Understanding the Privacy Practices of Political Campaigns: A Perspective from the 2020 US Election WebsitesKaushal KaflePrianka Mandalet al.2024S&P 2024
Automated Synthesis of Effect Graph Policies for Microservice-Aware Stateful System Call SpecializationWill BlairFred Araujoet al.2024S&P 2024
SyzGen++: Dependency Inference for Augmenting Kernel Driver FuzzingWeiteng ChenYu Haoet al.2024S&P 2024
STRonG: System Topology Risk Analysis on GraphsLars SchneidenbachSandhya Koteshwaraet al.2024CCGrid 2024
GNNIC: Finding Long-Lost Sibling Functions with Abstract SimilarityQiushi WuZhongshu Guet al.2024NDSS 2024
Towards a Formally Verified Security Monitor for VM-based Confidential ComputingWojciech OzgaGuerney Huntet al.2023MICRO 2023
EdgeTorrent: Real-time Temporal Graph Representations for Intrusion DetectionIsaiah J. KingXiaokui Shuet al.2023RAID 2023
Security Analysis of the WhatsApp End-to-End Encrypted Backup ProtocolGareth T. DaviesSebastian Falleret al.2023CRYPTO 2023
Not All Data are Created Equal: Data and Pointer Prioritization for Scalable Protection Against Data-Oriented AttacksSalman AhmedHans Liljestrandet al.2023USENIX Security 2023