Archive
2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |
Results
Affiliation shown is the affiliation at the time the talk was given.
What Roles Can Empirical Research Play to Advance Software Security Knowledge?
Lotfi ben-Othmane - Iowa State University
Mind Your Credit: Assessing the Health of the Ripple Credit Network
Pedro Moreno-Sanchez - Purdue University
Leveraging DevSecOps to Escape the Hamster Wheel of Never-ending Security Fail
Chris Reed - Eli Lilly
Symposium Closing Keynote - Bits & Bytes, Flesh & Blood, and Adapting for the Next 20 Years
Josh Corman - PTC
Anonymity Trilemma : Strong Anonymity, Low Bandwidth Overhead, Low Latency – Choose Two.
Debajyoti Das - Purdue University
Personally Identifiable Data and the Specter of Customer Privacy
Leon Ravenna - KAR Auction Services, Inc.
Protecting Bare-metal Embedded Systems from Memory Corruption Attacks
Abe Clements - Purdue University
Hacking Your Security Career: Strategies That College Did Not Teach Me
Ryan Elkins - Eli Lilly
Breaching Water Treatment Plants: Lessons Learned from Complex Exercises
Doug Rapp - Rofori Corporation
What's Private: Exploring Reasonable Expectation of Privacy in the Age of Modern Innovation
Jillean Long Battle - Rofori Corporation
Kernel-Supported Cost-Effective Audit Logging for Causality Tracking
Shiqing Ma - Purdue University
Double the Factors, Double the Fails: How Usability Obstacles Impact Adoption of Strong Authentication Habits
Jessy Irwin - Tendermint
Developing a Public/Private Cybersecurity Scorecard for the State of Indiana
James Lerums - Purdue University
Normalizing Diverse Android Access Control Checks for Inconsistency Detection
Yousra Aafer - Purdue University