4 | -- | 9 | Mary Ellen Zurko. Cyber Hard Problems: The Next Generation [From the Editors] |
10 | -- | 12 | Tamara Lopez, Bashar Nuseibeh, Eric Bodden. Security Requirements and Secure Software Design |
14 | -- | 22 | Taylor R. Schorlemmer, Ethan H. Burmane, Kelechi G. Kalu, Santiago Torres-Arias, James C. Davis 0001. Establishing Provenance Before Coding: Traditional and Next-Generation Software Signing |
23 | -- | 31 | Pavel Chuprikov, Patrick Eugster, Shamiek Mangipudi. Security Policy as Code |
32 | -- | 41 | Avi Shaked, Tom Melham. Contextualizing Formal Verification for Systems Security Engineering |
42 | -- | 51 | Manuel Maarek, Daisy Abbott, Olga Chatzifoti, Ryan Shah, Sheung Chi Chan, Hans-Wolfgang Loidl, Robert J. Stewart 0001, Jamie Iona Ferguson, Sandy Louchart, Shenando Stals, Lynne Baillie. Empower New Code Citizens to Reflect and Communicate on Code Security |
52 | -- | 60 | Harun Oz, Daniele Cono D'Elia, Güliz Seray Tuncay, Abbas Acar, Riccardo Lazzeretti, Arif Selcuk Uluagac. With Great Power Comes Great Responsibility: Security and Privacy Issues of Modern Browser Application Programming Interfaces |
61 | -- | 70 | Shunsuke Sato, Ryoichi Shinkuma, Kensei Hirai, Masataka Nakahara, Norihiro Okui, Ayumu Kubota, Yasuaki Kobayashi, Keizo Sugiyama, Takayuki Nishio. Data Acquisition Framework for Micromobility Vehicles Toward Driving Risk Prediction Against Cyberphysical Security Attack |
71 | -- | 80 | Corey M. Hartman, Bhaskar prasad Rimal, Daniel Conte de Leon, Nirmal Budhathoki. Cross-Architecture Binary Function Fingerprinting |
81 | -- | 88 | Liliana Pasquale, Antonino Sabetta, Marcelo d'Amorim, Péter Hegedüs, Mehdi Tarrit Mirakhorli, Hamed Okhravi, Mathias Payer, Awais Rashid, Joanna C. S. Santos, Jonathan M. Spring, Lin Tan 0001, Katja Tuma. Challenges to Using Large Language Models in Code Generation and Repair |
89 | -- | 94 | Abdul Majeed 0001, Seong Oun Hwang. The Dual Role of Machine Learning in Data Anonymization: Top 10 Benefits and Risks |
95 | -- | 100 | Jessica McClearn, Reem Talhouk, Rikke Bjerg Jensen. The Everyday Security of Living With Conflict |
101 | -- | 106 | Hamed Okhravi, Nathan Burow, Fred B. Schneider. Software Bill of Materials as a Proactive Defense |
107 | -- | 108 | Jonathan M. Spring. Secure by Design for Everyone |