GhostRace: Exploiting and Mitigating Speculative Race ConditionsHany RagabAndrea Mambrettiet al.2024USENIX Security 2024
True Attacks, Attack Attempts, or Benign Triggers? An Empirical Measurement of Network Alerts in a Security Operations CenterLimin YangZhi Chenet al.2024USENIX Security 2024
A New Theoretical Perspective on Data Heterogeneity in Federated AveragingJiayi WangShiqiang Wanget al.2024ICML 2024
FADAS: Towards Federated Adaptive Asynchronous OptimizationYujia WangShiqiang Wanget al.2024ICML 2024
Be Your Own Neighborhood: Detecting Adversarial Examples by the Neighborhood Relations Built on Self-Supervised LearningZhiyuan HeYijun Yanget al.2024ICML 2024
AgraBOT: Accelerating Third-Party Security Risk Management in Enterprise Setting through Generative AIMert ToslaliEdward Snibleet al.2024ESEC/FSE 2024
Securing AI Inference in the Cloud: Is CPU-GPU Confidential Computing ready ?Apoorve MohanMengmei Yeet al.2024CLOUD 2024
S2TAR-Cloud: Shared Secure Trusted Accelerators with Reconfiguration for Machine Learning in the CloudWei RenSandhya Koteshwaraet al.2024CLOUD 2024
UniNet: Accelerating the Container Network Data Plane in IaaS CloudsYuan MaScott C Smithet al.2024CLOUD 2024
A Secure Framework for Continuous Compliance across Heterogeneous Policy Validation PointsTakumi YanagawaVikas Agarwalet al.2024CLOUD 2024