Automated Synthesis of Effect Graph Policies for Microservice-Aware Stateful System Call SpecializationWill BlairFred Araujoet al.2024S&P 2024
RAPID: Real-Time Alert Investigation with Context-aware Prioritization for Efficient Threat DiscoveryYushan LiuXiaokui Shuet al.2022ACSAC 2022
Speculator: A tool to analyze speculative execution attacks and mitigationsAndrea MambrettiMatthias Neugschwandtneret al.2019ACSAC 2019
Crossing Shifted Moats: Replacing Old Bridges with New Tunnels to Confidential ContainersRay ValdezMd Salman Ahmedet al.2024CCS 2024
GhostRace: Exploiting and Mitigating Speculative Race ConditionsHany RagabAndrea Mambrettiet al.2024USENIX Security 2024
True Attacks, Attack Attempts, or Benign Triggers? An Empirical Measurement of Network Alerts in a Security Operations CenterLimin YangZhi Chenet al.2024USENIX Security 2024
AgraBOT: Accelerating Third-Party Security Risk Management in Enterprise Setting through Generative AIMert ToslaliEdward Snibleet al.2024ESEC/FSE 2024
Understanding and Bridging the Gap Between Unsupervised Network Representation Learning and Security AnalyticsJiacen XuXiaokui Shuet al.2024S&P 2024