2024
CTINEXUS: Leveraging Optimized LLM In-Context Learning for Constructing Cybersecurity Knowledge Graphs Under Data Scarcity.
CoRR, 2024
P4Control: Line-Rate Cross-Host Attack Prevention via In-Network Information Flow Control Enabled by Programmable Switches and eBPF.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
An Analysis of Recent Advances in Deepfake Image Detection in an Evolving Threat Landscape.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
<i>ThreatKG: </i> An AI-Powered System for Automated Open-Source Cyber Threat Intelligence Gathering and Management.
Proceedings of the 1st ACM Workshop on Large AI Systems and Models with Privacy and Safety Analysis, 2024
VFIX: Facilitating Software Maintenance of Smart Contracts via Automatically Fixing Vulnerabilities.
Proceedings of the IEEE International Conference on Software Maintenance and Evolution, 2024
2023
CONTRACTFIX: A Framework for Automatically Fixing Vulnerabilities in Smart Contracts.
CoRR, 2023
PrivMon: A Stream-Based System for Real-Time Privacy Attack Detection for Machine Learning Models.
Proceedings of the 26th International Symposium on Research in Attacks, 2023
2022
IEEE Trans. Dependable Secur. Comput., 2022
ThreatKG: A Threat Knowledge Graph for Automated Open-Source Cyber Threat Intelligence Gathering and Management.
CoRR, 2022
Zebra: Deeply Integrating System-Level Provenance Search and Tracking for Efficient Attack Investigation.
CoRR, 2022
PrivGuard: Privacy Regulation Compliance Made Easier.
Proceedings of the 31st USENIX Security Symposium, 2022
Back-Propagating System Dependency Impact for Attack Investigation.
Proceedings of the 31st USENIX Security Symposium, 2022
A Knowledge Base Question Answering System for Cyber Threat Knowledge Acquisition.
Proceedings of the 38th IEEE International Conference on Data Engineering, 2022
2021
A System for Automated Open-Source Threat Intelligence Gathering and Management.
Proceedings of the SIGMOD '21: International Conference on Management of Data, 2021
CHAMP: Characterizing Undesired App Behaviors from User Comments based on Market Policies.
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering, 2021
Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence.
Proceedings of the 37th IEEE International Conference on Data Engineering, 2021
A System for Efficiently Hunting for Cyber Threats in Computer Systems Using Threat Intelligence.
Proceedings of the 37th IEEE International Conference on Data Engineering, 2021
2020
HyperService: Interoperability and Programmability Across Heterogeneous Blockchains.
IACR Cryptol. ePrint Arch., 2020
Querying Streaming System Monitoring Data for Enterprise System Anomaly Detection.
Proceedings of the 36th IEEE International Conference on Data Engineering, 2020
2019
Effective and Efficient Forensic Analysis via System Monitoring
PhD thesis, 2019
A Query System for Efficiently Investigating Complex Attack Behaviors for Enterprise Security.
Proc. VLDB Endow., 2019
A Stream-based Query System for Efficiently Detecting Abnormal System Behaviors for Enterprise Security.
CoRR, 2019
Data Capsule: A New Paradigm for Automatic Compliance with Data Privacy Regulations.
Proceedings of the Heterogeneous Data Management, Polystores, and Analytics for Healthcare, 2019
IconIntent: automatic identification of sensitive UI widgets based on icon classification for Android apps.
Proceedings of the 41st International Conference on Software Engineering, 2019
DeepIntent: Deep Icon-Behavior Learning for Detecting Intention-Behavior Discrepancy in Mobile Apps.
,
,
,
,
,
,
,
,
,
,
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
A Query Tool for Efficiently Investigating Risky Software Behaviors.
CoRR, 2018
AIQL: Enabling Efficient Attack Investigation from System Monitoring Data.
CoRR, 2018
SAQL: A Stream-based Query System for Real-Time Abnormal System Behavior Detection.
Proceedings of the 27th USENIX Security Symposium, 2018
AIQL: Enabling Efficient Attack Investigation from System Monitoring Data.
Proceedings of the 2018 USENIX Annual Technical Conference, 2018
SYBILFUSE: Combining Local Attributes with Global Structure to Perform Robust Sybil Detection.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018
2015
SybilFrame: A Defense-in-Depth Framework for Structure-Based Sybil Detection.
CoRR, 2015
Exploiting Temporal Dynamics in Sybil Defenses.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015