The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "SecDev"( http://dblp.L3S.de/Venues/SecDev )

URL (DBLP): http://dblp.uni-trier.de/db/conf/secdev

Publication years (Num. hits)
2016 (37) 2017 (20) 2018 (32) 2019 (21) 2020 (18) 2021 (19) 2022 (19) 2023 (26)
Publication types (Num. hits)
inproceedings(184) proceedings(8)
Venues (Conferences, Journals, ...)
SecDev(192)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 192 publication records. Showing 192 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Kinan Dak Albab, Rawane Issa, Andrei Lapets, Peter Flockhart, Lucy Qin, Ira Globus-Harris Tutorial: Deploying Secure Multi-Party Computation on the Web Using JIFF. Search on Bibsonomy SecDev The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Vivek V. Menon, Gaurav Kolhe, Andrew G. Schmidt, Joshua S. Monson, Matthew French, Yinghua Hu, Peter A. Beerel, Pierluigi Nuzzo 0002 System-Level Framework for Logic Obfuscation with Quantified Metrics for Evaluation. Search on Bibsonomy SecDev The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Remo Schweizer, Stephan Neuhaus Downright: A Framework and Toolchain for Privilege Handling. Search on Bibsonomy SecDev The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Lok K. Yan, Benjamin Price, Michael Zhivich, Brian Caswell, Christopher Eagle, Michael Frantzen, Holt Sorenson, Michael Thompson, Timothy Vidas, Jason Wright, Vernon Rivet, Samuel Colt VanWinkle, Clark Wood BP: DECREE: A Platform for Repeatable and Reproducible Security Experiments. Search on Bibsonomy SecDev The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Toby C. Murray, Paul C. van Oorschot BP: Formal Proofs, the Fine Print and Side Effects. Search on Bibsonomy SecDev The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Altaz Valani Rethinking Secure DevOps Threat Modeling: The Need for a Dual Velocity Approach. Search on Bibsonomy SecDev The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Hang Hu 0002, Peng Peng, Gang Wang 0011 Towards Understanding the Adoption of Anti-Spoofing Protocols in Email Systems. Search on Bibsonomy SecDev The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Charles Weir, Lynne Blair, Ingolf Becker, M. Angela Sasse, James Noble 0001 Light-Touch Interventions to Improve Software Development Security. Search on Bibsonomy SecDev The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Tim McBride, Anne Townsend, Michael Ekstrom, Lauren Lusty, Julian Sexton Data Integrity: Recovering from Ransomware and Other Destructive Events. Search on Bibsonomy SecDev The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ronald Gil, Hamed Okhravi, Howard E. Shrobe There's a Hole in the Bottom of the C: On the Effectiveness of Allocation Protection. Search on Bibsonomy SecDev The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Xiaoyu Hu, Jie Zhou 0022, Spyridoula Gravani, John Criswell Transforming Code to Drop Dead Privileges. Search on Bibsonomy SecDev The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1J. Sukarno Mertoguno, Ryan Craven, Daniel Koller, Matthew Mickelson Reducing Attack Surface via Executable Transformation. Search on Bibsonomy SecDev The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Danny Dhillon, Vishal Mishra Applied Threat Driven Security Verification. Search on Bibsonomy SecDev The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Mike Dodds, Stephen Magill, Aaron Tomb Tutorial: Continuous Verification of Critical Software. Search on Bibsonomy SecDev The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Raghudeep Kannavara, Jacob Vangore, William Roberts, Marcus Lindholm, Priti Shrivastav Automating Threat Intelligence for SDL. Search on Bibsonomy SecDev The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Alexander van Den Berghe, Koen Yskout, Riccardo Scandariato, Wouter Joosen A Lingua Franca for Security by Design. Search on Bibsonomy SecDev The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Allan Blanchard, Nikolai Kosmatov, Frédéric Loulergue Tutorial: Secure Your Things: Secure Development of IoT Software with Frama-C. Search on Bibsonomy SecDev The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Chengjun Cai, Huayi Duan, Cong Wang 0001 Tutorial: Building Secure and Trustworthy Blockchain Applications. Search on Bibsonomy SecDev The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1 2018 IEEE Cybersecurity Development, SecDev 2018, Cambridge, MA, USA, September 30 - October 2, 2018 Search on Bibsonomy SecDev The full citation details ... 2018 DBLP  BibTeX  RDF
1Sazzadur Rahaman, Na Meng 0001, Danfeng Yao Tutorial: Principles and Practices of Secure Crypto Coding in Java. Search on Bibsonomy SecDev The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Darius Foo, Ming Yi Ang, Jason Yeo, Asankhaya Sharma SGL: A Domain-Specific Language for Large-Scale Analysis of Open-Source Code. Search on Bibsonomy SecDev The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Archibald Samuel Elliott, Andrew Ruef, Michael Hicks 0001, David Tarditi Checked C: Making C Safe by Extension. Search on Bibsonomy SecDev The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Will Snavely, William Klieber, Ryan Steele, David Svoboda, Andrew Kotov Detecting Leaks of Sensitive Data Due to Stale Reads. Search on Bibsonomy SecDev The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Sonja Glumich, Juanita Riley, E. Paul Ratazzi, Amanda Ozanam BP: Integrating Cyber Vulnerability Assessments Earlier into the Systems Development Lifecycle: A Methodology to Conduct Early-Cycle Cyber Vulnerability Assessments. Search on Bibsonomy SecDev The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Christopher Theisen, Hyunwoo Sohn, Dawson Tripp, Laurie A. Williams BP: Profiling Vulnerabilities on the Attack Surface. Search on Bibsonomy SecDev The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Amir Rahmati, Earlence Fernandes, Kevin Eykholt, Atul Prakash 0001 Tyche: A Risk-Based Permission Model for Smart Homes. Search on Bibsonomy SecDev The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jason H. Li, Douglas Schafer, David Whelihan, Stefano Lassini, Nicholas Evancich, Kyung Joon Kwak, Michael Vai, Haley Whitman Designing Secure and Resilient Embedded Avionics Systems. Search on Bibsonomy SecDev The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Xuan Tang Best Practice for Developing Secure and Trusted Enterprise Storage & Computing Products. Search on Bibsonomy SecDev The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Vaishnavi Mohan, Lotfi Ben Othmane, Andre Kres BP: Security Concerns and Best Practices for Automation of Software Deployment Processes: An Industrial Case Study. Search on Bibsonomy SecDev The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Hasan Yasar Experiment: Sizing Exposed Credentials in GitHub Public Repositories for CI/CD. Search on Bibsonomy SecDev The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Fabian Monrose, Jan Werner Tutorial: Parry and RIPOSTE: Honing Cybersecurity Skills with Challenge-Based Exercises. Search on Bibsonomy SecDev The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Peter Goodman, Gustavo Grieco, Alex Groce Tutorial: DeepState: Bringing Vulnerability Detection Tools into the Development Cycle. Search on Bibsonomy SecDev The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Andrea Arbelaez, Sallie Edwards, Kevin Littlefield, Sue Wang, Kangmin Zheng Securing Wireless Infusion Pumps. Search on Bibsonomy SecDev The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Elisa Heymann, Barton P. Miller Tutorial: Secure Coding Practices, Automated Assessment Tools and the SWAMP. Search on Bibsonomy SecDev The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1François Gauthier 0001, Nathan Keynes, Nicholas Allen, Diane Corney, Padmanabhan Krishnan Scalable Static Analysis to Detect Security Vulnerabilities: Challenges and Solutions. Search on Bibsonomy SecDev The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Sam Weber, Michael J. Coblenz, Brad A. Myers, Jonathan Aldrich, Joshua Sunshine Empirical Studies on the Security and Usability Impact of Immutability. Search on Bibsonomy SecDev The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Robert C. Seacord Java Deserialization Vulnerabilities and Mitigations. Search on Bibsonomy SecDev The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jesse Edwards, Ameer Kashani, Gopalakrishnan Iyer Evaluation of Software Vulnerabilities in Vehicle Electronic Control Units. Search on Bibsonomy SecDev The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Nadia Carlsten, Reed Sturtevant, Chris Wysopal, Andreas Kuehlmann, Robert K. Cunningham Panel: Building a Business around Secure Development. Search on Bibsonomy SecDev The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Imano Williams, Xiaohong Yuan Creating Abuse Cases Based on Attack Patterns: A User Study. Search on Bibsonomy SecDev The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Sazzadur Rahaman, Danfeng Yao Program Analysis of Cryptographic Implementations for Security. Search on Bibsonomy SecDev The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Yasemin Acar, Christian Stransky, Dominik Wermke, Charles Weir, Michelle L. Mazurek, Sascha Fahl Developers Need Support, Too: A Survey of Security Advice for Software Developers. Search on Bibsonomy SecDev The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Komail Dharsee, Ethan Johnson, John Criswell A Software Solution for Hardware Vulnerabilities. Search on Bibsonomy SecDev The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1 IEEE Cybersecurity Development, SecDev 2017, Cambridge, MA, USA, September 24-26, 2017 Search on Bibsonomy SecDev The full citation details ... 2017 DBLP  BibTeX  RDF
1James A. Kupsch Automated Assessment Tools and the Software Assurance Marketplace (SWAMP). Search on Bibsonomy SecDev The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jonathan Ganz, Sean Peisert ASLR: How Robust Is the Randomness? Search on Bibsonomy SecDev The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jim Whitmore, William Tobin Improving Attention to Security in Software Design with Analytics and Cognitive Techniques. Search on Bibsonomy SecDev The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Fish Wang, Yan Shoshitaishvili Angr - The Next Generation of Binary Analysis. Search on Bibsonomy SecDev The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Raghudeep Kannavara, Gilad Gressel, Damilare Fagbemi, Richard Chow A Machine Learning Approach to SDL. Search on Bibsonomy SecDev The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Gustavo Durand, Michael Bar-Sinai, Mercè Crosas Securing Dataverse with an Adapted Command Design Pattern. Search on Bibsonomy SecDev The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Lori Flynn, David Svoboda, William Snavely Hands-On Tutorial: Auditing Static Analysis Alerts Using a Lexicon & Rules. Search on Bibsonomy SecDev The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Prashant Anantharaman, Michael C. Millian, Sergey Bratus, Meredith L. Patterson Input Handling Done Right: Building Hardened Parsers Using Language-Theoretic Security. Search on Bibsonomy SecDev The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Isis Rose, Nicholas Felts, Alexander George, Emily Miller, Max Planck Something Is Better Than Everything: A Distributed Approach to Audit Log Anomaly Detection. Search on Bibsonomy SecDev The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Scott Ruoti, Kent E. Seamons, Daniel Zappala Layering Security at Global Control Points to Secure Unmodified Software. Search on Bibsonomy SecDev The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Sunjay Cauligi, Gary Soeller, Fraser Brown, Brian Johannesmeyer, Yunlu Huang, Ranjit Jhala, Deian Stefan FaCT: A Flexible, Constant-Time Programming Language. Search on Bibsonomy SecDev The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Md. Endadul Hoque, Cristina Nita-Rotaru Building Robust Distributed Systems and Network Protocols by Using Adversarial Testing and Behavioral Analysis. Search on Bibsonomy SecDev The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Yuzhe Tang, Wenqing Zhuang Towards Building Practical Secure Multi-party Databases. Search on Bibsonomy SecDev The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Stephen Crane, Andrei Homescu, Per Larsen Code Randomization: Haven't We Solved This Problem Yet? Search on Bibsonomy SecDev The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Nirupama Talele, Divya Muthukumaran, Frank Capobianco, Trent Jaeger, Gang Tan Maintaining Authorization Hook Placements Across Program Versions. Search on Bibsonomy SecDev The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1David Svoboda Beyond errno: Error Handling in "C". Search on Bibsonomy SecDev The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Amir Rahmati, Earlence Fernandes, Atul Prakash 0001 Applying the Opacified Computation Model to Enforce Information Flow Policies in IoT Applications. Search on Bibsonomy SecDev The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Lee Pike Hints for High-Assurance Cyber-Physical System Design. Search on Bibsonomy SecDev The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Robert L. Nord, Ipek Ozkaya Software Vulnerabilities, Defects, and Design Flaws: A Technical Debt Perspective. Search on Bibsonomy SecDev The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Nivedita Murthy Codiscope SecureAssist™ - The Developer's Security Assistant. Search on Bibsonomy SecDev The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Mark Mazumder, Timothy M. Braje Safe Client/Server Web Development with Haskell. Search on Bibsonomy SecDev The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Chad Heitzenrater, Andrew Simpson Software Security Investment: The Right Amount of a Good Thing. Search on Bibsonomy SecDev The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Derek Bruening, Qin Zhao Using Dr. Fuzz, Dr. Memory, and Custom Dynamic Tools for Secure Development. Search on Bibsonomy SecDev The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1David Svoboda, Lori Flynn, Will Snavely Static Analysis Alert Audits: Lexicon & Rules. Search on Bibsonomy SecDev The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Soumya Indela, Mukul Kulkarni, Kartik Nayak, Tudor Dumitras Toward Semantic Cryptography APIs. Search on Bibsonomy SecDev The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Eunsuk Kang Design Space Exploration for Security. Search on Bibsonomy SecDev The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1William Klieber, Will Snavely Automated Code Repair Based on Inferred Specifications. Search on Bibsonomy SecDev The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1David Vitek Auditing Code for Security Vulnerabilities with CodeSonar. Search on Bibsonomy SecDev The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Frank Piessens, Dominique Devriese, Jan Tobias Mühlberg, Raoul Strackx Security Guarantees for the Execution Infrastructure of Software Applications. Search on Bibsonomy SecDev The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Matt McCutchen, Daniel Song, Shuo Chen 0001, Shaz Qadeer Self-Verifying Execution (Position Paper). Search on Bibsonomy SecDev The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Brian Pfretzschner, Lotfi Ben Othmane Dependency-Based Attacks on Node.js. Search on Bibsonomy SecDev The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Hasan Yasar, Kiriakos Kontostathis Secure DevOps Process and Implementation. Search on Bibsonomy SecDev The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Andrei Lapets, Nikolaj Volgushev, Azer Bestavros, Frederick Jansen, Mayank Varia Secure MPC for Analytics as a Web Application. Search on Bibsonomy SecDev The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Alina Oprea, Ata Turk, Cristina Nita-Rotaru, Orran Krieger MOSAIC: A Platform for Monitoring and Security Analytics in Public Clouds. Search on Bibsonomy SecDev The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Falcon Momot, Sergey Bratus, Sven M. Hallberg, Meredith L. Patterson The Seven Turrets of Babel: A Taxonomy of LangSec Errors and How to Expunge Them. Search on Bibsonomy SecDev The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Mohamed Nassim Seghir, David Aspinall 0001, Lenka Mareková Certified Lightweight Contextual Policies for Android. Search on Bibsonomy SecDev The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Yasemin Acar, Sascha Fahl, Michelle L. Mazurek You are Not Your Developer, Either: A Research Agenda for Usable Security and Privacy Research Beyond End Users. Search on Bibsonomy SecDev The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Mable Benjamin Secure Coding for Real-Time Embedded Systems: Cert Run-Time Profile for Ada. Search on Bibsonomy SecDev The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Christoph Kerschbaumer Enforcing Content Security by Default within Web Browsers. Search on Bibsonomy SecDev The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Lukas Weichselbaum, Michele Spagnuolo, Artur Janc Adopting Strict Content Security Policy for XSS Protection. Search on Bibsonomy SecDev The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Zhou Li 0001, Alina Oprea Operational Security Log Analytics for Enterprise Breach Detection. Search on Bibsonomy SecDev The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Aaron Ballman, David Svoboda Avoiding Insecure C++ - How to Avoid Common C++ Security Vulnerabilities. Search on Bibsonomy SecDev The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Eric L. McCorkle A Case for Combining Industrial Pragmatics with Formal Methods. Search on Bibsonomy SecDev The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Bill Baloglu How to find and fix software vulnerabilities with coverity static analysis. Search on Bibsonomy SecDev The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Thomas Moyer, Karishma Chadha, Robert K. Cunningham, Nabil Schear, Warren Smith, Adam Bates 0001, Kevin R. B. Butler, Frank Capobianco, Trent Jaeger, Patrick T. Cable II Leveraging Data Provenance to Enhance Cyber Resilience. Search on Bibsonomy SecDev The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Kosta Serebryany Continuous Fuzzing with libFuzzer and AddressSanitizer. Search on Bibsonomy SecDev The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1 IEEE Cybersecurity Development, SecDev 2016, Boston, MA, USA, November 3-4, 2016 Search on Bibsonomy SecDev The full citation details ... 2016 DBLP  BibTeX  RDF
1Kyle Hogan, Noah Luther, Nabil Schear, Emily Shen, David Stott, Sophia Yakoubov, Arkady Yerukhimovich Secure Multiparty Computation for Cooperative Cyber Risk Assessment. Search on Bibsonomy SecDev The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
Displaying result #101 - #192 of 192 (100 per page; Change: )
Pages: [<<][1][2]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license