Automated Synthesis of Effect Graph Policies for Microservice-Aware Stateful System Call SpecializationWill BlairFred Araujoet al.2024S&P 2024
True Attacks, Attack Attempts, or Benign Triggers? An Empirical Measurement of Network Alerts in a Security Operations CenterLimin YangZhi Chenet al.2024USENIX Security 2024
Fashion Faux Pas: Implicit Stylistic Fingerprints for Bypassing Browsers' Anti-Fingerprinting DefensesXu LinFrederico Araujoet al.2023S&P 2023
SoCurity: A Design Approach for Enhancing SoC SecurityNaorin HossainAlper Buyuktosunogluet al.2023DAC 2023
Benchmarking the Effect of Poisoning Defenses on the Security and Bias of Deep Learning ModelsNathalie Baracaldo AngelFarhan Ahmedet al.2023S&P 2023
Atomic cross-chain exchanges of shared assetsKrishnasuri NarayanamVenkatraman Ramakrishnaet al.2022AFT 2022
WannaLaugh: A Configurable Ransomware Simulator, Learning to Mimic Malicious Storage TracesDionysios DiamantopoulosRoman Pletkaet al.2024SYSTOR 2024