JBomAudit: Assessing the Landscape, Compliance, and Security Implications of Java SBOMsYue XiaoDhilung Kiratet al.2025NDSS 2025
Uncovering Supply Chain Attack with Code Genome FrameworkDhilung KiratJiyong Janget al.2024Black Hat USA 2024
SyzGen++: Dependency Inference for Augmenting Kernel Driver FuzzingWeiteng ChenYu Haoet al.2024S&P 2024
Automated Synthesis of Effect Graph Policies for Microservice-Aware Stateful System Call SpecializationWill BlairFred Araujoet al.2024S&P 2024
EdgeTorrent: Real-time Temporal Graph Representations for Intrusion DetectionIsaiah J. KingXiaokui Shuet al.2023RAID 2023
URET: Universal Robustness Evaluation Toolkit (for Evasion)Kevin EykholtTaesung Leeet al.2023USENIX Security 2023
Fashion Faux Pas: Implicit Stylistic Fingerprints for Bypassing Browsers' Anti-Fingerprinting DefensesXu LinFrederico Araujoet al.2023S&P 2023
RAPID: Real-Time Alert Investigation with Context-aware Prioritization for Efficient Threat DiscoveryYushan LiuXiaokui Shuet al.2022ACSAC 2022
Streamlining and Automating Threat Hunting With KestrelXiaokui ShuPaul Coccoliet al.2022Black Hat USA 2022
An Open Stack for Threat Hunting in Hybrid Cloud With Connected ObservabilityXiaokui ShuFred Araujoet al.2021Black Hat Europe 2021