Articles
Don’t Let Bugs Byte: A Practical Introduction into Static Analysis
Building a mobile app is hard. Securing it is even...
Read MoreFrom academic research to standardisation
Academic research is considered the spearhead of innovation, designing the...
Read MoreSecurity by Design: Embedding Secure Coding Practices
In the context of increasing cyber threats and the growing...
Read MoreIris: Dynamic Privacy Preserving Search in Authenticated Chord Peer−to−Peer Networks
Peer-to-Peer (P2P) networks facilitate decentralized communication between nodes, allowing each...
Read MoreFormal Verification of PKCS#1 Signature Parser using Frama-C
Authors – Martin Hána, Nikolai Kosmatov, Virgile Prevosto and Julien...
Read MorePyTrim: A Practical Tool for Reducing Python Dependency Bloat
Authors – Konstantinos Karakatsanis, Georgios Alexopoulos, Ioannis Karyotakis, Foivos Timotheos...
Read MoreEpilogue: From Visualization to Actionable Security in Software Development
Introduction Over the course of our series [Link 1, Link...
Read MoreContainer Security Best Practices with Docker
Docker containers have significantly transformed software development and deployment, offering...
Read MoreWeeding old libraries – a short debloating use case
You might know this: There is a library around serving...
Read More