - Rodothea-Myrsini Tsoupidi
, Musard Balliu, Benoit Baudry:
Vivienne: Relational Verification of Cryptographic Implementations in WebAssembly. 94-102
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.