Automated Synthesis of Effect Graph Policies for Microservice-Aware Stateful System Call SpecializationWill BlairFred Araujoet al.2024S&P 2024
RAPID: Real-Time Alert Investigation with Context-aware Prioritization for Efficient Threat DiscoveryYushan LiuXiaokui Shuet al.2022ACSAC 2022
Adaptive Verifiable Training Using Pairwise Class SimilarityShiqi WangKevin Eykholtet al.2021AAAI 2021
SyzGen++: Dependency Inference for Augmenting Kernel Driver FuzzingWeiteng ChenYu Haoet al.2024S&P 2024
URET: Universal Robustness Evaluation Toolkit (for Evasion)Kevin EykholtTaesung Leeet al.2023USENIX Security 2023
Fashion Faux Pas: Implicit Stylistic Fingerprints for Bypassing Browsers' Anti-Fingerprinting DefensesXu LinFrederico Araujoet al.2023S&P 2023
Hunting for invisibility: Characterizing and detecting malicious web infrastructures through server visibility analysisJialong ZhangXin Huet al.2016INFOCOM 2016
The Dropper effect: Insights into malware distribution with downloader graph analyticsBum Jun KwonJayanta Mondalet al.2015CCS 2015