Understanding and Bridging the Gap Between Unsupervised Network Representation Learning and Security AnalyticsJiacen XuXiaokui Shuet al.2024S&P 2024
Understanding the Privacy Practices of Political Campaigns: A Perspective from the 2020 US Election WebsitesKaushal KaflePrianka Mandalet al.2024S&P 2024
SyzGen++: Dependency Inference for Augmenting Kernel Driver FuzzingWeiteng ChenYu Haoet al.2024S&P 2024
GNNIC: Finding Long-Lost Sibling Functions with Abstract SimilarityQiushi WuZhongshu Guet al.2024NDSS 2024
Security Analysis of the WhatsApp End-to-End Encrypted Backup ProtocolGareth T. DaviesSebastian Falleret al.2023CRYPTO 2023
Not All Data are Created Equal: Data and Pointer Prioritization for Scalable Protection Against Data-Oriented AttacksSalman AhmedHans Liljestrandet al.2023USENIX Security 2023
Fashion Faux Pas: Implicit Stylistic Fingerprints for Bypassing Browsers' Anti-Fingerprinting DefensesXu LinFrederico Araujoet al.2023S&P 2023
Password-Authenticated TLS via OPAQUE and Post-Handshake AuthenticationJulia HesseStanislaw Jareckiet al.2023Eurocrypt 2023
Smart Home Privacy Policies Demystified: A Study of Availability, Content, and CoverageSunil ManandharKaushal Kafleet al.2022USENIX Security 2022