Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- opinionDecember 2023
Toward a Solid Acceptance of the Decentralized Web of Personal Data: Societal and Technological Convergence
Giving individuals more control of their personal data.
- research-articleOctober 2023
Boosting Fuzzer Efficiency: An Information Theoretic Perspective
In this paper, we take the fundamental perspective of fuzzing as a learning process. Suppose before fuzzing, we know nothing about the behaviors of a program P: What does it do? Executing the first test input, we learn how P behaves for this input. ...
- articleApril 2023
Locking Down Secure Open Source Software
Can even secure open source software ever be considered truly safe?
-
- columnMay 2022
The software industry is still the problem
The time is (also) way overdue for IT professional liability.
- columnDecember 2021
Lamboozling Attackers: A New Generation of Deception
Deception is a powerful resilience tactic that provides observability into attack operations, deflects impact from production systems, and advises resilient system design. A lucid understanding of the goals, constraints, and design trade-offs of ...
- research-articleJuly 2021
Better security through obfuscation
The quest to find greater security through obscurity.
- research-articleJune 2021
Formal software verification measures up
Verified coding techniques use mathematical proofs to ensure code is error-free and hacker-resistant. Can the approach revolutionize software?
- editorialNovember 2020
Silicon politics
Tracing the widening path between Silicon Valley and Washington, D.C.
- opinionNovember 2020
Removing kode
Dead functions and dead features.
- opinionAugust 2020
Autonomous vehicle safety: lessons from aviation
How more than 25years of experience with aviation safety-critical systems can be applied to autonomous vehicle systems.
- opinionAugust 2020
A recent renaissance in privacy law
Considering the recent increased attention to privacy law issues amid the typically slow pace of legal change.
- opinionJune 2020
AI authorship?
Considering the role of humans in copyright protection of outputs produced by artificial intelligence.
- opinionMay 2020
How to curtail oversensing in the home
Limiting sensitive information leakage via smart-home sensor data.
- opinionApril 2020
Secure development tools and techniques need more research that will increase their impact and effectiveness in practice
Secure development is an important and pressing problem.