
-
Ethics in the Software Development Process: From Codes of Conduct to Ethical Deliberation
Software systems play an ever more important role in our lives and softw...
read it
-
Maat: Automatically Analyzing VirusTotal for Accurate Labeling and Effective Malware Detection
The malware analysis and detection research community relies on the onli...
read it
-
From Checking to Inference: Actual Causality Computations as Optimization Problems
Actual causality is increasingly well understood. Recent formal approach...
read it
-
Expressing Accountability Patterns using Structural Causal Models
While the exact definition and implementation of accountability depend o...
read it
-
Extending Causal Models from Machines into Humans
Causal Models are increasingly suggested as a means to reason about the ...
read it
-
VirtSC: Combining Virtualization Obfuscation with Self-Checksumming
Self-checksumming (SC) is a tamper-proofing technique that ensures certa...
read it
-
Efficiently Checking Actual Causality with SAT Solving
Recent formal approaches towards causality have made the concept ready f...
read it
-
Don't Pick the Cherry: An Evaluation Methodology for Android Malware Detection Methods
In evaluating detection methods, the malware research community relies o...
read it
-
Compositional Fuzzing Aided by Targeted Symbolic Execution
Guided fuzzing has, in recent years, been able to uncover many new vulne...
read it
-
A Real-Time Remote IDS Testbed for Connected Vehicles
Connected vehicles are becoming commonplace. A constant connection betwe...
read it
-
Understanding and Formalizing Accountability for Cyber-Physical Systems
Accountability is the property of a system that enables the uncovering o...
read it
-
Model-Based Safety and Security Engineering
By exploiting the increasing surface attack of systems, cyber-attacks ca...
read it
-
Automatically Assessing Vulnerabilities Discovered by Compositional Analysis
Testing is the most widely employed method to find vulnerabilities in re...
read it
-
Reviewing KLEE's Sonar-Search Strategy in Context of Greybox Fuzzing
Automatic test-case generation techniques of symbolic execution and fuzz...
read it
-
Improving Function Coverage with Munch: A Hybrid Fuzzing and Directed Symbolic Execution Approach
Fuzzing and symbolic execution are popular techniques for finding vulner...
read it
-
ACCBench: A Framework for Comparing Causality Algorithms
Modern socio-technical systems are increasingly complex. A fundamental p...
read it