Abstract is missing.
- Tutorial: LLVM for Security PractitionersJohn Criswell. 1 [doi]
- Tutorial: Detecting Memory Vulnerabilities in the Components of System Code using PROMPTTuba Yavuz, Ken Yihang Bai. 2-3 [doi]
- Tutorial: Static Analysis at Scale with MuseStephen Magill, Thomas Dubuisson. 4 [doi]
- Tutorial: Principles and Practices of Secure Cryptographic Coding in JavaYa Xiao, Miles Frantz, Sharmin Afrose, Sazzadur Rahaman, Danfeng Daphne Yao. 5-6 [doi]
- Fast Execute-Only Memory for Embedded SystemsZhuojia Shen, Komail Dharsee, John Criswell. 7-14 [doi]
- Refactoring the FreeBSD Kernel with Checked CJunhan Duan, Yudi Yang, Jie Zhou, John Criswell. 15-22 [doi]
- Fuzzing Binaries for Memory Safety Errors with QASanAndrea Fioraldi, Daniele Cono D'Elia, Leonardo Querzoni. 23-30 [doi]
- A Secure Code Review RetrospectiveAndrew Buttner, Richard Piazza, Rushi Purohit, Alec Summers. 31-32 [doi]
- Symbolic Testing for C and RustAaron Tomb, Stuart Pernsteiner, Mike Dodds. 33 [doi]
- Cybersecurity Deception Experimentation SystemJaime C. Acosta, Anjon Basak, Christopher Kiekintveld, Nandi Leslie, Charles A. Kamhoua. 34-40 [doi]
- Active Deception Framework: An Extensible Development Environment for Adaptive Cyber DeceptionMd Mazharul Islam, Ehab Al-Shaer. 41-48 [doi]
- Coding Practices and Recommendations of Spring Security for Enterprise ApplicationsMazharul Islam, Sazzadur Rahaman, Na Meng, Behnaz Hassanshahi, Padmanabhan Krishnan, Danfeng Daphne Yao. 49-57 [doi]
- XI Commandments of Kubernetes Security: A Systematization of Knowledge Related to Kubernetes Security PracticesMd. Shazibul Islam Shamim, Farzana Ahamed Bhuiyan, Akond Rahman. 58-64 [doi]
- Analysis of Blockchain Smart Contracts: Techniques and InsightsShinhae Kim, Sukyoung Ryu. 65-73 [doi]
- Network Attack Surface Simplification for Red and Blue TeamsDouglas Everson, Long Cheng. 74-80 [doi]
- REMIND: A Framework for the Resilient Design of Automotive SystemsThomas Rosenstatter, Kim Strandberg, Rodi Jolak, Riccardo Scandariato, Tomas Olovsson. 81-95 [doi]
- ReViCe: Reusing Victim Cache to Prevent Speculative Cache LeakageSungkeun Kim, Farabi Mahmud, Jiayi Huang 0001, Pritam Majumder, Neophytos Christou, Abdullah Muzahid, Chia-che Tsai, Eun Jung Kim 0001. 96-107 [doi]