Abstract is missing.
- BP: Formal Proofs, the Fine Print and Side EffectsToby C. Murray, Paul C. van Oorschot. 1-10 [doi]
- BP: DECREE: A Platform for Repeatable and Reproducible Security ExperimentsLok Yan, Benjamin Price, Michael Zhivich, Brian Caswell, Christopher Eagle, Michael Frantzen, Holt Sorenson, Michael Thompson, Timothy Vidas, Jason Wright, Vernon Rivet, Samuel Colt VanWinkle, Clark Wood. 11-20 [doi]
- BP: Security Concerns and Best Practices for Automation of Software Deployment Processes: An Industrial Case StudyVaishnavi Mohan, Lotfi Ben Othmane, Andre Kres. 21-28 [doi]
- Tyche: A Risk-Based Permission Model for Smart HomesAmir Rahmati, Earlence Fernandes, Kevin Eykholt, Atul Prakash. 29-36 [doi]
- Detecting Leaks of Sensitive Data Due to Stale ReadsWill Snavely, William Klieber, Ryan Steele, David Svoboda, Andrew Kotov. 37-44 [doi]
- Transforming Code to Drop Dead PrivilegesXiaoyu Hu, Jie Zhou, Spyridoula Gravani, John Criswell. 45-52 [doi]
- Checked C: Making C Safe by ExtensionArchibald Samuel Elliott, Andrew Ruef, Michael Hicks 0001, David Tarditi. 53-60 [doi]
- SGL: A Domain-Specific Language for Large-Scale Analysis of Open-Source CodeDarius Foo, Ming Yi Ang, Jason Yeo, Asankhaya Sharma. 61-68 [doi]
- A Lingua Franca for Security by DesignAlexander van den Berghe, Koen Yskout, Riccardo Scandariato, Wouter Joosen. 69-76 [doi]
- BP: Integrating Cyber Vulnerability Assessments Earlier into the Systems Development Lifecycle: A Methodology to Conduct Early-Cycle Cyber Vulnerability AssessmentsSonja Glumich, Juanita Riley, Paul Ratazzi, Amanda Ozanam. 77-84 [doi]
- Light-Touch Interventions to Improve Software Development SecurityCharles Weir, Lynne Blair, Ingolf Becker, M. Angela Sasse, James Noble 0001. 85-93 [doi]
- Towards Understanding the Adoption of Anti-Spoofing Protocols in Email SystemsHang Hu 0002, Peng Peng, Gang Wang. 94-101 [doi]
- There's a Hole in the Bottom of the C: On the Effectiveness of Allocation ProtectionRonald Gil, Hamed Okhravi, Howard E. Shrobe. 102-109 [doi]
- BP: Profiling Vulnerabilities on the Attack SurfaceChristopher Theisen, Hyunwoo Sohn, Dawson Tripp, Laurie Williams. 110-119 [doi]
- Tutorial: Building Secure and Trustworthy Blockchain ApplicationsChengjun Cai, Huayi Duan, Cong Wang. 120-121 [doi]
- Tutorial: Principles and Practices of Secure Crypto Coding in JavaSazzadur Rahaman, Na Meng, Danfeng Yao. 122-123 [doi]
- Tutorial: Secure Coding Practices, Automated Assessment Tools and the SWAMPElisa Heymann, Barton P. Miller. 124-125 [doi]
- Tutorial: Secure Your Things: Secure Development of IoT Software with Frama-CAllan Blanchard, Nikolai Kosmatov, Frédéric Loulergue. 126-127 [doi]
- Tutorial: Continuous Verification of Critical SoftwareMike Dodds, Stephen Magill, Aaron Tomb. 128-129 [doi]
- Tutorial: DeepState: Bringing Vulnerability Detection Tools into the Development CyclePeter Goodman, Gustavo Grieco, Alex Groce. 130-131 [doi]
- Tutorial: Parry and RIPOSTE: Honing Cybersecurity Skills with Challenge-Based ExercisesFabian Monrose, Jan Werner. 132-133 [doi]
- Scalable Static Analysis to Detect Security Vulnerabilities: Challenges and SolutionsFrançois Gauthier, Nathan Keynes, Nicholas Allen, Diane Corney, Padmanabhan Krishnan. 134 [doi]
- Applied Threat Driven Security VerificationDanny Dhillon, Vishal Mishra. 135 [doi]
- Rethinking Secure DevOps Threat Modeling: The Need for a Dual Velocity ApproachAltaz Valani. 136 [doi]
- Automating Threat Intelligence for SDLRaghudeep Kannavara, Jacob Vangore, William Roberts, Marcus Lindholm, Priti Shrivastav. 137 [doi]
- Reducing Attack Surface via Executable TransformationSukarno Mertoguno, Ryan Craven, Daniel Koller, Matthew Mickelson. 138 [doi]
- Designing Secure and Resilient Embedded Avionics SystemsJason H. Li, Douglas Schafer, David Whelihan, Stefano Lassini, Nicholas Evancich, Kyung Joon Kwak, Michael Vai, Haley Whitman. 139 [doi]
- Data Integrity: Recovering from Ransomware and Other Destructive EventsTim McBride, Anne Townsend, Michael Ekstrom, Lauren Lusty, Julian Sexton. 140 [doi]
- Securing Wireless Infusion PumpsAndrea Arbelaez, Sallie Edwards, Kevin Littlefield, Sue Wang, Kangmin Zheng. 141 [doi]
- Best Practice for Developing Secure and Trusted Enterprise Storage & Computing ProductsXuan Tang. 142 [doi]
- Experiment: Sizing Exposed Credentials in GitHub Public Repositories for CI/CDHasan Yasar. 143 [doi]