Crossing Shifted Moats: Replacing Old Bridges with New Tunnels to Confidential ContainersRay ValdezMd Salman Ahmedet al.2024CCS 2024
Enhancing Transparency and Accountability of TPLs with PBOM: A Privacy Bill of MaterialsYue XiaoAdwait Nadkarniet al.2024CCS 2024
Security Metrics in Pre-Silicon Processor and System DesignNaorin HossainWilliam Santiago Fernandezet al.2024ICMC 2024
Dynamic Possible Source Count Analysis for Data Leakage PreventionEri OgawaTetsuro Yamazakiet al.2024MPLR 2024
WannaLaugh: A Configurable Ransomware EmulatorDionysios DiamantopoulosRoman Pletkaet al.2024SYSTOR 2024
GhostRace: Exploiting and Mitigating Speculative Race ConditionsHany RagabAndrea Mambrettiet al.2024USENIX Security 2024
True Attacks, Attack Attempts, or Benign Triggers? An Empirical Measurement of Network Alerts in a Security Operations CenterLimin YangZhi Chenet al.2024USENIX Security 2024
Uncovering Supply Chain Attack with Code Genome FrameworkDhilung KiratJiyong Janget al.2024Black Hat USA 2024
AgraBOT: Accelerating Third-Party Security Risk Management in Enterprise Setting through Generative AIMert ToslaliEdward Snibleet al.2024ESEC/FSE 2024
Understanding and Bridging the Gap Between Unsupervised Network Representation Learning and Security AnalyticsJiacen XuXiaokui Shuet al.2024S&P 2024