Abstract is missing.
- Tutorial: A Practical Introduction to Formal Development and Verification of High-Assurance Software with SPARKBenjamin M. Brosgol, Claire Dross, Yannick Moy. 1-2 [doi]
- Tutorial: Deploying Secure Multi-Party Computation on the Web Using JIFFKinan Dak Albab, Rawane Issa, Andrei Lapets, Peter Flockhart, Lucy Qin, Ira Globus-Harris. 3 [doi]
- Start Your ENGINEs: Dynamically Loadable Contemporary CryptoNicola Tuveri, Billy Bob Brumley. 4-19 [doi]
- On the Universally Composable Security of OpenStackKyle Hogan, Hoda Maleki, Reza Rahaeimehr, Ran Canetti, Marten van Dijk, Jason Hennessey, Mayank Varia, Haibin Zhang. 20-33 [doi]
- A Qualitative Investigation of Insecure Code Propagation from Online ForumsWei Bai 0004, Omer Akgul, Michelle L. Mazurek. 34-48 [doi]
- CryptoAPI-Bench: A Comprehensive Benchmark on Java Cryptographic API MisusesSharmin Afrose, Sazzadur Rahaman, Danfeng Yao. 49-61 [doi]
- Detecting Callback Related Deep Vulnerabilities in Linux Device DriversTuba Yavuz. 62-75 [doi]
- Downright: A Framework and Toolchain for Privilege HandlingRemo Schweizer, Stephan Neuhaus. 76-88 [doi]
- System-Level Framework for Logic Obfuscation with Quantified Metrics for EvaluationVivek V. Menon, Gaurav Kolhe, Andrew G. Schmidt, Joshua S. Monson, Matthew French, Yinghua Hu, Peter A. Beerel, Pierluigi Nuzzo. 89-100 [doi]
- Polymorphic Relaxed NoninterferenceRaimil Cruz, Éric Tanter. 101-113 [doi]
- Exploitation Techniques and Defenses for Data-Oriented AttacksLong Cheng 0005, Hans Liljestrand, Md. Salman Ahmed, Thomas Nyman, Trent Jaeger, N. Asokan, Danfeng Yao. 114-128 [doi]
- Role-Based Ecosystem for the Design, Development, and Deployment of Secure Multi-Party Data Analytics ApplicationsAndrei Lapets, Kinan Dak Albab, Rawane Issa, Lucy Qin, Mayank Varia, Azer Bestavros, Frederick Jansen. 129-140 [doi]
- Effective Static Analysis Enforcement in Complex Cloud Native Dockerized SystemsAbhishek Pathak, Kaarthik Sivakumar, Jin Sheng, Anlu Yan, Mazhar Haque. 141 [doi]
- Using Rules Engine in the Automation of System Security ReviewAbdulrahman A. Alnaim. 142 [doi]
- OpenOSC: Open Source Object Size Checking Library With Built-in MetricsYongkui Han, Pankil Shah, Van Nguyen, Ling Ma, Richard Livingston. 143 [doi]
- With Great Abstraction Comes Great Responsibility: Sealing the Microservices Attack SurfaceChien-An Chen. 144 [doi]
- Multi-Cluster Visualization and Live Reporting of Static Analysis Security Testing (SAST) WarningsAbhishek Pathak, Kaarthik Sivakumar, Mazhar Haque, Prasanna Ganesan. 145 [doi]
- Development Cycle Estimation ModelingSamuel Denard, Susan Mengel, Atila Ertas, Stephen Ekwaro-Osire. 146 [doi]
- Self-Authenticating Traditional Domain NamesPaul Syverson, Matthew Traudt. 147-160 [doi]
- Compositional Testing of Internet ProtocolsKenneth L. McMillan, Lenore D. Zuck. 161-174 [doi]