Tudor Dumitras
Orcid: 0000-0003-4350-7226Affiliations:
- University of Maryland, College Park, MD, USA
- Carnegie Mellon University, Pittsburgh, USA
According to our database1,
Tudor Dumitras
authored at least 79 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on twitter.com
-
on orcid.org
-
on ece.cmu.edu
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
SCAVY: Automated Discovery of Memory Corruption Targets in Linux Kernel for Privilege Escalation.
Proceedings of the 33rd USENIX Security Symposium, 2024
Understanding, Uncovering, and Mitigating the Causes of Inference Slowdown for Language Models.
Proceedings of the IEEE Conference on Secure and Trustworthy Machine Learning, 2024
Proceedings of the Twelfth International Conference on Learning Representations, 2024
Proceedings of the Twelfth International Conference on Learning Representations, 2024
2022
Expected Exploitability: Predicting the Development of Functional Vulnerability Exploits.
Proceedings of the 31st USENIX Security Symposium, 2022
2021
When Malware Changed Its Mind: An Empirical Study of Variable Program Behaviors in the Real World.
Proceedings of the 30th USENIX Security Symposium, 2021
Qu-ANTI-zation: Exploiting Quantization Artifacts for Achieving Adversarial Outcomes.
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021
Proceedings of the 38th International Conference on Machine Learning, 2021
A Panda? No, It's a Sloth: Slowdown Attacks on Adaptive Multi-Exit Neural Network Inference.
Proceedings of the 9th International Conference on Learning Representations, 2021
Security Analysis on Practices of Certificate Authorities in the HTTPS Phishing Ecosystem.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021
2020
CoRR, 2020
CoRR, 2020
Proceedings of the 8th International Conference on Learning Representations, 2020
2019
Poster: On the Feasibility of Training Neural Networks with Visibly Watermarked Dataset.
CoRR, 2019
How to trick the Borg: threat models against manual and automated techniques for detecting network attacks.
Comput. Secur., 2019
Terminal Brain Damage: Exposing the Graceless Degradation in Deep Neural Networks Under Hardware Fault Attacks.
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the 36th International Conference on Machine Learning, 2019
2018
Security Analysis of Deep Neural Networks Operating in the Presence of Cache Side-Channel Attacks.
CoRR, 2018
CoRR, 2018
Peek-a-boo: Inferring program behaviors in a virtualized infrastructure without introspection.
Comput. Secur., 2018
Commun. ACM, 2018
From Patching Delays to Infection Symptoms: Using Risk Profiles for an Early Discovery of Vulnerabilities Exploited in the Wild.
Proceedings of the 27th USENIX Security Symposium, 2018
When Does Machine Learning FAIL? Generalized Transferability for Evasion and Poisoning Attacks.
Proceedings of the 27th USENIX Security Symposium, 2018
The Broken Shield: Measuring Revocation Effectiveness in the Windows Code-Signing PKI.
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the Security Protocols XXVI, 2018
Too Big to FAIL: What You Need to Know Before Attacking a Machine Learning System (Transcript of Discussion).
Proceedings of the Security Protocols XXVI, 2018
Proceedings of the Advances in Neural Information Processing Systems 31: Annual Conference on Neural Information Processing Systems 2018, 2018
Proceedings of the 10th USENIX Workshop on Hot Topics in Cloud Computing, 2018
ChainSmith: Automatically Learning the Semantics of Malicious Campaigns by Mining Threat Intelligence Reports.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Proceedings of the From Database to Cyber Security, 2018
2017
Understanding the Relationship between Human Behavior and Susceptibility to Cyber Attacks: A Data-Driven Approach.
ACM Trans. Intell. Syst. Technol., 2017
Patch Me If You Can: A Study on the Effects of Individual User Behavior on the End-Host Vulnerability State.
Proceedings of the Passive and Active Measurement - 18th International Conference, 2017
Catching Worms, Trojan Horses and PUPs: Unsupervised Detection of Silent Delivery Campaigns.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
Proceedings of the IEEE Cybersecurity Development, 2016
Proceedings of the 2016 ACM International Symposium on New Ideas, 2016
Proceedings of the 2016 IFIP Networking Conference, 2016
Proceedings of the 2016 IEEE International Conference on Software Maintenance and Evolution, 2016
FeatureSmith: Automatically Engineering Features for Malware Detection by Mining the Security Literature.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
Understanding the Vulnerability Lifecycle for Risk Assessment and Defense Against Sophisticated Cyber Attacks.
Proceedings of the Cyber Warfare - Building the Scientific Foundation, 2015
Vulnerability Disclosure in the Age of Social Media: Exploiting Twitter for Predicting Real-World Exploits.
Proceedings of the 24th USENIX Security Symposium, 2015
The Attack of the Clones: A Study of the Impact of Shared Code on Vulnerability Patching.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
The Dropper Effect: Insights into Malware Distribution with Downloader Graph Analytics.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Terrorism, Security, and Computation, Springer, ISBN: 978-3-319-25760-0, 2015
2014
Soc. Netw. Anal. Min., 2014
Some Vulnerabilities Are Different Than Others - Studying Vulnerabilities and Attack Surfaces in the Wild.
Proceedings of the Research in Attacks, Intrusions and Defenses, 2014
2013
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013
2012
Ask WINE: Are We Safer Today? Evaluating Operating System Security through Big Data Analysis.
Proceedings of the 5th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2012
Proceedings of the 2012 Ninth European Dependable Computing Conference, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
2011
Experimental Challenges in Cyber Security: A Story of Provenance and Lineage for Malware.
Proceedings of the 4th Workshop on Cyber Security Experimentation and Test, 2011
Proceedings of the 5th IEEE International Workshop on the Maintenance and Evolution of Service-Oriented and Cloud-Based Systems, 2011
Toward a standard benchmark for computer security research: the worldwide intelligence network environment (WINE).
Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2011
2010
PhD thesis, 2010
Report on the second ACM workshop on hot topics in software upgrades (HotSWUp'09): http://www.hotswup.org/2009/.
ACM SIGOPS Oper. Syst. Rev., 2010
To upgrade or not to upgrade: impact of online upgrades across multiple administrative domains.
Proceedings of the 25th Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2010
2009
Proceedings of the Companion to the 24th Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2009
Proceedings of the Companion to the 24th Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2009
Proceedings of the Middleware 2008, 2009
Proceedings of the Middleware 2009, ACM/IFIP/USENIX, 10th International Middleware Conference, Urbana, IL, USA, November 30, 2009
Proceedings of the Self-Healing and Self-Adaptive Systems, 10.05. - 15.05.2009, 2009
2008
Proceedings of the Companion to the 23rd Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2008
2007
VLSI Design, 2007
Proceedings of the Middleware 2007, 2007
2006
Proceedings of the Tenth IEEE International Symposium on Wearable Computers (ISWC 2006), 2006
Proceedings of the Architecting Dependable Systems IV [the book is a result of DSN 2006 workshops, 2006
2005
Proceedings of the Middleware 2005, ACM/IFIP/USENIX, 6th International Middleware Conference, Grenoble, France, November 28, 2005
2004
Proceedings of the Architecting Dependable Systems III [the book is a result of the ICSE 2004 and DSN 2004 workshops], 2004
Proceedings of the 2004 Conference on Asia South Pacific Design Automation: Electronic Design and Solution Fair 2004, 2004
2003
Proceedings of the 2003 Asia and South Pacific Design Automation Conference, 2003