The C programming language
Communications of the ACM
TENEX, a paged time sharing system for the PDP - 10
Communications of the ACM
Communications of the ACM
Password cracking: a game of wits
Communications of the ACM
Biological versus computer viruses
ACM SIGSAC Review
Communications of the ACM
A graduate course in computing security technology
SIGCSE '93 Proceedings of the twenty-fourth SIGCSE technical symposium on Computer science education
Communications of the ACM
A taxonomy of computer program security flaws
ACM Computing Surveys (CSUR)
A process-oriented methodology for assessing and improving software trustworthiness
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
Axiomatic bootstrapping: a guide for compiler hackers
ACM Transactions on Programming Languages and Systems (TOPLAS)
NSPW '96 Proceedings of the 1996 workshop on New security paradigms
Communications of the ACM
Certificate based PKI and B2B E-commerce: suitable match or not?
Sec '01 Proceedings of the 16th international conference on Information security: Trusted information: the new decade challenge
Computer security: quality rather than quantity
Communications of the ACM
Computer
Does Open Source Improve System Security?
IEEE Software
Correct System Design, Recent Insight and Advances, (to Hans Langmaack on the occasion of his retirement from his professorship at the University of Kiel)
The Dark Side of "Black-Box" Cryptography, or: Should We Trust Capstone?
CRYPTO '96 Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
Rigorous Compiler Implementation Correctness: How to Prove the Real Thing Correct
FM-Trends 98 Proceedings of the International Workshop on Current Trends in Applied Formal Method: Applied Formal Methods
Reflections on trusting trust revisited
Communications of the ACM - E-services: a cornucopia of digital offerings ushers in the next Net-based evolution
Towards customisable tuple field matching in VLOS
ACSC '03 Proceedings of the 26th Australasian computer science conference - Volume 16
IEEE Security and Privacy
Poisoning the Software Supply Chain
IEEE Security and Privacy
Access for sale: a new class of worm
Proceedings of the 2003 ACM workshop on Rapid malcode
Journal of Automated Reasoning
Guest Editors' Introduction: Why Attacking Systems Is a Good Idea
IEEE Security and Privacy
Does Trusted Computing Remedy Computer Security Problems?
IEEE Security and Privacy
Security as a safety issue in rail communications
SCS '03 Proceedings of the 8th Australian workshop on Safety critical systems and software - Volume 33
Constructing a metacircular Virtual machine in an exploratory programming environment
OOPSLA '05 Companion to the 20th annual ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications
Risks of live digital forensic analysis
Communications of the ACM - Next-generation cyber forensics
Trust and tamper-proof software delivery
Proceedings of the 2006 international workshop on Software engineering for secure systems
Principles-driven forensic analysis
NSPW '05 Proceedings of the 2005 workshop on New security paradigms
Logcrypt: forward security and public verification for secure audit logs
ACSW Frontiers '06 Proceedings of the 2006 Australasian workshops on Grid computing and e-research - Volume 54
System and network trustworthiness in perspective
Proceedings of the 13th ACM conference on Computer and communications security
Increased security through open source
Communications of the ACM - The patent holder's dilemma: buy, sell, or troll?
Open vs. Closed: Which Source is More Secure?
Queue - Security
Fixing federal e-voting standards
Communications of the ACM - Emergency response information systems: emerging trends and technologies
A PC-based open-source voting machine with an accessible voter-verifiable paper ballot
ATEC '05 Proceedings of the annual conference on USENIX Annual Technical Conference
Perils of transitive trust in the domain name system
IMC '05 Proceedings of the 5th ACM SIGCOMM conference on Internet Measurement
Breaking up is hard to do: modeling security threats for smart cards
WOST'99 Proceedings of the USENIX Workshop on Smartcard Technology on USENIX Workshop on Smartcard Technology
Trusted hardware: can it be trustworthy?
Proceedings of the 44th annual Design Automation Conference
Proceedings of the 44th annual Design Automation Conference
A case study on the cost and benefit of dynamic RPC marshalling for low-level system components
ACM SIGOPS Operating Systems Review
Extending prerendered-interface voting software to support accessibility and other ballot features
EVT'07 Proceedings of the USENIX Workshop on Accurate Electronic Voting Technology
Communications of the ACM - 50th anniversary issue: 1958 - 2008
Could googling take down a president?
Communications of the ACM - 50th anniversary issue: 1958 - 2008
Jones optimality and hardware virtualization: a report on work in progress
PEPM '08 Proceedings of the 2008 ACM SIGPLAN symposium on Partial evaluation and semantics-based program manipulation
Designing secure systems on reconfigurable hardware
ACM Transactions on Design Automation of Electronic Systems (TODAES)
Computer forensics in forensis
ACM SIGOPS Operating Systems Review
Journal of Computer Security - The Third IEEE International Symposium on Security in Networks and Distributed Systems
A Classification of Viruses Through Recursion Theorems
CiE '07 Proceedings of the 3rd conference on Computability in Europe: Computation and Logic in the Real World
Efficient and extensible security enforcement using dynamic data flow analysis
Proceedings of the 15th ACM conference on Computer and communications security
Proceedings of the 15th ACM conference on Computer and communications security
Open source vs. closed source software: towards measuring security
Proceedings of the 2009 ACM symposium on Applied Computing
FPGA Analysis Tool: High-Level Flows for Low-Level Design Analysis in Reconfigurable Computing
ARC '09 Proceedings of the 5th International Workshop on Reconfigurable Computing: Architectures, Tools and Applications
The epistemology of computer security
ACM SIGSOFT Software Engineering Notes
What Level of Mathematical Reasoning can Computer Science Demand of a Software Implementer?
Electronic Notes in Theoretical Computer Science (ENTCS)
Context-sensitive analysis of obfuscated x86 executables
Proceedings of the 2010 ACM SIGPLAN workshop on Partial evaluation and program manipulation
NSPW '09 Proceedings of the 2009 workshop on New security paradigms workshop
Security Primitives for Reconfigurable Hardware-Based Systems
ACM Transactions on Reconfigurable Technology and Systems (TRETS)
IWSAS'01 Proceedings of the 2nd international conference on Self-adaptive software: applications
The dark side of threshold cryptography
FC'02 Proceedings of the 6th international conference on Financial cryptography
On run-time enforcement of policies
ASIAN'07 Proceedings of the 12th Asian computing science conference on Advances in computer science: computer and network security
SeReCon: a secure reconfiguration controller for self-reconfigurable systems
International Journal of Critical Computer-Based Systems
Self-generating program specializers
Information Processing Letters
Design Assurance Strategy and Toolset for Partially Reconfigurable FPGA Systems
ACM Transactions on Reconfigurable Technology and Systems (TRETS)
Communications of the ACM
Security in the dutch electronic patient record system
Proceedings of the second annual workshop on Security and privacy in medical and home-care systems
Mechanizing the metatheory of LF
ACM Transactions on Computational Logic (TOCL)
Insider threats to voting systems
Proceedings of the 2010 Workshop on Governance of Technology, Information and Policies
Towards working with small atomic functions
Proceedings of the 15th international conference on Security protocols
Small trusted primitives for dependable systems
ACM SIGOPS Operating Systems Review
A fault tolerance approach to computer viruses
SP'88 Proceedings of the 1988 IEEE conference on Security and privacy
Traceability of executable codes using neural networks
ISC'10 Proceedings of the 13th international conference on Information security
The software industry is the problem
Communications of the ACM
The Software Industry IS the Problem
Queue - Programming Languages
Trusted platform-as-a-service: a foundation for trustworthy cloud-hosted applications
Proceedings of the 3rd ACM workshop on Cloud computing security workshop
Reflections on Trust in Devices: An Informal Survey of Human Trust in an Internet-of-Things Context
Wireless Personal Communications: An International Journal
Context-sensitive analysis without calling-context
Higher-Order and Symbolic Computation
Dynamic policy discovery with remote attestation
FOSSACS'06 Proceedings of the 9th European joint conference on Foundations of Software Science and Computation Structures
SSS'05 Proceedings of the 7th international conference on Self-Stabilizing Systems
Communications of the ACM
Designing for audit: a voting machine with a tiny TCB
FC'10 Proceedings of the 14th international conference on Financial Cryptography and Data Security
Data assurance in opaque computations
ACG'09 Proceedings of the 12th international conference on Advances in Computer Games
Towards Trustworthy Elections
On trojan horses of thompson-goerigk-type, their generation, intrusion, detection and prevention
Concurrency, Compositionality, and Correctness
Dependable and Historic Computing
Editorial: Special section: Trusting software behavior
Future Generation Computer Systems
Research note: Security issues related to mobile code and agent-based systems
Computer Communications
Heedless programming: ignoring detectable error is a widespread hazard
Software—Practice & Experience
Turtles all the way down: a clean-slate, ground-up, first-principles approach to secure systems
Proceedings of the 2012 workshop on New security paradigms
Security of public continuous integration services
Proceedings of the 9th International Symposium on Open Collaboration
Towards reducing the attack surface of software backdoors
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Implementation and implications of a stealth hard-drive backdoor
Proceedings of the 29th Annual Computer Security Applications Conference
Preventing backdoors in server applications with a separated software architecture
DIMVA'13 Proceedings of the 10th international conference on Detection of Intrusions and Malware, and Vulnerability Assessment
Information security aspects of public software
Proceedings of the Fifth International Conference on Management of Emergent Digital EcoSystems
Hi-index | 48.37 |
To what extent should one trust a statement that a program is free of Trojan horses? Perhaps it is more important to trust the people who wrote the software.