SecDev 2026
2026 ACM Secure Development Conference (SecDev 2026)
Powered by
Conference Publishing Consulting

2026 ACM Secure Development Conference (SecDev 2026), July 5–6, 2026, Montreal, QC, Canada

SecDev 2026 – Preliminary Table of Contents

Contents - Abstracts - Authors

Frontmatter

Title Page
Article: fsesecdev26foreword-fm000-p
Welcome from the Chairs
Article: fsesecdev26foreword-fm001-p
SecDev 2026 Organization
Article: fsesecdev26foreword-fm002-p
Sponsors
Article: fsesecdev26foreword-fm003-p

Papers

TEE-MB: A Secure Framework for Middleboxes Leveraging Trusted Execution Environments
Mahmoud Hofny, Lianying Zhao, and Amr Youssef
(Concordia University, Canada; Carleton University, Canada)
Article Search Article: fsesecdev26main-p7-p
Origin Story: A Comprehensive Lifecycle Analysis of Same-Origin Policy Bugs
Jakub Szymsza, Gertjan Franken, Vik Vanderlinden, Tom Van Goethem, Mathy Vanhoef, and Lieven Desmet
(DistriNet at KU Leuven, Belgium)
Article Search Article: fsesecdev26main-p9-p
CFIghter: Automated Control-Flow Integrity Enablement and Evaluation for Legacy C/C++ Systems
Sabine Houy, Bruno Kreyssig, and Alexandre Bartel
(Umeå University, Sweden)
Article Search Article: fsesecdev26main-p10-p
ASN1spect: Uncovering ASN.1 Compiler-Generated Vulnerabilities in Critical Infrastructure
Seaver Thorn, Nathaniel Bennett, Kevin Butler, Patrick Traynor, and William Enck
(North Carolina State University, USA; University of Florida, USA)
Article Search Article: fsesecdev26main-p11-p
SoK: A Modularized Framework for Symbolic Execution and Application for Usable Tool Design
James Mattei, Andrew Lin, Jasper Geer, Jie Hu, Moritz Schloegel, Tiffany Bao, and Daniel Votipka
(Tufts University, USA; University of British Columbia, Canada; Arizona State University, USA; CISPA Helmholtz Center for Information Security, Germany)
Article Search Article: fsesecdev26main-p17-p
On the Variability of Source Code in Maven Package Rebuilds
Jens Dietrich and Behnaz Hassanshahi
(Victoria University of Wellington, New Zealand; Oracle Labs, Australia)
Article Search Article: fsesecdev26main-p19-p
At the Precipice of Integrity Protection using Pointer Authentication
Viorel Preoteasa, Carlos Chinea Pérez, Hans Liljestrand, and Jan-Erik Ekberg
(Huawei Technologies, Finland)
Article Search Article: fsesecdev26main-p21-p
Adversarially Mixed Secret Key Generation for Side-Channel Defense for the Cloud
Venkat Sai Suman Lamba Karanam, Zahmeeth Sayed Sakkaff, and Pasindu Balasooriya
(Bowling Green State University, USA; West Virginia University, USA)
Article Search Article: fsesecdev26main-p24-p
RepliGuard: Policy-Driven Replica Management Framework for Protecting against Acoustic Attacks
Jennifer Sheldon, Yungwoo Ko, Sri Hrushikesh Varma Bhupathiraju, Sara Osmanovic, Weidong Zhu, Md Jahidul Islam, and Sara Rampazzi
(University of Florida, USA; Florida International University, USA)
Article Search Artifacts Available Article: fsesecdev26main-p25-p
SoK: A Comprehensive Analysis of the Current Status of Neural Tangent Generalization Attacks with Research Directions
Thushari Hapuarachchi and Kaiqi Xiong
(University of South Florida, USA)
Article Search Article: fsesecdev26main-p26-p
A Technology-Readiness Evaluation of Private Set Intersection
Wout Ceulemans, Pieter Philippaerts, Dimitri Van Landuyt, and Wouter Joosen
(KU Leuven, Belgium)
Article Search Article: fsesecdev26main-p32-p
SafeAIMerge: A Tool for Integrating DAST and LLM-Generated Security Feedback into GitHub Actions Workflows
Arpit Thool, Justin Smith, and Chris Brown
(Virginia Tech, USA; Lafayette College, USA)
Article Search Article: fsesecdev26main-p35-p
Reality Check: Independent Evaluation of Modern Grey-Box Fuzzing Techniques
Pavel Frolikov
(University of California at Irvine, USA)
Article Search Article: fsesecdev26main-p36-p
Syntax Is Easy, Semantics Is Hard: Evaluating LLMs for LTL Translation
Priscilla Kyei Danso, Mohammad Saqib Hasan, Niranjan Balasubramanian, and Omar Chowdhury
(Stony Brook University, USA)
Article Search Article: fsesecdev26main-p38-p

Practitioner Papers

A CNN-LSTM Security Model for SCADA Network
Olga Dye and Brian Dye
(University of Texas at Dallas, USA; University of Louisiana at Lafayette, USA)
Article Search Article: fsesecdev26pract-p1-p
Augment Mutual TLS Authentication with HW Rooted Identity
Dhananjay Phadke and Xiling Sun
(Microsoft Corporation, USA)
Article Search Article: fsesecdev26pract-p3-p
Cloud Safety: A Hardware Perspective
Raghudeep Kannavara, Matthew Dickinson, and Monty Wiseman
(Oracle, USA)
Article Search Article: fsesecdev26pract-p4-p
OpenClaw RedTeam Recon: A Local OSS-LLM-Powered Autonomous Reconnaissance Agent
Marcelo Garcia and Robson de Oliveira Albuquerque
(Federal Fluminense University, Brazil; Catholic University of Brasilia, Brazil)
Article Search Article: fsesecdev26pract-p5-p

proc time: 8.24