True Attacks, Attack Attempts, or Benign Triggers? An Empirical Measurement of Network Alerts in a Security Operations CenterLimin YangZhi Chenet al.2024USENIX Security 2024
Uncovering Supply Chain Attack with Code Genome FrameworkDhilung KiratJiyong Janget al.2024Black Hat USA 2024
AgraBOT: Accelerating Third-Party Security Risk Management in Enterprise Setting through Generative AIMert ToslaliEdward Snibleet al.2024ESEC/FSE 2024
SyzGen++: Dependency Inference for Augmenting Kernel Driver FuzzingWeiteng ChenYu Haoet al.2024S&P 2024
Understanding the Privacy Practices of Political Campaigns: A Perspective from the 2020 US Election WebsitesKaushal KaflePrianka Mandalet al.2024S&P 2024
Understanding and Bridging the Gap Between Unsupervised Network Representation Learning and Security AnalyticsJiacen XuXiaokui Shuet al.2024S&P 2024
Automated Synthesis of Effect Graph Policies for Microservice-Aware Stateful System Call SpecializationWill BlairFred Araujoet al.2024S&P 2024
STRonG: System Topology Risk Analysis on GraphsLars SchneidenbachSandhya Koteshwaraet al.2024CCGrid 2024
GNNIC: Finding Long-Lost Sibling Functions with Abstract SimilarityQiushi WuZhongshu Guet al.2024NDSS 2024
Towards a Formally Verified Security Monitor for VM-based Confidential ComputingWojciech OzgaGuerney Huntet al.2023MICRO 2023