Structural data De-Anonymization: Quantification, practice, and implicationsShouling JiWeiqing Liet al.2014CCS 2014
A tale of two kernels: Towards ending kernel hardening wars with split kernelAnil KurmusRobby Zippel2014CCS 2014
ALETHEIA: Improving the usability of static security analysisOmer TrippSalvatore Guarnieriet al.2014CCS 2014
MACE: Detecting privilege escalation vulnerabilities in web applicationsMaliheh MonshizadehPrasad Naldurget al.2014CCS 2014
Reconciling end-to-end confidentiality and data reduction in cloud storageNathalie BaracaldoElli Androulakiet al.2014CCS 2014