What Recent Vulnerabilities Mean to Rust

GhiHorn: Path Analysis in Ghidra Using SMT Solvers

Managing Time as the Limiting Resource

The Myth of Individual Programmer Productivity

Is Java More Secure than C?

Why Software Architects Must Be Involved

Translating Between Statistics and Machine Learning

When "ASLR" Is Not Really ASLR - The Case of Incorrect Assumptions and Bad Defaults

Security Begins at the Home Router

Announcing CERT Tapioca 2.0 for Network Traffic Analysis

Why does software cost so much?

Revealing "True Emotions" Through Micro-Expressions w/ Machine Learning

Verifying Software with Timers and Clocks

Why Did the Robot Do That? Increasing Trust in Autonomous Robots

DDOS Attacks: Four Best Practices for Prevention and Response

Windows 10 Cannot Protect Insecure Applications Like EMET Can

Three Roles and Three Failure Patterns of Software Architects

Is java more secure than c

Managing Software Complexity in Models