


default search action
SecDev 2021: Atlanta, GA, USA
- IEEE Secure Development Conference, SecDev 2021, Atlanta, GA, USA, October 18-20, 2021. IEEE 2021, ISBN 978-1-6654-3170-5

- Ina Schaefer

, Tobias Runge, Loek Cleophas, Bruce W. Watson:
Tutorial: The Correctness-by-Construction Approach to Programming Using CorC. 1-2 - Salman Ahmed, Long Cheng, Hans Liljestrand, N. Asokan, Danfeng Daphne Yao:

Tutorial: Investigating Advanced Exploits for System Security Assurance. 3-4 - David Lee, Brandon Steed, Yi Liu

, Onyeka Ezenwoye:
Tutorial: A Lightweight Web Application for Software Vulnerability Demonstration. 5-6 - David Svoboda:

Hands-on Tutorial: How Exploitable is Insecure C Code? 7-8 - John Criswell, Ethan Johnson, Colin Pronovost:

Tutorial: LLVM for Security Practitioners. 9-10 - Shravan Narayan

, Craig Disselkoen, Deian Stefan:
Tutorial: Sandboxing (unsafe) C code with RLBox. 11-12 - Jie Zhou, Michael Hicks, Yudi Yang, John Criswell:

Tutorial: Making C Programs Safer with Checked C. 13-14 - Carmen Cheh

, Binbin Chen
:
Analyzing OpenAPI Specifications for Security Design Issues. 15-22 - Douglas Everson, Long Cheng:

Compressing Network Attack Surfaces for Practical Security Analysis. 23-29 - Laurens Sion

, Dimitri Van Landuyt
, Koen Yskout
, Stef Verreydt
, Wouter Joosen:
Automated Threat Analysis and Management in a Continuous Integration Pipeline. 30-37 - Michael Reeves, Dave Jing Tian, Antonio Bianchi, Z. Berkay Celik:

Towards Improving Container Security by Preventing Runtime Escapes. 38-46 - Partha Das Chowdhury, Joseph Hallett

, Nikhil Patnaik
, Mohammad Tahaei
, Awais Rashid
:
Developers Are Neither Enemies Nor Users: They Are Collaborators. 47-55 - Akond Rahman

, Farhat Lamia Barsha
, Patrick Morrison:
Shhh!: 12 Practices for Secret Management in Infrastructure as Code. 56-62 - Sungmin Lee, Yoonkyo Jung

, Jaehyun Lee, Byoungyoung Lee
, Ted "Taekyoung" Kwon:
Android Remote Unlocking Service using Synthetic Password: A Hardware Security-preserving Approach. 63-70 - Aditya Oak, Amir M. Ahmadian

, Musard Balliu, Guido Salvaneschi
:
Enclave-Based Secure Programming with JE. 71-78 - Jason Lowdermilk, Simha Sethumadhavan:

Towards Zero Trust: An Experience Report. 79-85 - Guillaume Cluzel, Kyriakos Georgiou, Yannick Moy, Clément Zeller:

Layered Formal Verification of a TCP Stack. 86-93 - Rodothea-Myrsini Tsoupidi

, Musard Balliu, Benoit Baudry:
Vivienne: Relational Verification of Cryptographic Implementations in WebAssembly. 94-102

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














