Papers
Communities
Events
Blog
Pricing
Search
Open menu
Home
Papers
2412.17329
Cited By
v1
v2 (latest)
SoK: The Design Paradigm of Safe and Secure Defaults
23 December 2024
Jukka Ruohonen
SILM
Re-assign community
ArXiv (abs)
PDF
HTML
Papers citing
"SoK: The Design Paradigm of Safe and Secure Defaults"
15 / 15 papers shown
Title
A Mapping Analysis of Requirements Between the CRA and the GDPR
Jukka Ruohonen
Kalle Hjerppe
Eun-Young Kang
84
5
0
03 Mar 2025
Vulnerability Coordination Under the Cyber Resilience Act
Jukka Ruohonen
Paul Timmers
112
4
0
09 Dec 2024
Is Your Kettle Smarter Than a Hacker? A Scalable Tool for Assessing Replay Attack Vulnerabilities on Consumer IoT Devices
Sara Lazzaro
Vincenzo De Angelis
A. Mandalari
Francesco Buccafurri
62
9
0
22 Jan 2024
From Dragondoom to Dragonstar: Side-channel Attacks and Formally Verified Implementation of WPA3 Dragonfly Handshake
Daniel De Almeida Braga
Natalia Kulatova
M. Sabt
Pierre-Alain Fouque
K. Bhargavan
AAML
45
2
0
18 Jul 2023
Mysterious and Manipulative Black Boxes: A Qualitative Analysis of Perceptions on Recommender Systems
Jukka Ruohonen
78
5
0
20 Feb 2023
SROS2: Usable Cyber Security Tools for ROS 2
Víctor Mayoral-Vilches
Ruffin White
Gianluca Caiazza
Mikael Arguedas
124
25
0
04 Aug 2022
Evaluation of Runtime Monitoring for UAV Emergency Landing
Joris Guérin
Kevin Delmas
Jérémie Guiochet
63
13
0
07 Feb 2022
KGSecConfig: A Knowledge Graph Based Approach for Secured Container Orchestrator Configuration
Mubin Ul Haque
M. M. Kholoosi
Muhammad Ali Babar
40
13
0
21 Dec 2021
Tortured phrases: A dubious writing style emerging in science. Evidence of critical issues affecting established journals
G. Cabanac
C. Labbé
A. Magazinov
DeLMO
118
86
0
12 Jul 2021
Coding Practices and Recommendations of Spring Security for Enterprise Applications
Mazharul Islam
Sazzadur Rahaman
Na Meng
Behnaz Hassanshahi
P. Krishnan
Danfeng
D. Yao
30
11
0
28 Jul 2020
Testing And Hardening IoT Devices Against the Mirai Botnet
Christopher Kelly
Nikolaos Pitropakis
Sean McKeown
Costas Lambrinoudakis
21
22
0
27 Jul 2020
A Comprehensive Approach to Abusing Locality in Shared Web Hosting Servers
Seyed Ali Mirheidari
Sajjad Arshad
Saeidreza Khoshkdahan
R. Jalili
45
8
0
02 Nov 2018
High-level Cryptographic Abstractions
Christopher Kane
Bo Lin
Saksham Chand
Scott D. Stoller
Yanhong A. Liu
57
8
0
22 Oct 2018
Secure Coding Practices in Java: Challenges and Vulnerabilities
Na Meng
Stefan Nagy
D. Yao
Wenjie Zhuang
Gustavo A. Arango-Argoty
SILM
42
142
0
28 Sep 2017
Danger is My Middle Name: Experimenting with SSL Vulnerabilities in Android Apps
Lucky Onwuzurike
Emiliano De Cristofaro
67
68
0
04 May 2015
1