IEEE Secure Development

@ieeesecdev

SecDev is a venue for presenting ideas, research, and experience about how to develop secure systems.

Vrijeme pridruživanja: kolovoz 2014.

Tweetovi

Blokirali ste korisnika/cu @ieeesecdev

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @ieeesecdev

  1. proslijedio/la je Tweet
    28. sij

    MC2 is hiring! Join a fantastic group of faculty in CS, ECE, and InfoSci doing work across the computer security spectrum. Open positions at all levels.

    Poništi
  2. proslijedio/la je Tweet
    26. sij

    Save the date! 2020 will be held at Georgia Tech in Atlanta, GA in September! Are you going this year?!

    Poništi
  3. proslijedio/la je Tweet

    Professor , alumnus Long Cheng ('18), along with students Salman Ahmed, Sazzadur Rahaman, and Sharmin Afrose had a great time at ! This group has had a huge presence here with two papers and two poster presentations at the conference.

    Poništi
  4. Thanks to all for attending 2019! Catch us in Atlanta in 2020 at !

    Poništi
  5. Birds of a Feather Sessions are taking place 2-3:30pm: - Diversity and Inclusion in Cybersecurity moderated by Tuba Yavuz, UF - Transitioning Research into Practice Paul Syverson, NRL Matthew French, USC ISI Abhishek Pathak, Cisco

    Poništi
  6. Last paper talk on compositional testing of internet protocols. Kenneth McMillan () & Lenore Zuck (UICEngineering) argue the importance of testing protocols in adversarial environments and introduce network-centric compositions testing to address this.

    Poništi
  7. Paul Syverson presents on Self-Authenticating Traditional Domain Names ()

    Poništi
  8. We want to say a final thank you to all of our sponsors! Thank you for your generous support !

    Poništi
  9. Our last speaker in the practitioner's session is Samuel Denard () who explains why current models for security risk assessment are inadequate and how statistical agent-based model of development and evaluation can reduce risks.

    Poništi
  10. Abhishek Pathak () takes the podium again to showcase visualizations of static analysis security testing warnings and its benefits.

    Poništi
  11. Chien-An Chen () dives into the microservices attack surface and describes how to properly threat model so that attack vectors are detected at each abstraction layer.

    Poništi
  12. Yongkui Han and Pankil Shah () introduce OpenOSC, a C-library for checking buffer overflows and overreads.

    Poništi
  13. Abdulrahman Alnaim () details how to automate review of security requirements, authentication controls, and other aspects of system security through using a rules engine.

    Poništi
  14. Abhishek Pathak discusses how enabling static analysis security testing (SAST) in 's cloud product has led to faster and more secure product delivery.

    Poništi
  15. The practitioners session is about to begin! We welcome industry professionals to share lessons learned and today we will hear short talks from practitioners at , , , and Texas Tech University.

    Poništi
  16. Last day of begins with a keynote from on "Baking the Best Security Layer-Cake"!

    Poništi
  17. Closing out today's program is Andrei Lapets () who describes the challenges in deploying secure multi-party computation and proposes a role-based ecosystem as a framework for understanding challenges across different entities involved in the computation.

    Poništi
  18. In declassification of confidential data, relaxed noninterference is often employed by using security labels. Raimil Cruz() presents on work extending these approaches by supporting polymorphism in relaxed noninterference.

    Poništi
  19. Next up is a systemization of knowledge on data-oriented attacks presented by Long Cheng (clemsonuniv). This SoK details data-oriented exploits and their defenses, including Data-Oriented Programming and Block-Oriented Programming.

    Poništi
  20. Thank you all for participating in the poster session and tool demos! We loved hearing about your work and works in progress.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·