Trust but Verify: Uncovering the Hidden Risks of Inaccurate SBOMs with JBomAuditYue XiaoDhilung Kiratet al.2025OSSNA 2025Talk
JBomAudit: Assessing the Landscape, Compliance, and Security Implications of Java SBOMsYue XiaoDhilung Kiratet al.2025NDSS 2025Conference paper
Uncovering Supply Chain Attack with Code Genome FrameworkDhilung KiratJiyong Janget al.2024Black Hat USA 2024Talk
SyzGen++: Dependency Inference for Augmenting Kernel Driver FuzzingWeiteng ChenYu Haoet al.2024S&P 2024Conference paper
Automated Synthesis of Effect Graph Policies for Microservice-Aware Stateful System Call SpecializationWill BlairFred Araujoet al.2024S&P 2024Conference paper
EdgeTorrent: Real-time Temporal Graph Representations for Intrusion DetectionIsaiah J. KingXiaokui Shuet al.2023RAID 2023Conference paper
URET: Universal Robustness Evaluation Toolkit (for Evasion)Kevin EykholtTaesung Leeet al.2023USENIX Security 2023Conference paper
Fashion Faux Pas: Implicit Stylistic Fingerprints for Bypassing Browsers' Anti-Fingerprinting DefensesXu LinFrederico Araujoet al.2023S&P 2023Conference paper
RAPID: Real-Time Alert Investigation with Context-aware Prioritization for Efficient Threat DiscoveryYushan LiuXiaokui Shuet al.2022ACSAC 2022Conference paper
Streamlining and Automating Threat Hunting With KestrelXiaokui ShuPaul Coccoliet al.2022Black Hat USA 2022Demo paper