2020 accepted
Accepted Papers
- Analysis of Blockchain Smart Contracts: Techniques and Insights
Shinhae Kim, Sukyoung Ryu (KAIST) - ReViCe: Reusing Victim Cache to Prevent Speculative Cache Leakage
Sungkeun Kim, Farabi Mahmud, Jiayi Huang, Pritam Majumder (Texas A&M University); Neophytos Christou (University of Cyprus); Abdullah Muzahid, Chia-Che Tsai, Eun Jung Kim (Texas A&M University) - Coding Practices and Recommendations with Spring Security for Enterprise Applications
Mazharul Islam, Sazzadur Rahaman (Student, Virginia Tech); Na Meng (Virginia Tech, Dept of Computer Science); Behnaz Hassanshahi, Paddy Krishnan (Oracle Labs); Danfeng (Daphne) Yao (Virginia Tech, Dept of Computer Science) - Cybersecurity Deception Experimentation System
Jaime Acosta (CCDC Army Research Laboratory); Anjon Basak, Christopher Kiekintveld (University of Texas at El Paso); Nandi Leslie, Charles Kamhoua (CCDC Army Research Laboratory) - Fast Execute-Only Memory for Embedded Systems
Zhuojia Shen, John Criswell (University of Rochester) - Refactoring the FreeBSD Kernel with Checked C
Junhan Duan, Yudi Yang, Jie Zhou, John Criswell (University of Rochester) - Network Attack Surface Simplification for Red and Blue Teams
Douglas Everson, Long Cheng (Clemson University) - REMIND: A Framework for the Resilient Design of Automotive Systems
Thomas Rosenstatter, Kim Strandberg (Chalmers University of Technology); Rodi Jolak, Riccardo Scandariato (Chalmers | Gothenburg University); Tomas Olovsson (Chalmers University of Technology) - Tutorial: Principles and Practices of Secure Cryptographic Coding in Java
Ya Xiao, Miles Frantz, Sharmin Afrose, Sazzadur Rahaman, Danfeng (Daphne) Yao (Department of Computer Science, Virginia Tech) - Fuzzing Binaries for Memory Safety Errors with QASan
Andrea Fioraldi, Daniele Cono D’Elia, Leonardo Querzoni (Sapienza University of Rome) - XI Commandments of Kubernetes Security: A Systematization of Knowledge Related to Kubernetes Security Practices
Md Shazibul Islam Shamim, Farzana Ahamed Bhuiyan, Akond Rahman (Tennessee Technological University) - Tutorial: LLVM for Security Practitioners
John Criswell (University of Rochester) - Tutorial: Detecting Memory Vulnerabilities in the Components of System Code using PROMPT
Tuba Yavuz, Ken (Yihang) Bai (University of Florida) - Symbolic Testing for C and Rust
Aaron Tomb, Stuart Pernsteiner, Mike Dodds (Galois, Inc.) - Active Deception Framework: An Extensible Development Environment for Adaptive Cyber Deception
Md Mazharul Islam (UNCC); Ehab Al-Shaer (University of North Carolina Charlotte) - A Secure Code Review Retrospective
Richard Piazza, Andrew Buttner, Rushi Purohit, Alec Summers (The MITRE Corporation) - Static Analysis at Scale with Muse
Stephen Magill, Tom DuBuisson (MuseDev, Inc.)