FlowMatrix: GPU-Assisted Information-Flow Analysis through Matrix-Based Representation.
Proceedings of the 31st USENIX Security Symposium, 2022
SHADEWATCHER: Recommendation-guided Cyber Threat Analysis using System Audit Records.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
WATSON: Abstracting Behaviors from Audit Logs via Aggregation of Contextual Semantics.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
Scalable Quantitative Verification For Deep Neural Networks.
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering, 2021
Understanding Rowhammer Attacks through the Lens of a Unified Reference Framework.
CoRR, 2019
Fuzzing Program Logic Deeply Hidden in Binary Program Stages.
Proceedings of the 26th IEEE International Conference on Software Analysis, 2019
One Engine To Serve 'em All: Inferring Taint Rules Without Architectural Semantics.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Neural Nets Can Learn Function Type Signatures From Binaries.
Proceedings of the 26th USENIX Security Symposium, 2017
Enabling practical experimentation in cyber-security training.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2017
Data-Oriented Programming: On the Expressiveness of Non-control Data Attacks.
Proceedings of the IEEE Symposium on Security and Privacy, 2016
Preventing Page Faults from Telling Your Secrets.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
"The Web/Local" Boundary Is Fuzzy: A Security Study of Chrome's Process-based Sandboxing.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Preventing Your Faults From Telling Your Secrets: Defenses Against Pigeonhole Attacks.
CoRR, 2015
Automatic Generation of Data-Oriented Exploits.
Proceedings of the 24th USENIX Security Symposium, 2015
Identifying Arbitrary Memory Access Vulnerabilities in Privilege-Separated Software.
Proceedings of the Computer Security - ESORICS 2015, 2015
A Look at Targeted Attacks Through the Lense of an NGO.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
Smartphone Volatile Memory Acquisition for Security Analysis and Forensics Investigation.
Proceedings of the Security and Privacy Protection in Information Processing Systems, 2013