A Flexible Framework for Expediting Bug Finding by Leveraging Past (Mis-)Behavior to Discover New BugsSanjeev DasKedrian Jameset al.2020ACSAC 2020
Unleashing Cyber Reasoning: DARPA Transparent Computing Threat Hunting RetrospectiveXiaokui Shu2020ACSAC 2020
SoCurity: A Design Approach for Enhancing SoC SecurityNaorin HossainAlper Buyuktosunogluet al.2023DAC 2023
Towards a Formally Verified Security Monitor for VM-based Confidential ComputingWojciech OzgaGuerney Huntet al.2023MICRO 2023
Enhancing Transparency and Accountability of TPLs with PBOM: A Privacy Bill of MaterialsYue XiaoAdwait Nadkarniet al.2024CCS 2024
Benchmarking the Effect of Poisoning Defenses on the Security and Bias of Deep Learning ModelsNathalie Baracaldo AngelFarhan Ahmedet al.2023S&P 2023
Go or No Go: Differential Fuzzing of Native and C LibrariesAlessandro SorniottiMichael Weissbacheret al.2023S&P 2023
WannaLaugh: A Configurable Ransomware EmulatorDionysios DiamantopoulosRoman Pletkaet al.2024SYSTOR 2024
Dynamic Possible Source Count Analysis for Data Leakage PreventionEri OgawaTetsuro Yamazakiet al.2024MPLR 2024
Atomic cross-chain exchanges of shared assetsKrishnasuri NarayanamVenkatraman Ramakrishnaet al.2022AFT 2022