专题:Security and Verification in Computing

This cluster of papers focuses on language-based information flow security, addressing topics such as enforceable security policies, control-flow integrity, side-channel attacks, dynamic taint analysis, and trusted execution environments. It also explores techniques for memory protection, virtualization, software diversity, and hardware security.
最新文献
Cyberattack-Aware Control Structure Screening for Controller-Actuator False Data Injection Attack Isolation

article Full Text OpenAlex

Quantum Secure DevOps (QSecOps): Integrating Quantum-Based Security Checks into CI/CD Pipelines: Next-Generation Software Security

article Full Text OpenAlex

Securing P4 Programs by Information Flow Control

article Full Text OpenAlex

On container vulnerabilities in edge computing: A fix-on-deployment approach

article Full Text OpenAlex

Robust Dynamic Embedding for Gradual Typing

article Full Text OpenAlex

Microcontroller Software Continuous Deployment: Secure Partial Update Realms for RIOT (PURR)

article Full Text OpenAlex

Security-Based Event-Triggered H-Infinity Control for Ncss Under Dual-Channel Dos Attacks

article Full Text OpenAlex

Distributed Memory Event-Triggered Control of Interconnected Systems Under Deception Attacks

article Full Text OpenAlex

ELA: Secure, Lightweight, and Zero-Touch Enrollment for IoT Devices

article Full Text OpenAlex

DejaVuzz: Disclosing Transient Execution Bugs with Dynamic Swappable Memory and Differential Information Flow Tracking Assisted Processor Fuzzing

article Full Text OpenAlex

近5年高被引文献
QUIC: A UDP-Based Multiplexed and Secure Transport

report Full Text OpenAlex 576 FWCI0

IEEE Transactions on Dependable and Secure Computing

paratext Full Text OpenAlex 307 FWCI0

2021 IEEE Symposium on Security and Privacy (SP)

paratext Full Text OpenAlex 283 FWCI0

Asleep at the Keyboard? Assessing the Security of GitHub Copilot’s Code Contributions

article Full Text OpenAlex 231 FWCI40.569

DeepWukong

article Full Text OpenAlex 204 FWCI45.596

A Survey of Smart Contract Formal Specification and Verification

review Full Text OpenAlex 170 FWCI9.24

Zero Trust Architecture (ZTA): A Comprehensive Survey

article Full Text OpenAlex 147 FWCI21.88

PLATYPUS: Software-based Power Side-Channel Attacks on x86

article Full Text OpenAlex 143 FWCI12.74

Cybersecurity in Power Grids: Challenges and Opportunities

article Full Text OpenAlex 133 FWCI12.645

Trustworthy AI

article Full Text OpenAlex 131 FWCI12.874