Marcela S. Melara

Orcid: 0000-0003-3055-404X

According to our database1, Marcela S. Melara authored at least 15 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
SoK: A Defense-Oriented Evaluation of Software Supply Chain Security.
CoRR, 2024

Auditing the CI/CD Platform: Reproducible Builds vs. Hardware-Attested Build Environments, Which is Right for You?
Proceedings of the 2024 Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses, 2024

SCORED '24: Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
A Viewpoint on Software Supply Chain Security: Are We Getting Lost in Translation?
IEEE Secur. Priv., 2023

SCORED '23: Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Software Supply Chain Attribute Integrity (SCAI).
CoRR, 2022

What is Software Supply Chain Security?
CoRR, 2022

SCORED '22: ACM Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Hardware-Enforced Integrity and Provenance for Distributed Code Deployments.
CoRR, 2021

Enabling Security-Oriented Orchestration of Microservices.
CoRR, 2021

2019
Intra-Process Least Privilege and Isolation for Emerging Applications
PhD thesis, 2019

EnclaveDom: Privilege Separation for Large-TCB Applications in Trusted Execution Environments.
CoRR, 2019

Pyronia: Redesigning Least Privilege and Isolation for the Age of IoT.
CoRR, 2019

2015
CONIKS: Bringing Key Transparency to End Users.
Proceedings of the 24th USENIX Security Symposium, 2015

2014
CONIKS: A Privacy-Preserving Consistent Key Service for Secure End-to-End Communication.
IACR Cryptol. ePrint Arch., 2014


  Loading...