Benchmarking the Effect of Poisoning Defenses on the Security and Bias of Deep Learning ModelsNathalie Baracaldo AngelFarhan Ahmedet al.2023S&P 2023
Go or No Go: Differential Fuzzing of Native and C LibrariesAlessandro SorniottiMichael Weissbacheret al.2023S&P 2023
Atomic cross-chain exchanges of shared assetsKrishnasuri NarayanamVenkatraman Ramakrishnaet al.2022AFT 2022
Bypassing memory safety mechanisms through speculative control flow hijacksAndrea MambrettiAlexandra Sandulescuet al.2021EuroS&P 2021
GhostBuster: Understanding and overcoming the pitfalls of transient execution vulnerability checkersAndrea MambrettiPasquale Convertiniet al.2021SANER 2021
WannaLaugh: A Configurable Ransomware Simulator, Learning to Mimic Malicious Storage TracesDionysios DiamantopoulosRoman Pletkaet al.2024SYSTOR 2024
STRonG: System Topology Risk Analysis on GraphsLars SchneidenbachSandhya Koteshwaraet al.2024CCGrid 2024
EdgeTorrent: Real-time Temporal Graph Representations for Intrusion DetectionIsaiah J. KingXiaokui Shuet al.2023RAID 2023
Efficient Privacy-Preserving Viral Strain Classification via k-mer Signatures and FHEAdi AkaviaBen Galiliet al.2023CSF 2023