0 | -- | 0 | Zoltán Ságodi, Péter Hegedüs, Rudolf Ferenc. Increased Software Security with Large Language Models |
0 | -- | 0 | Peter Kieseberg, Christoph Kaltenriner, Peter Gallistl. Challenges for the Secure Integration of Drones into Warehouse Logistics of SMEs |
0 | -- | 0 | Nuno Saavedra, João F. Ferreira 0001, Alexandra Mendes. GLITCH: Polyglot Code Smell Detection in Infrastructure as Code |
0 | -- | 0 | Aayush Garg, Yuejun Guo 0001, Qiang Tang 0001. AI-Driven Software Security: Vulnerability Detection, Patching, and Anti-Fuzzing |
0 | -- | 0 | Simone Onofri. Identity and the Web |
0 | -- | 0 | Sebastian Schrittwieser. Verifying Code Correctness of Protected Software through Translation Validation |
0 | -- | 0 | Thomas Sutter, Ariane Trammell, Timo Kehrer. Uninstallable by Design: The Role of Pre-installed Apps in Android's Security Landscape |
0 | -- | 0 | Daniel Setó-Rey, Carlos López Nozal, José Ignacio San Martín. Vulnerability of Software Package Repositories: PyPI, Maven and npm |
0 | -- | 0 | Mila Dalla Preda, Niccolò Marastoni, Federica Paci. Next Generation Vulnerability Detection with LLMs |
0 | -- | 0 | Chenglu Jin, Marten van Dijk. A Framework for the Analysis of Physical Unclonable Function Interfaces |
0 | -- | 0 | Ramon Barakat, Sascha Hackel, Miltiadis G. Siavvas. Enhancing IoT Security Across the Supply Chain |
0 | -- | 0 | Giovanni Ciaramella, Fabio Martinelli, Francesco Mercaldo. A Proposal for Privacy-preserving Ransomware Detection by means of Federated Machine Learning |
0 | -- | 0 | Caroline Lawitschka, Sebastian Schrittwieser. Generating Mixed Boolean-Arithmetic Expressions through Equality Saturation |
0 | -- | 0 | Yasin Ghafourian, Markus Tauber, Germar Schneider, Andrea Bannert, Olga Kattan, Erwin Schoitsch. Engineering Secure, Trustworthy, and Ethically Sound AI-Based Computer Systems |
0 | -- | 0 | Luca Caviglione, Gianluigi Folino, Massimo Guarascio 0001, Paolo Zicari. Boosting MATE Security through Small Language Models |
0 | -- | 0 | Sebastian Schrittwieser, Michele Ianni. Software Security - Introduction to the Special Theme |
0 | -- | 0 | Steffen Lüdtke, Roman Kraus, Martin A. Schneider. Interactive Fuzzing Reveals Zero-Day Vulnerabilities in Several MQTT Brokers |
0 | -- | 0 | Christophe Ponsard, Jean-François Daune. Towards Cyber Security Risk Analysis for Digital Products |
0 | -- | 0 | Mehdi Akbari Gurabi, Lasse Nitz, Charukeshi Joglekar, Avikarsha Mandal. Strengthening Cyber Defence through Cooperative Development and Shared Expertise in Incident Response Playbooks |
0 | -- | 0 | Antonis Louka, Antreas Dionysiou, Elias Athanasopoulos. Towards Safer Software: Exploring Validation Techniques for Rust Binaries |
0 | -- | 0 | Panagiotis Konstantinopoulos, Vasileios Loukopoulos, Dionysia Mylona, Maria Veneri, Konstantinos Bastas. An Innovative Approach to Supporting Startups in Greece and Southern Europe |
0 | -- | 0 | Mario de la Haba Navarro, Pablo Sánchez-Serrano, Isaac Agudo. Protecting Cryptographic Material in Ethereum Blockchain Clients Using an Open-source Secure Element |
0 | -- | 0 | Rafael Kupsa, Amin Anjomshoaa, Markus Tauber. Connected Aquaponics: Sustainable Agriculture through Industry 5.0 Technologies and Circular Economy Principles |
0 | -- | 0 | Hamidreza Yaghoubi, Navtaj Randhawa, Igor Ivkic. Unlocking the Future: A Cloud-Based Artificial Intelligence Access Control System |
0 | -- | 0 | Frédéric Besson, Célia Le Du, Pierre Wilke. Side-Channel Resistant Applications through Co-designed Hardware/ Software: the SCRATCHS Project |
0 | -- | 0 | Patrick Kochberger, Philipp Haindl, Matteo Battaglin, Patrick Felbauer. Comparability of Software Metrics and Estimating the Strength of Software Protections |
0 | -- | 0 | Katharina Flicker, Stefan Hanslik, Tereza Kalová. Advancing Research: The Role of the EOSC and EOSC Support Office Austria |
0 | -- | 0 | Radhen Hendarmawan. Enhancing Software Security in Hardware SoC Environments: A Heterogeneous Approach |
0 | -- | 0 | Pierre Lermusiaux, Benoît Montagu. The Salto Project: Static Analysis of OCaml Programs by Abstract Interpretation |