Abstract is missing.
- Tutorial: LLVM for Security PractitionersJohn Criswell, Ethan Johnson, Colin Pronovost. 1-2 [doi]
- Tutorial: Analyzing, Exploiting, and Patching Smart Contracts in EthereumJens-Rene Giesen, Sébastien Andreina, Michael Rodler, Ghassan O. Karame, Lucas Davi. 3-4 [doi]
- Tutorial: Threat Modeling of Cloud-based SolutionsLotfi Ben Othmane, Heinrich Gantenbein, Hasan Yasar, Simone Curzi, Altaz Valani, Arun Prabhakar, Robert Cuddy. 5-6 [doi]
- How far are German companies in improving security through static program analysis tools?Goran Piskachev, Stefan Dziwok, Thorsten Koch, Sven Merschjohann, Eric Bodden. 7-15 [doi]
- A Comparative Study of Log4Sheil Test ToolsDouglas Everson, Ashish Bastola, Rajat Mittal, Siddheshwar Munde, Long Cheng 0005. 16-22 [doi]
- Evaluating Text Augmentation for Boosting the Automatic Mapping of Vulnerability Information to Adversary TechniquesEmmanouil Gionanidis, Petros S. Karvelis, George K. Georgoulas, Konstantinos Stamos, Purvi Garg. 23-29 [doi]
- Towards cryptographically-authenticated in-memory data structuresSetareh Ghorshi, Lachlan J. Gunn, Hans Liljestrand, N. Asokan. 30-44 [doi]
- Salsa: SGX Attestation for Live Streaming ApplicationsTobias Cloosters, Sebastian Surminski, Gerrit Sangel, Lucas Davi. 45-51 [doi]
- Position Paper: Towards a Hybrid Approach to Protect Against Memory Safety VulnerabilitiesKaled M. Alshmrany, Ahmed Bhayat, Franz Brauße, Lucas C. Cordeiro, Konstantin Korovin, Tom Melham, Mustafa A. Mustafa, Pierre Olivier, Giles Reger, Fedor Shmarov. 52-58 [doi]
- From Lemons to Peaches: Improving Security ROI through Security Chaos EngineeringKelly Shortridge. 59-60 [doi]
- Industrial Strength Static Detection for Cryptographic API MisusesYa Xiao, Yang Zhao, Nicholas Allen, Nathan Keynes, Danfeng Yao, Cristina Cifuentes. 61-62 [doi]
- Framework to Assess Policy Driven Security Misconfiguration Risks in Cloud Native ApplicationKanchanjot Kaur Phokela, Kapil Singi, Kuntal Dey, Vikrant Kaulgud, Adam P. Burden. 63-64 [doi]
- Secure Development Workflows in CI/CD PipelinesPranshu Bajpai, Adam Lewis. 65-66 [doi]
- A Hierarchical Database of One Million WebsitesJack B. Harrison, Joseph R. Harrison, Madison G. Boswell, Alan J. Michaels. 67-68 [doi]
- What are the Practices for Secret Management in Software Artifacts?Setu Kumar Basak, Lorenzo Neil, Bradley Reaves, Laurie A. Williams. 69-76 [doi]
- How Do Developers Follow Security-Relevant Best Practices When Using NPM Packages?Md Mahir Asef Kabir, Ying Wang, Danfeng Yao, Na Meng 0001. 77-83 [doi]
- Uncovering Product Vulnerabilities with Threat Knowledge GraphsZhenpeng Shi, Nikolay Matyunin, Kalman Graffi, David Starobinski. 84-90 [doi]
- Design and User Study of a Constraint-based Framework for Business Logic Flaw DiscoveryCarmen Cheh, Nicholas Tay, Binbin Chen. 91-99 [doi]