True Attacks, Attack Attempts, or Benign Triggers? An Empirical Measurement of Network Alerts in a Security Operations CenterLimin YangZhi Chenet al.2024USENIX Security 2024
SeaK: Rethinking the Design of a Secure Allocator for OS KernelZicheng WangYicheng Guanget al.2024USENIX Security 2024
Advancements in Traffic Processing Using Programmable Hardware Flow OffloadLuca DeriAlfredo Cardiglianoet al.2024HPSR 2024
A Secure Framework for Continuous Compliance across Heterogeneous Policy Validation PointsTakumi YanagawaVikas Agarwalet al.2024CLOUD 2024
Online Learning and Model Pruning Against Concept Drifts in Edge DevicesSimone MagnaniSeshu Tirupathiet al.2024NetSoft 2024
Ultra-Compact Computing at the Edge Involving Unobtrusively Small Sub-millimeter Heterogeneous Integration PackagingFrank LibschSteve Bedellet al.2024ECTC 2024
Automated Synthesis of Effect Graph Policies for Microservice-Aware Stateful System Call SpecializationWill BlairFred Araujoet al.2024S&P 2024
STRonG: System Topology Risk Analysis on GraphsLars SchneidenbachSandhya Koteshwaraet al.2024CCGrid 2024
Using automation to mitigate risk and enforce policy complianceMatthew JonesYuji Watanabeet al.2024Red Hat Summit 2024
Efficient Privacy-Preserving Viral Strain Classification via k-mer Signatures and FHEAdi AkaviaBen Galiliet al.2024RECOMB 2024