Abstract is missing.
- Tutorial: The Correctness-by-Construction Approach to Programming Using CorCIna Schaefer, Tobias Runge, Loek Cleophas, Bruce W. Watson. 1-2 [doi]
- Tutorial: Investigating Advanced Exploits for System Security AssuranceSalman Ahmed, Long Cheng 0005, Hans Liljestrand, N. Asokan, Danfeng Daphne Yao. 3-4 [doi]
- Tutorial: A Lightweight Web Application for Software Vulnerability DemonstrationDavid Lee, Brandon Steed, Yi Liu, Onyeka Ezenwoye. 5-6 [doi]
- Hands-on Tutorial: How Exploitable is Insecure C Code?David Svoboda. 7-8 [doi]
- Tutorial: LLVM for Security PractitionersJohn Criswell, Ethan Johnson, Colin Pronovost. 9-10 [doi]
- Tutorial: Sandboxing (unsafe) C code with RLBoxShravan Narayan, Craig Disselkoen, Deian Stefan. 11-12 [doi]
- Tutorial: Making C Programs Safer with Checked CJie Zhou 0022, Michael Hicks 0001, Yudi Yang, John Criswell. 13-14 [doi]
- Analyzing OpenAPI Specifications for Security Design IssuesCarmen Cheh, Binbin Chen. 15-22 [doi]
- Compressing Network Attack Surfaces for Practical Security AnalysisDouglas Everson, Long Cheng 0005. 23-29 [doi]
- Automated Threat Analysis and Management in a Continuous Integration PipelineLaurens Sion, Dimitri Van Landuyt, Koen Yskout, Stef Verreydt, Wouter Joosen. 30-37 [doi]
- Towards Improving Container Security by Preventing Runtime EscapesMichael Reeves, Dave Jing Tian, Antonio Bianchi, Z. Berkay Celik. 38-46 [doi]
- Developers Are Neither Enemies Nor Users: They Are CollaboratorsPartha Das Chowdhury, Joseph Hallett, Nikhil Patnaik, Mohammad Tahaei, Awais Rashid. 47-55 [doi]
- Shhh!: 12 Practices for Secret Management in Infrastructure as CodeAkond Rahman, Farhat Lamia Barsha, Patrick Morrison. 56-62 [doi]
- Android Remote Unlocking Service using Synthetic Password: A Hardware Security-preserving ApproachSungmin Lee, Yoonkyo Jung, JaeHyun Lee, Byoungyoung Lee, Ted "Taekyoung" Kwon. 63-70 [doi]
- Enclave-Based Secure Programming with JEAditya Oak, Amir M. Ahmadian, Musard Balliu, Guido Salvaneschi. 71-78 [doi]
- Towards Zero Trust: An Experience ReportJason Lowdermilk, Simha Sethumadhavan. 79-85 [doi]
- Layered Formal Verification of a TCP StackGuillaume Cluzel, Kyriakos Georgiou, Yannick Moy, Clément Zeller. 86-93 [doi]
- Vivienne: Relational Verification of Cryptographic Implementations in WebAssemblyRodothea-Myrsini Tsoupidi, Musard Balliu, Benoit Baudry. 94-102 [doi]