Cross-Cache Attacks for the Linux Kernel via PCP MassagingClaudio MigliorelliAndrea Mambrettiet al.2026NDSS 2026
Distributed Broadcast Encryption for Confidential Interoperability across Private BlockchainsAngelo De CaroKaoutar El Khiyaouiet al.2026NDSS 2026
Automated Annotation Inference for MCP-based AgentsGrigoris NtousakisJulian James Stephenet al.2025SOSP 2025
Save what must be saved: Secure context switching with SailorNeelu S. KalaniThomas Bourgeatet al.2025USENIX Security 2025
SoK: Automating Kernel Vulnerability Discovery and Exploit GenerationAnil KurmusAndrea Mambrettiet al.2025WOOT 2025
Trust but Verify: Uncovering the Hidden Risks of Inaccurate SBOMs with JBomAuditYue XiaoDhilung Kiratet al.2025OSSNA 2025
Agile Design of Secure and Resilient AI-Centric SystemsLuca CarloniJoseph Zuckermanet al.2025ISCA 2025
PAKE Combiners and Efficient Post-Quantum InstantiationsJulia HesseMichael Rosenberg2025Eurocrypt 2025
Automated Expansion of Privacy Data Taxonomy for Compliant Data Breach NotificationYue QinYue Xiaoet al.2025NDSS 2025
JBomAudit: Assessing the Landscape, Compliance, and Security Implications of Java SBOMsYue XiaoDhilung Kiratet al.2025NDSS 2025