Benchmarking the Effect of Poisoning Defenses on the Security and Bias of Deep Learning ModelsNathalie Baracaldo AngelFarhan Ahmedet al.2023S&P 2023
Fashion Faux Pas: Implicit Stylistic Fingerprints for Bypassing Browsers' Anti-Fingerprinting DefensesXu LinFrederico Araujoet al.2023S&P 2023
Go or No Go: Differential Fuzzing of Native and C LibrariesAlessandro SorniottiMichael Weissbacheret al.2023S&P 2023
Relational Observability for Cloud-Native Security and Data ScienceFred AraujoTeryl Taylor2023OSSNA 2023
Password-Authenticated TLS via OPAQUE and Post-Handshake AuthenticationJulia HesseStanislaw Jareckiet al.2023Eurocrypt 2023
RAPID: Real-Time Alert Investigation with Context-aware Prioritization for Efficient Threat DiscoveryYushan LiuXiaokui Shuet al.2022ACSAC 2022
Atomic cross-chain exchanges of shared assetsKrishnasuri NarayanamVenkatraman Ramakrishnaet al.2022AFT 2022