Sequence-based System Call Filtering for Enhanced Container Security, is it beneficial?Somin SongSahil Sunejaet al.2023CCGrid 2023
Password-Authenticated TLS via OPAQUE and Post-Handshake AuthenticationJulia HesseStanislaw Jareckiet al.2023Eurocrypt 2023
Towards Automated Assessment of Organizational Cybersecurity Posture in CloudRoy Bar-HaimLilach Edenet al.2023CODS-COMAD 2023
Automating privacy compliance in the decentralized enterpriseGero DittmannChristopher Giblinet al.2022Big Data 2022
Graph Representation Learning based Vulnerable Target Identification in Ransomware AttacksWenqi WeiMu Qiaoet al.2022Big Data 2022
Full-Stack Information Extraction System for Cybersecurity IntelligenceYoungja ParkTaesung Lee2022EMNLP 2022
RAPID: Real-Time Alert Investigation with Context-aware Prioritization for Efficient Threat DiscoveryYushan LiuXiaokui Shuet al.2022ACSAC 2022
Zero Trust Hardware Architectures: when we “never trust”, what can we do to “always verify?”Mengmei YeSandhya Koteshwara2022WISE 2022
1st Workshop on Data Integrity and Secure Cloud Computing (DISCC-2022)Pradip BoseJennifer Dworaket al.2022MICRO 2022