Now showing items 1-3 of 3
The Scalability of Vulnerability Analysis
(Georgia Institute of Technology, 2018-01-26)
Analyzing software for vulnerabilities is an important capability in ensuring the security of a computing system. As software has become more complex and ubiquitous, however, traditional vulnerability analysis techniques ...
Triaging and Debugging Failures in Deployed Software by Reverse Execution
(Georgia Institute of Technology, 2018-10-26)
A Tale of Two Tasks: Designing and Validating Secure Software
(Georgia Institute of Technology, 2019-03-08)
Secure software development can be categorized into two major tasks: designing secure software and validating secure software. In this talk, we will review both categories as well as some resources helpful for continuous ...