Fashion Faux Pas: Implicit Stylistic Fingerprints for Bypassing Browsers' Anti-Fingerprinting DefensesXu LinFrederico Araujoet al.2023S&P 2023
Sequence-based System Call Filtering for Enhanced Container Security, is it beneficial?Somin SongSahil Sunejaet al.2023CCGrid 2023
Password-Authenticated TLS via OPAQUE and Post-Handshake AuthenticationJulia HesseStanislaw Jareckiet al.2023Eurocrypt 2023
Towards Automated Assessment of Organizational Cybersecurity Posture in CloudRoy Bar-HaimLilach Edenet al.2023CODS-COMAD 2023
Automating privacy compliance in the decentralized enterpriseGero DittmannChristopher Giblinet al.2022Big Data 2022
Graph Representation Learning based Vulnerable Target Identification in Ransomware AttacksWenqi WeiMu Qiaoet al.2022Big Data 2022
Full-Stack Information Extraction System for Cybersecurity IntelligenceYoungja ParkTaesung Lee2022EMNLP 2022
RAPID: Real-Time Alert Investigation with Context-aware Prioritization for Efficient Threat DiscoveryYushan LiuXiaokui Shuet al.2022ACSAC 2022