Free the Turtles: Removing Nested Virtualization for Performance and Confidentiality in the CloudMengmei YeAngelo Ruoccoet al.2023CLOUD 2023
Fashion Faux Pas: Implicit Stylistic Fingerprints for Bypassing Browsers' Anti-Fingerprinting DefensesXu LinFrederico Araujoet al.2023S&P 2023
Sequence-based System Call Filtering for Enhanced Container Security, is it beneficial?Somin SongSahil Sunejaet al.2023CCGrid 2023
Password-Authenticated TLS via OPAQUE and Post-Handshake AuthenticationJulia HesseStanislaw Jareckiet al.2023Eurocrypt 2023
Towards Automated Assessment of Organizational Cybersecurity Posture in CloudRoy Bar-HaimLilach Edenet al.2023CODS-COMAD 2023
Automating privacy compliance in the decentralized enterpriseGero DittmannChristopher Giblinet al.2022Big Data 2022
Graph Representation Learning based Vulnerable Target Identification in Ransomware AttacksWenqi WeiMu Qiaoet al.2022Big Data 2022
Full-Stack Information Extraction System for Cybersecurity IntelligenceYoungja ParkTaesung Lee2022EMNLP 2022