Santiago Torres-Arias

Orcid: 0000-0002-9283-3557

According to our database1, Santiago Torres-Arias authored at least 27 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Establishing Provenance Before Coding: Traditional and Next-Gen Signing.
CoRR, 2024

DiVerify: Diversifying Identity Verification in Next-Generation Software Signing.
CoRR, 2024

An Industry Interview Study of Software Signing for Supply Chain Security.
CoRR, 2024

SoK: A Defense-Oriented Evaluation of Software Supply Chain Security.
CoRR, 2024

Signing in Four Public Software Package Registries: Quantity, Quality, and Influencing Factors.
CoRR, 2024

Signing in Four Public Software Package Registries: Quantity, Quality, and Influencing Factors.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Should Smart Homes Be Afraid of Evil Maids? : Identifying Vulnerabilities in IoT Device Firmware.
Proceedings of the 14th IEEE Annual Computing and Communication Workshop and Conference, 2024

2023
Towards verifiable web-based code review systems.
J. Comput. Secur., 2023

A Viewpoint on Knowing Software: Bill of Materials Quality When You See It.
IEEE Secur. Priv., 2023

A Viewpoint on Software Supply Chain Security: Are We Getting Lost in Translation?
IEEE Secur. Priv., 2023

Rust for Embedded Systems: Current State, Challenges and Open Problems.
CoRR, 2023

Preventing Supply Chain Vulnerabilities in Java with a Fine-Grained Permission Manager.
CoRR, 2023

Behind the Scenes: Uncovering TLS and Server Certificate Practice of IoT Device Vendors in the Wild.
Proceedings of the 2023 ACM on Internet Measurement Conference, 2023

Speranza: Usable, Privacy-friendly Software Signing.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

SCORED '23: Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Bootstrapping Trust in Community Repository Projects.
Proceedings of the Security and Privacy in Communication Networks, 2022

SoK: Analysis of Software Supply Chain Security by Establishing Secure Design Properties.
Proceedings of the 2022 ACM Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses, 2022

SCORED '22: ACM Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Sigstore: Software Signing for Everybody.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
COLBAC: Shifting Cybersecurity from Hierarchical to Horizontal Designs.
Proceedings of the NSPW '21: New Security Paradigms Workshop, Virtual Event, USA, October 25, 2021

2020
Towards adding verifiability to web-based Git repositories.
J. Comput. Secur., 2020

2019
in-toto: Providing farm-to-table guarantees for bits and bytes.
Proceedings of the 28th USENIX Security Symposium, 2019

Commit Signatures for Centralized Version Control Systems.
Proceedings of the ICT Systems Security and Privacy Protection, 2019

2018
le-git-imate: Towards Verifiable Web-based Git Repositories.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2016
On Omitting Commits and Committing Omissions: Preventing Git Metadata Tampering That (Re)introduces Software Vulnerabilities.
Proceedings of the 25th USENIX Security Symposium, 2016

Diplomat: Using Delegations to Protect Community Repositories.
Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation, 2016

2014
PolyPasswordHasher: Improving Password Storage Security.
login Usenix Mag., 2014


  Loading...