JBomAudit: Assessing the Landscape, Compliance, and Security Implications of Java SBOMsYue XiaoDhilung Kiratet al.2025NDSS 2025
Real-Time Outlier Connections Detection in Databases Network TrafficLeonid RodnianskyTania Butovskyet al.2025arXiv
Crossing Shifted Moats: Replacing Old Bridges with New Tunnels to Confidential ContainersRay ValdezMd Salman Ahmedet al.2024CCS 2024
Enhancing Transparency and Accountability of TPLs with PBOM: A Privacy Bill of MaterialsYue XiaoAdwait Nadkarniet al.2024CCS 2024
WannaLaugh: A Configurable Ransomware EmulatorDionysios DiamantopoulosRoman Pletkaet al.2024SYSTOR 2024