From Confidential Computing to Zero Trust, Come Along for the (Bumpy?) RideMengmei YeSandhya Koteshwaraet al.2024MICRO 2024
Manipulating OpenFlow Link Discovery Packet Forwarding for Topology PoisoningMingming ChenTom La Portaet al.2024CCS 2024
Crossing Shifted Moats: Replacing Old Bridges with New Tunnels to Confidential ContainersRay ValdezMd Salman Ahmedet al.2024CCS 2024
SeaK: Rethinking the Design of a Secure Allocator for OS KernelZicheng WangYicheng Guanget al.2024USENIX Security 2024
True Attacks, Attack Attempts, or Benign Triggers? An Empirical Measurement of Network Alerts in a Security Operations CenterLimin YangZhi Chenet al.2024USENIX Security 2024
Advancements in Traffic Processing Using Programmable Hardware Flow OffloadLuca DeriAlfredo Cardiglianoet al.2024HPSR 2024
A Secure Framework for Continuous Compliance across Heterogeneous Policy Validation PointsTakumi YanagawaVikas Agarwalet al.2024CLOUD 2024
Online Learning and Model Pruning Against Concept Drifts in Edge DevicesSimone MagnaniSeshu Tirupathiet al.2024NetSoft 2024
Ultra-Compact Computing at the Edge Involving Unobtrusively Small Sub-millimeter Heterogeneous Integration PackagingFrank LibschSteve Bedellet al.2024ECTC 2024
Automated Synthesis of Effect Graph Policies for Microservice-Aware Stateful System Call SpecializationWill BlairFred Araujoet al.2024S&P 2024