4 | -- | 6 | Jianying Zhou 0001. The Need of Testbeds for Cyberphysical System Security |
7 | -- | 12 | Tadayoshi Kohno. The Task Piper |
13 | -- | 15 | Hamed Okhravi. Memory Safety |
18 | -- | 21 | Dan S. Wallach, Bob Lord. A Viewpoint: A Memory Safety Manifesto |
22 | -- | 29 | Per Larsen. Migrating C to Rust for Memory Safety |
30 | -- | 39 | Santosh Nagarakatte. Full Spatial and Temporal Memory Safety for C |
40 | -- | 49 | Kaiming Huang, Mathias Payer, Zhiyun Qian, Jack Sampson, Gang Tan, Trent Jaeger. Comprehensive Memory Safety Validation: An Alternative Approach to Memory Safety |
50 | -- | 61 | Robert N. M. Watson, David Chisnall, Jessica Clarke 0001, Brooks Davis, Nathaniel Wesley Filardo, Ben Laurie, Simon W. Moore, Peter G. Neumann, Alexander Richardson, Peter Sewell, Konrad Witaszczyk, Jonathan Woodruff. CHERI: Hardware-Enabled C/C++ Memory Protection at Scale |
62 | -- | 65 | William K. Robertson, Manuel Egele. A Viewpoint: Safer Heaps With Practical Architectural Security Primitives |
66 | -- | 75 | André Rösti, Alexios Voulimeneas, Michael Franz. The Astonishing Evolution of Probabilistic Memory Safety: From Basic Heap-Data Attack Detection Toward Fully Survivable Multivariant Execution |
76 | -- | 86 | Mohamadreza Rostami, Chen Chen, Rahul Kande, Huimin Li, Jeyavijayan Rajendran, Ahmad-Reza Sadeghi. Fuzzerfly Effect: Hardware Fuzzing for Memory Safety |
87 | -- | 96 | Tobias Cloosters, Oussama Draissi, Johannes Willbold, Thorsten Holz, Lucas Davi. Memory Corruption at the Border of Trusted Execution |
97 | -- | 100 | Hans Liljestrand, Jan-Erik Ekberg. A Viewpoint: Harmonizing the Diverse Memory Safety Fronts |
101 | -- | 102 | Daniel Moreira, Sébastien Marcel, Anderson Rocha 0001. Synthetic Realities and Artificial Intelligence-Generated Contents |
103 | -- | 114 | Zander W. Blasingame, Chen Liu 0001. Fast-DiM: Towards Fast Diffusion Morphs |
115 | -- | 122 | Prakash L. Kharvi. Understanding the Impact of AI-Generated Deepfakes on Public Opinion, Political Discourse, and Personal Security in Social Media |
124 | -- | 128 | Francis Kofi Andoh-Baidoo, Martin Otu Offei, Emmanuel W. Ayaburi, Mikko T. Siponen, Pavel Gladyshev. How Do Real Cybercrime Syndicates Operate?: The Case of Online Romance Fraud Syndicates |
130 | -- | 132 | Roberto Baldoni. Global Cybercrime Requires a Collective Response: Are We Prepared to Ban Ransom Payments? |
135 | -- | 136 | Daniel E. Geer. What I've Learned |