SeaK: Rethinking the Design of a Secure Allocator for OS KernelZicheng WangYicheng Guanget al.2024USENIX Security 2024
GhostRace: Exploiting and Mitigating Speculative Race ConditionsHany RagabAndrea Mambrettiet al.2024USENIX Security 2024
True Attacks, Attack Attempts, or Benign Triggers? An Empirical Measurement of Network Alerts in a Security Operations CenterLimin YangZhi Chenet al.2024USENIX Security 2024