IEEE Secure Development Conference

September 28 - 30, 2020
Virtual Conference

Sponsored by the IEEE Computer Society Technical Committee on Security and Privacy

  Register

2020 accepted

Posted on: July 17th, 2020 by Yousef Iskander
Accepted Papers
  • Analysis of Blockchain Smart Contracts: Techniques and Insights
    Shinhae Kim, Sukyoung Ryu (KAIST)
  • ReViCe: Reusing Victim Cache to Prevent Speculative Cache Leakage
    Sungkeun Kim, Farabi Mahmud, Jiayi Huang, Pritam Majumder (Texas A&M University); Neophytos Christou (University of Cyprus); Abdullah Muzahid, Chia-Che Tsai, Eun Jung Kim (Texas A&M University)
  • Coding Practices and Recommendations with Spring Security for Enterprise Applications
    Mazharul Islam, Sazzadur Rahaman (Student, Virginia Tech); Na Meng (Virginia Tech, Dept of Computer Science); Behnaz Hassanshahi, Paddy Krishnan (Oracle Labs); Danfeng (Daphne) Yao (Virginia Tech, Dept of Computer Science)
  • Cybersecurity Deception Experimentation System
    Jaime Acosta (CCDC Army Research Laboratory); Anjon Basak, Christopher Kiekintveld (University of Texas at El Paso); Nandi Leslie, Charles Kamhoua (CCDC Army Research Laboratory)
  • Fast Execute-Only Memory for Embedded Systems
    Zhuojia Shen, John Criswell (University of Rochester)
  • Refactoring the FreeBSD Kernel with Checked C
    Junhan Duan, Yudi Yang, Jie Zhou, John Criswell (University of Rochester)
  • Network Attack Surface Simplification for Red and Blue Teams
    Douglas Everson, Long Cheng (Clemson University)
  • REMIND: A Framework for the Resilient Design of Automotive Systems
    Thomas Rosenstatter, Kim Strandberg (Chalmers University of Technology); Rodi Jolak, Riccardo Scandariato (Chalmers | Gothenburg University); Tomas Olovsson (Chalmers University of Technology)
  • Tutorial: Principles and Practices of Secure Cryptographic Coding in Java
    Ya Xiao, Miles Frantz, Sharmin Afrose, Sazzadur Rahaman, Danfeng (Daphne) Yao (Department of Computer Science, Virginia Tech)
  • Fuzzing Binaries for Memory Safety Errors with QASan
    Andrea Fioraldi, Daniele Cono D’Elia, Leonardo Querzoni (Sapienza University of Rome)
  • XI Commandments of Kubernetes Security: A Systematization of Knowledge Related to Kubernetes Security Practices
    Md Shazibul Islam Shamim, Farzana Ahamed Bhuiyan, Akond Rahman (Tennessee Technological University)
  • Tutorial: LLVM for Security Practitioners
    John Criswell (University of Rochester)
  • Tutorial: Detecting Memory Vulnerabilities in the Components of System Code using PROMPT
    Tuba Yavuz, Ken (Yihang) Bai (University of Florida)
  • Symbolic Testing for C and Rust
    Aaron Tomb, Stuart Pernsteiner, Mike Dodds (Galois, Inc.)
  • Active Deception Framework: An Extensible Development Environment for Adaptive Cyber Deception
    Md Mazharul Islam (UNCC); Ehab Al-Shaer (University of North Carolina Charlotte)
  • A Secure Code Review Retrospective
    Richard Piazza, Andrew Buttner, Rushi Purohit, Alec Summers (The MITRE Corporation)
  • Static Analysis at Scale with Muse
    Stephen Magill, Tom DuBuisson (MuseDev, Inc.)