Security Metrics in Pre-Silicon Processor and System DesignNaorin HossainWilliam Santiago Fernandezet al.2024ICMC 2024
Dynamic Possible Source Count Analysis for Data Leakage PreventionEri OgawaTetsuro Yamazakiet al.2024MPLR 2024
WannaLaugh: A Configurable Ransomware EmulatorDionysios DiamantopoulosRoman Pletkaet al.2024SYSTOR 2024
GhostRace: Exploiting and Mitigating Speculative Race ConditionsHany RagabAndrea Mambrettiet al.2024USENIX Security 2024
True Attacks, Attack Attempts, or Benign Triggers? An Empirical Measurement of Network Alerts in a Security Operations CenterLimin YangZhi Chenet al.2024USENIX Security 2024
Uncovering Supply Chain Attack with Code Genome FrameworkDhilung KiratJiyong Janget al.2024Black Hat USA 2024
AgraBOT: Accelerating Third-Party Security Risk Management in Enterprise Setting through Generative AIMert ToslaliEdward Snibleet al.2024ESEC/FSE 2024
Automated Synthesis of Effect Graph Policies for Microservice-Aware Stateful System Call SpecializationWill BlairFred Araujoet al.2024S&P 2024
SyzGen++: Dependency Inference for Augmenting Kernel Driver FuzzingWeiteng ChenYu Haoet al.2024S&P 2024
Understanding and Bridging the Gap Between Unsupervised Network Representation Learning and Security AnalyticsJiacen XuXiaokui Shuet al.2024S&P 2024